Jump to content

Infiltrator

Dedicated Members
  • Posts

    4,287
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by Infiltrator

  1. He is definitely a member and what he wants is attention from the community, which he is getting a lot I'd say.
  2. If they can crack it! It all depends on the size of the key used to encrypt the files. If the keys are way too long, then the police is fucked with no hard evidence. Edit: Way to hide the evidence +10, great work dude.
  3. That's a good idea, I also plan to open my own business as well. But not at this point in time. If you don't mind me asking what kind of services are you planing on proving.
  4. Good point, haven't thought of that. I will try using a different agent and perhaps change my DNS settings to see if that works.
  5. They must have exceptions for some countries, and your country must be on their exception list.
  6. That is happening to me too, I am using http://peacefire,org/ to bypass the filters,
  7. Paypal would be my prefered method of payment.
  8. Two ways you could achieve that, through wire or through bridging mode.
  9. So if you like IT and wants to work for an IT company, I would suggest starting off in lower level position, like a helpdesk and then move your way up the ladder.
  10. So what are you considering in doing?
  11. That is untrue, no train can do a loop like that. But a very good home made video. Like it very much.
  12. This post is becoming very popular here in the Hack5 forums, shouldn't it be already locked or deleted?
  13. I am a cheap person, with expensive wants can you believe that. It doesn't make sense to me. But I like the idea of a Plug Computer, I might buy want to try out.
  14. Yep same here, there are several things I want to buy right now too. x1 new screen for my computer. x1 new HDD x2 new gigabit switches with poe 2x wireless access points. A Qnap NAS I've estimated a price over $3000.00 dollars, just to buy these stuffs.
  15. Of couse you can, you are God, you've got the powers.
  16. how did you set up the proxy. The proxy is meant to be set up on the outside of the schools network, so you can connect to it. But before you can connect to it, you will need to authenticate through the schools proxy first. Once authenticated, you can use the outside proxy, to browse any website that is blocked by the school firewall.
  17. Yep I know signal strenght will be an issue, if client is far away from you. That's why a high gain anthena would be good to have. But again that may draw some attention. Anyway will look into the Karma thing.
  18. How to Get Good Search Engine Rankings aka "SEO 101: Getting High Google Placement" http://websitehelpers.com/seo/ http://www.seobook.com/archives/002006.shtml http://mindandmoneymatters.com/internet/seo
  19. Or if you don't want to wait until a user connects to your Fake AP, you could send some Deauth packets to kick them off the wireless, so making them come right at you. Not a nice approach, I know but it would theoretically work.
  20. It may not be a bad idea to use it, since cables can get all cluttered. But the downside of it, its obviously interference, if you have other wireless devices in the house it may become susceptible to interference and as result, you may lose picture or the whole connectivity.
  21. Result of hackers, it sounds more like a network storm or a loop on the network. That can happen, when a user doesn't know how to plug the network cable into the right port, all lights on the switch goes crazy, as result the performance of the network comes to a crawl.
  22. Anyone with the right set of tools can pull this attack. And there are certainly ways to mitigate this attack, you can use (Arpon or ArpWatch) to monitor any changes to your computer ARP table. ArpON is the most advanced one that can detect and block the attack on the spot. Arpwatch will only detect the attack and alert you.
  23. I was quite suprised when I read this comment made from Microsoft Senior Program Manager: Cowan's talk was an extended argument on why Windows 7 is as secure as Unix variants such as Linux. And this security parity came about, in his view, in large part thanks to the fact that Windows Vista was the first desktop version of Windows to not, by default, give each user account full administrative privileges.
  24. IDG News Service - Despite being widely derided (even by Microsoft executives), the Vista OS was instrumental in finally bringing to the world a secure version of Windows, at least if a presentation by a Microsoft security expert at the Usenix Security Symposium, being held this week in Washington, D.C, is any indication. And it was the most widely hated feature of Vista -- User Access Control (UAC) -- that can take the credit. It was all the users complaining about the annoying UAC pop-up boxes that finally spurred many application developers to rewrite their programs, explained Crispin Cowan, a Microsoft senior program manager for the Windows core security team. These programs were rewritten so that they did not require full administrative privileges to run, which, in turn, cut down on the