Jump to content

Infiltrator

Dedicated Members
  • Posts

    4,287
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by Infiltrator

  1. It turns out that the AV I am using let me extract the virus directly from its chest. I am using Avast by the way, and the interesting thing, is that it lets me pick a location where to save the malware. Thanks again Digip.
  2. See its not about the Company's perspective about a product, its about the user's experience with the product. You want to give the end user a good experience not a bad experience. Giving the users a bad experience will frustrate them and make them seek another product elsewhere.
  3. CGI is so advanced, that these kind of films looks so vivid or even better they just look like real films. Real people in it, technology is so amazing in what it can offer.
  4. Its a shame Australia is always behind other countries, when it comes to movies.
  5. You should be able to change the SSH default port to 80, I don't see why it shouldn't work.
  6. You can change how many connections FF makes to a server, by entering About:Config in FireFox address bar. In order to increase the outbound connections, you will need to tweak the following lines. network.http.max-connections = 30 network.http.max-connections-per-server = 15 network.http.max-persistent-connections-per-proxy = 8 network.http.max-persistent-connections-per-server = 6 Now be aware that increasing these values, can have performance issues. I would probably recommend to start from 2 connections and then slow increment by 1 or 2.
  7. Thanks guys and Digip your information was very helpful and it had given me a lot of insights and thoughts to consider. Using a VM is not a bad idea, I thought about using it before and I always like to do risky work in a VM for safety reasons. Another question is, most ant-virus have a virus chest, that helps contain the virus from spreading, it is possible to copy the virus from there to another physical location. Or will the AV prevent such action. Thank you again.
  8. Again that all comes down to the contents your serve. Users are looking for something unique, interesting and enjoyable just like the Hak5 episodes. If you want to catch peoples attention, look for popular videos, a video that has been watched several times. And make points, what made that video so special that made every user watch it. I mean that is just an example, but that should give you an idea.
  9. When was this movie released?
  10. Hi all, Apart from using an Anti-virus, how would one go about capturing a live virus from an infected system, so it could be used for later analysis. My friends PC is infected and I would like to get a hold of that sucker. Is there any utility that could be used to extract the virus? Thank you in advance. Regards, Infiltrator
  11. I could use a converter to convert USB to composite what do you think?
  12. The answer to your 2sd question is very simple, even though your school blocks 22, 53. You can still use SSH, you will need to change the default port in the SSH Config file to port 443, that should allow you to connect to your SSH server from your school network. Edit: Now for you first question, I found this apache article that may answer your question: http://httpd.apache.org/docs/2.0/bind.html
  13. Dorgem is no longer being developed, but its worth a shot at it. Thanks Mnemonic
  14. Well I never said it would be easy to analyse a malware, most malwares are designed to protect themselves and prevent analysts from reverse engineering them. There are certainly tools that can help analyse the behavior of virus, but disseminating the virus would be very difficult , even more if you are not an experienced user.
  15. I guess its all part of learning, but getting someone else to do the dirt work for you to an extend its Ok. But at some point, you got to do the dirty work yourself as well. But I see where you are coming from, it takes a lot time, practice and experience to understand how/what a virus is doing.
  16. Thats the first time I hear a company allowing its users to hack their application.
  17. I breached my schools computer contract terms twice, I was even interviewed by some IT guys, because of the tools I was using on their network. After the interview they removed all my lan access and banned me from touching any computer for 2 months.
  18. Inside a van shouldn't be to hard to set it up. Unless there isn't enough space at the back of it.
  19. I can kind of relate to that, I got my first PC when I was 13. At first I had no idea how to use it, I was poking around with the settings, trying to learn and accidentally I wiped all the programs including windows. My dad wasn't very impressed and not happy either. My mum then sent me to a computer school, to learn how to take a computer apart and all the interesting things. I now have a lot more confidence in fixing something, when it doesn't work.
  20. Will torrent it tonight and watch it.
  21. The Telegraph and Guardian reported yesterday that the government plans to install deep packet inspection kit at ISPs, a move considered and then apparently rejected by the previous government (our Database State report last year found their Interception Modernisation Programme to be almost certainly illegal). An article in the New York Times on comparable FBI/NSA proposals makes you wonder whether policy is being coordinated between Britain and America. In each case, the police and spooks argue that they used to have easy access to traffic data — records of who called whom and when — so now people communicate using facebook, gmail and second life rather than with phones, they should be allowed to harvest data about who wrote on your wall, what emails appeared on your gmail inbox page, and who stood next to you in second life. This data will be collected on everybody and will be available to investigators who want to map suspects’ social networks. A lot of people opposed this, including the Lib Dems, who promised to “end the storage of internet and email records without good reason” and wrote this into the Coalition Agreement. The Coalition seems set to reinterpret this now that the media are distracted by the spending review. We were round this track before with the debate over key escrow in the 1990s. Back then, colleagues and I wrote of the risks and costs of insisting that communications services be wiretap-ready. One lesson from the period was that the agencies clung to their old business model rather than embracing all the new opportunities; they tried to remain Bletchley Park in the age of Google. Yet GCHQ people I’ve heard recently are still stuck in the pre-computer age, having learned nothing and forgotten nothing. As for the police, they can’t really cope with the forensics for the PCs, phones and other devices that fall into their hands anyway. This doesn’t bode well, either for civil liberties or for national security. Source: http://www.lightbluetouchpaper.org/2010/10...he-crypto-wars/
  22. Russian spy Anna Chapman is making headlines this week for posing provocatively in a photo spread in the Russian edition of Maxim magazine, but she equally deserves notoriety for landing a job as an IT security official in a Russian bank despite glaring gaps in her technical knowledge. A statement by FondServisBank says it hired Chapman "to bring innovation to its information technologies," according to a story by the Associated Press. Chapman was one of 12 Russian spies arrested in the United States in July and returned to Russia in a spy swap. The ring as a whole was pretty inept technologically -- Chapman in particular. She is the same woman who couldn't troubleshoot an ad hoc, peer-to-peer wireless network and who turned her laptop over to an undercover U.S. agent so he could get it fixed for her, according to court papers used to get an arrest warrant. The papers say she apparently tried to swap zipped files over a Wi-Fi network with another agent, but failed on two occasions. After her return to Russia, she and the other spies were feted by Russian Prime Minister Vladimir Putin. Chapman stayed out of the public eye until last week when she appeared at a Russian space program facility to see off cosmonauts headed for the International Space Station. An official in the space program linked her to the bank, which later issued a statement about her. The bank said it hoped to be a reliable partner for Chapman, and that it considered her an exceptionally creative -- and what is of equal importance -- multifaceted employee who is truly concerned about the fate of Russia. The spy ring she worked with had plenty of trouble with ad hoc wireless networking, but also left passwords written on slips of paper and couldn't get replacement laptops for months on end. Source: http://www.networkworld.com/news/2010/1021...or.html?hpg1=bn
  23. There are heaps of PHP scripts available on the net for what you are after. if you do a search you may be able to find what you are looking for.
  24. The code will still be portable. you are only change the structure of the code a bit to make it more efficient.
  25. Yep, perfect solution to get rid of any MBR infection and to restore the MBR to a clean state. If you are using Windows, just run the repair utility off the installation CD and bingo you are back in business.
×
×
  • Create New...