Jump to content

Infiltrator

Dedicated Members
  • Posts

    4,287
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by Infiltrator

  1. As a matter of fact I am with Internode and they rock. Never had a problem with them.
  2. Got it thank you Sparda.
  3. Never owned an Iphone before, I prefer owning a Nokia or Android.
  4. The good think I like about this design, is that if you are someone like me always eating in front of the computer, you will get bits of food or crumbs falling on the keyboard. Whereas with that laptop, you can wipe it off clean, leaving no residue of food whatsoever. Hope they could design a normal keyboard like that.
  5. Sorry I meant, that if I increase the cluster size I will be increasing the OS file system footprint itself, not the hard drive capacity itself, which would be impossible.
  6. The reason why you are receiving warnings, is because the security certificate hasn't been verified by a Certificate Authority like VeriSign. On the other hand, it has been self-created or generated by someone other than a Certificate Authority. In addition security certificates must be purchased if you want them to be valid. Furthermore by default SSL uses port 443 to function, you can however change that default port to whatever number you like. In the case of IRC.Hak5.org, they are using 7000.
  7. Exactly, you never know! So technically there could be Asian sex.
  8. I've been with my new ISP for over a year now, I consider myself an extremely heavy user when it comes to downloads. I have a 25gb plan with speeds of 24Mbits and I am always exceeding that limit. The good thing I like about my ISP is that I can always buy data blocks and my account will never get shaped up. Now the downside is obviously the cost of buying that, and on the other hand that's one of the disadvantages of living in a country where internet speeds are shit and the ISP fees are so high.
  9. What happens when you try to remote into your Win7 machine? Do you get any errors? Does it stop responding? Since you have enabled port forwarding on your router, make sure you have allowed the application to go through your machines firewall, or otherwise it won't work.
  10. Good point you made there, they are always trying to find a fault/problem at our ends. When in fact the problem lies at their end. I used to be with Telstra for years and one day, I noticed my internet connection speed dropping. So I went and did a major overhaul at my network, phone line and my computer. That did not fix my problem, called those fuckers up and they kept on saying that the problem was with my computer. So I went and signed up with a different ISP which solved my problem.
  11. Infiltrator

    Firesheep

    Just like Gmail, you can change from standard http to https
  12. So if I increase the cluster size, I will consequently be increasing the storage size.
  13. I do agree to an extend, however there is always the chance of the technician doing something bad behind your back, without you even realizing. I mean, where I work we use a lot remote desktop support and we also employ other ways to get into a clients computer without them knowing, you've been inside their computer or not. So to an extend I would not trust someone remoting into my PC.
  14. HOW badly does your PC have to behave before you'll let a Telstra staff member take control of it? That's the question customers of Australia's biggest telco will face, after it today announced its help desk consultants will now have remote access to computers and smartphones to fix common technical support issues. However, an information security expert warned that handing control of our personal computers to anonymous Telstra IT workers was a bad idea. In a worst-case scenario, a customer service worker could put a "root kit" in your computer and discover all your passwords, RMIT University senior lecturer in information security, Dr Asha Rao, said. "Anybody could get to the essence, to the heart and lungs of your computer," she said. "There will be a better way in the future, there should be a better way and must be a better way. "For useability it's fantastic, but from a privacy and security point of view it is a minefield - how do you control it? "What laws are in place to protect somebody from infiltration, from 'model police' who decide what information you can and cannot have?" Or maybe you should consider the case of US woman Tara Fitzgerald, who in August claimed her life was "violated" by an online Dell technician. Ms Fitzgerald said several weeks after she asked a technician based in Mumbai to help her locate "very private photos", they were posted on a web page dedicated to her. That started a spiral of events that ended up with Ms Fitzgerald buying a new computer and sending it to the technician, who then used her account details to buy another computer for his girlfriend, according to US ABC News. Dr Rao said while many Australians would have been exposed at work to the technology being used by IT help teams, they also agree to use those computers under certain conditions. Those conditions don't apply at home, she said. She said another possibility was that a Telstra worker might discover a customer has illegally downloaded information - such as movies or music - that breaches copyright and therefore breaches a contract with the telco. "The Government might also bring in laws requiring Telstra to report that," she said. "It is better to have somebody you know looking at your computer." The service will allow staff to get inside the computer and fix things themselves rather than "troubleshoot" with customers with "limited technical knowledge", Telstra said. "We understand that for some people, explaining the problem can be a major hurdle and this new tool helps bridge the distance between technical support staff and our customers," Rebekah O'Flaherty, Telstra's consumer executive director, said. She said the remote access tool was one of many changes being implemented as a result of feedback programs involving more than 700,000 Australians. "Customer trials reveal this new approach reduces the average time it takes to resolve support issues and will increase the number of cases resolved on the first call," she said. Source: http://www.news.com.au/technology/give-us-...0-1225943542754
  15. THE teenage Mark Zuckerberg might have been a jerk, but at least the grown-up one can take a joke. That's how The Social Network screenplay writer Aaron Sorkin might put it — if he didn't love using so many words. "Growing up in my family at my dinner, anyone who used one word when they could use ten just wasn't trying," he joked to news.com.au during a recent trip to Sydney to promote his new film. The Social Network follows the founding of social networking site Facebook and its odd, often unlikeable, creator Mark Zuckerberg. To say that Zuckerberg comes off as less than an angel in the film would be an understatement. But Sorkin, the writer behind A Few Good Men and TV show The West Wing, says the real Facebook chief seems to have taken the movie in his stride. "I want to say right up front I think he's been a remarkably good sport about this whole thing. I don't mean to be glib about it, but he has," he said. "I don't think any of us would want a movie made about the things we did when we were 19 years old, but here it is." One of the movie's pivotal scenes involves drinking a generous amount of Appletinis — something the real Zuckerberg appears to have taken to heart. "I know the day that the movie opened in the US, he shut down the Facebook offices, he bought out a movie theatre, he took the entire staff over to see the movie," Sorkin says. "And this won't mean anything to anybody until they've seen the movie, but he took them all out for Appletinis. "I don't know what bar in the world has that much Appletini mix, but he made the Appletini the official drink of Facebook." Angry geniuses Sorkin says the film is based on fact, not fiction — thanks in part to blog posts written by the teenage Zuckerberg which he incorporated into the script. However he also says that Zuckerberg represents a wider group of people he dubs "angry geniuses". "He's not alone. There's an entire subset of tech geniuses, and even geniuses in other fields, who are not like the cuddly nerds that Hollywood made movies about in the '80s," he says. "They're very angry because the pretty cheerleader still wants to go out with the quarterback and not them, even though they're the ones who are running the universe. "They have a kind of superiority-inferiority complex that crashes into each other. "They've been told that they're inferior because they keep getting stuffed in the locker, at least metaphorically. But they know that their minds are superior." The trick to putting a character like that on screen without alienating viewers, Sorkin says, is to not judge them. "You can't judge the character. You can't decide this guy is good, bad, up, down, right, left or anything like that," he says. "You've got to find the parts about him that are you and you've got to empathise with him. "(To do that) I'll try to tap into those moments when I've felt kind of an immature anger about something. "I really don't have to go back that far. I can go back to being 25 and still find moments of great immaturity and find that anger." Source:http://www.news.com.au/technology/the-social-network-film-about-angry-geniuses-says-screenplay-writer-aaron-sorkin/story-e6frfro0-1225943745940
  16. Infiltrator