UAC boxes and allowed users to slowly grow more comfortable running in more limited, but safer, user modes. "The purpose of UAC was to move applications away from using administrative privileges. Its job was to spank programs that used administrator that don't need to," Cowan said. UAC, in effect, caused a "massive decimation of the population of ill-behaved [Windows] programs," he said. "The number of programs asking for admin rights dropped precipitously." Cowan's talk was an extended argument on why Windows 7 is as secure as Unix variants such as Linux. And this security parity came about, in his view, in large part thanks to the fact that Windows Vista was the first desktop version of Windows to not, by default, give each user account full administrative privileges. Windows' reputation for lousy security has been fully deserved, Cowan admitted. Even today, the most widely used version of Windows is Windows XP, which was built in 2001, and lacks most of the security provisions needed for today's environments (though Service Pack 2 added a lot of security features, he said). Early versions of the Windows OS stressed usability over security, as well as interoperability among different programs, Cowan said. As a result, Windows allowed every user to have full control over the machine, in effect giving each user account full administrative control over a machine. "If you are running as administrator, security is fairly hopeless," he said. Unfettered administrative rights is what allowed malware and viruses to take control of computers. Beginning in 2002, however, Microsoft started making security an essential part of software development. As a result, the then next version of Windows, Vista, featured a total separation between what a user can do on a machine and what an administrator can do, a separation that has always been enforced on Unix distributions. This separation, enforced by UAC, limits the damage that a user can do to a machine. UAC could be seen as the Windows equivalent to the Unix sudo command, Cowan explained. Sudo allows a user to execute privilege tasks only after supplying an administrator, or root, password. Some Linux distributions, such as Ubuntu, do away, at least out of the box, with root accounts altogether, relying entirely on sudo. Many users chafed at using UAC, however. Every time a program would require full administrative rights to run, a UAC box would pop up on the screen, asking the user for permission. The annoyance of UAC actually proved to be beneficial over the long run, Cowan explained, because it reduced the number of applications that required administrative rights. In many cases, programs did not need administrative permissions at all. Many Windows programs were designed to write their configuration data to the system registry, when it could as just as easily be stored in user folders. Over time, application developers got the message from all the user complaints. Using anonymous telemetry data, Microsoft estimated that the number of Windows applications that required user access dropped from approximately 900,000 to 180,000. While Vista got the bad reputation for user-hostility, Windows 7 made UAC more user friendly without relaxing the strict divide between user and administrator. This OS offered auto-elevation, in which a limited number of Microsoft pre-approved programs could get administrative access without the annoying user prompts. It offers a sliding UAC scale, so users can pick the level of restriction for their applications. Windows 7 also established virtual accounts so individual applications could get their own user accounts, Cowan said. After the talk, one audience member said he agreed that UAC probably did encourage application vendors to rewrite their programs, but wondered if that was really Microsoft's goal in the first place, given the amount of user dissatisfaction it caused. Cowan himself admitted, when discussing browser security, that "Prompts are not purely evil. Prompts in which the answer is almost always 'yes' are evil." UAC was one of a number of features that, Cowan said, brought Windows to security parity with Unix. The other features include a built-in firewall and the signing of 64-bit kernel drivers. In some cases, he argued, Windows now has security features that aren't even found in most Unix distributions, such as network access protection, memory address randomization, and data execution prevention. "Unix had a very large security lead. Since then, Microsoft has closed the gap on every front and in some cases exceeded Unix security," Cowan said. Source:http://www.computerworld.com/s/article/9180614/Vista_paved_the_way_for_secure_Windows_Microsoft_says?taxonomyId=122&pageNumber=2
  25. You can give this tools a try, but I am not 100% certain whether you will be able to retrieve your data, since you have already installed a different file system. You will need to install your HDD onto another machine, in order to try to restore the files. http://www.cgsecurity.org/wiki/TestDisk http://foremost.sourceforge.net/ http://www.digitalforensicssolutions.com/Scalpel/
×
×
  • Create New...