    Netifera

    Microsoft has released a patch for the Poet Attack http://www.sitefinity.com/devnet/forums/si...oet-attack.aspx
  17. You are absolutely right, History will prove one wrong. We are living on a digital world, where information is growing every second and if we don't deal with it now, we will have problems in the future. Edit: by the way, do you know what Windows 7 x64 storage footprint is?
  18. Isn't 64bit file system enough, why go with a 128bit file system. Its not like we need that much of storage footprint anyway. An average home user will never consume more than 1 or 2 TB. But yeah, just like IP V4, we thought we would never run out of ip addresses and statistics have shown that we are now only at 5% of IP address v4 left. But it would be nice to have that kind of storage footprint for storing rainbow tables.
  19. I've seen that before and was kinda scary at first but then I was like it must be a script on the background. I then wiped off cookies and the website was not able to display anymore information about my browsing. Nice, but old.
  20. I got some reading for you http://www2.fiit.stuba.sk/~bielik/sofsem20...lanky/09Yoo.pdf http://www.google.com.au/url?sa=t&sour...8IhkS5AHs6csMuQ
  21. Yep pretty much! A firewall alone can't protect your network 100%, that's why you need to deploy IDS and IPS altogether.
  22. How Intrusion Detection Works Intrusion detection is the process of identifying potential threats to networks, computers, databases and other IT devices. Intrusion detection has become increasingly essential with the popularity of the Internet. Many companies have implemented intrusion detection systems to discourage hackers from stealing information and destroying network systems. Hackers intrude on networks for the purpose of financial gain, industrial espionage, or out of the need to gather attention or protest the apprehension of other hackers. The reasons for hacking are numerous and rapidly increasing as the world relies on the Internet for conducting business and personal use. How Intrusion Detection Works Intrusion detection works by collecting information and then examining it for inappropriate occurrences. An IT administrator will use this data to take future preventative measures and make improvements to network security. An intrusion detection system works by examining the following events: Observing Activity: The intrusion detection system will observe activity taking place within the network and keep track of user policies and activity patterns to ensure there are no attempts to violate these patterns. Viruses: Virus and malware can hide within a network system in the form of spyware, keylogging, password theft, and other types of malicious attacks. A good intrusion detection system can spot where they are hiding and then take the necessary steps to remove these hidden files. Vulnerabilities: When a network system is configured it can create vulnerabilities in system configuration files. In this case the intrusion detection system will identify the vulnerabilities in the configuration files as well as each machine on the network. File Settings: Authorization files on a network generally consist of a user authorization and a group authorization. The intrusion detection system will check these on a regular basis to ensure they have not been tampered with in any way. Services: Service configuration files are routinely checked to ensure that the there are no unauthorized services in operation on the network. Packet Sniffing: Intrusion detection systems check for unauthorized network monitoring programs that may have been installed for the purpose of monitoring and recording user account data activity. PC Check: The intrusion detection system will check each PC on the network periodically to make sure there have not been any violations or tampering activity. Generally if one PC displays a violation, the system should check all of the other machines on the network. An intrusion detection system can be run manually but most IT administrators find it easier to automate the system checks to ensure that nothing is accidentally overlooked. It is also necessary to cover all of the bases when it comes to a system check so that statistical analysis can be performed accurately. Source: http://www.spamlaws.com/how-intrusion-detection-works.html Edit: What you need to know about IDS: http://www.windowsecurity.com/articles/Wha...on_Systems.html http://www.itsecurity.com/features/intrusi...dummies-072906/
×
×
  • Create New...