Jump to content

Infiltrator

Dedicated Members
  • Posts

    4,287
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by Infiltrator

  1. They always wait for the last moment, for something bad and as threating to happen to the public, before action is a requirement. And I agree, systems especially like power plants should not be connected to the internet, they pose a serious threat to the national security. Systems that requires a high availability, just like power plants should be completely isolated from the internet, they should be configured as standalone systems.
  2. Do you have UAC turned on or off? if that's turned on trying running the U3 app as administrator.
  3. This news article reminds me of the Die Hard 4.0 film. Where the hackers took over the whole country from a mobile station. I always had this bad feeling, that something like that would happen one day. The technology has advanced so dramatically and arrived to a point where all devices must be interconnected in order to exchange information and this is what makes the whole system so vulnerable to attacks. I hope there is no Fire Sale.
  4. It should definitely be a False Positive. I use Spybot in my computer at home and never ran into this issue. I would suggest running http://wwwvirustotal.com/ against Teatimer.exe, just to stay on the safe side. Teatimer.exe is a program file which may have been installed on your computer as a spyware scanner or spyware remover. Normally this file is part of spybot search and destroy, which is a free spyware and adware scanning program. The exact disk location of teatimer.exe is also shown below to verfiy it is not spyware, as many spyware programs use similiar names and just locate them elsewhere on your hard drive. Always check the proper disk location of your programs if you are suspicious. If you are running this in real time mode, chances are good you will see this file in your task list, as it monitors spyware, malware, and adware in real time mode. Teatimer.exe is not considered to be a virus or spyware related.
  5. Amanda is the most popular open source backup and recovery software in the world. Amanda protects more than half a million servers and desktops running various versions of Linux, UNIX, BSD, Mac OS-X and Microsoft Windows operating systems worldwide. http://amanda.zmanda.com/
  6. Just out of curiosity, how well will AWUS051NH work with backtrack4? I know from a fact that AWUS036NH seems to play nice with backtrack 4.
  7. I kind like Backtrack logo so much, that I am getting an in-printed backtrack logo on a hoddie. It should cost me around $80 dollars.
  8. I guess that's the only true way for you to really learn about something, breaking, experimenting, exploring and practicing. That's how you gain valuable experience and if you not sure about something, you can always hit us at hak5.org/forums with a question and we will be more than happy to assist you.
  9. I use them all the time, when I can't find what I am looking for in Pirate Bay.
  10. Have you tried running the U3 Software in the compatibility mode. Just right click on the application itself, and go to properties and then go to the compatibility mode tab. It may or may not work, its worth a shot.
  11. Make sure there is no person connected to your network via the wireless. Make sure you are using WPA NOT WEP, choose a strong passphrase. Have you got any other device connected to the network, apart from the ones on the diagram?
  12. Found this URL, http://www.cs.uccs.edu/~semwal/indexGLTutorial.html Don't know if it will be of much use to u.
  13. I think to become a Hacker, you have to have dedication, time and patience to learn new things. As MrProtocol pointed out, you should take some Linux courses. Use Google for searching for things you don't know and buy good books, that way you can increase your knowledge. I know of a few places where you can start learning as well. http://securitytube.net/Security-Tools-Video-List.aspx http://www.irongeek.com/i.php?page=videos/metasploit-class
  14. If you have a spare power supply laying around, you might to try that and make sure you boot the computer with a single ram of stick and run a memory test. If the memory passes on the test, give the other memory module a shot as well. If there are no errors in the ram modules, than it would be the power supply. Also you should check, to see If there are known compatibility issues between your motherboard and the memory modules. If there are, you should consider updating the bios or simply buying new ram modules.
  15. Try this article, http://www.sslshopper.com/article-ssl-cert...gle-chrome.html
  16. HACKERS at an infamous DefCon gathering are proving that old-fashioned smooth talk rivals slick software skills when it comes to pulling off attacks on computer networks. A first-ever "social engineering'' contest challenges hackers to call workers at 10 companies including technology titans Google, Apple, Cisco, and Microsoft and get them to reveal too much information to strangers. "Out of all the companies called, not one company shut us down,'' said Offensive Security operations manager Christopher Hadnagy, part of the social-engineer.org team behind the competition. The team kept hackers within the boundaries of the law, but had them coax out enough information to show that workers would have unintentionally made it easier to attack networks. Workers that unknowingly ended up on calls with hackers ranged from a chief technical officer to IT support personnel and sales people. One employee was conned into opening programs on a company computer to read off specifications regarding types of software being used, details that would let a hacker tailor viruses to launch at the system. "You often have to crack through firewalls and burn the perimeter in order to get into the internal organisation,'' Mati Aharoni of Offensive Security, a company that tests company computer defences, said. "It is much easier to use social engineering techniques to get to the same place.'' Other companies targeted were Pepsi, Coca Cola, Shell, BP, Ford, and Proctor & Gamble. The contest, still taking place at DefCon and promises the winner an Apple iPad tablet computer, is intended to show that hardened computer networks remain vulnerable if people using them are soft touches. "We didn't want anyone fired or feeling bad at the end of the day,'' Aharoni said." We wanted to show that social engineering is a legitimate attack vector.'' A saying that long ago made it onto T-shirts at the annual DefCon event is ``There is no patch for human stupidity.'' "Companies don't think their people will fall for something as simple as someone calling and just asking a few questions,'' Hadnagy said." It doesn't require a very technical level of attacker,'' Aharoni added. ``It requires someone with an ability to schmooze well.'' One worker nearly foiled a hacker by insisting he send his questions in an email that would be reviewed and answered if appropriate. The hacker convinced the worker to change his mind by claiming to be under pressure to finish a report for a boss by that evening. "As humans, we naturally want to help other people,'' Hadgagy said. "I'm not advocating not helping people. Just think about what you say before you say it.'' Information about "exploiting human vulnerabilities'' was available at the social-engineer.org website. Original article can be found here: http://www.news.com.au/technology/hackers-...r-1225899446290
  17. Torrents have saved me a lot of money from going to the cinemas and DVD stores.
  18. I am a big fan of Pirate bay, so I always take further precautions like, downloading torrents from within a VM and also use a good AV like Avast since it has a webshield that prevents most virus and malware from entering my VM, by detecting beforehand and blocking it.
  19. I just remembered that under Windows you can optimize a HDD for quick removal. If you go to Computer Management->Device Manager and under Disk Drives, right click on the hard drive you wish to optimize for quick removal. Go to Policies tab and select the first option. Optimize for quick removal. "This setting disables write caching on the disk and in Windows, so you can disconnect this device without using the Safe Removal Icon."
  20. Yeah that's the only down side of raid controllers, the cost can be quite significant.
  21. Good point didn't realize that. I think the forums administrator should discard this thread, its of little or no use at all.
  22. @DaBeach, HighPoint Raid Controllers support hot swap features. RocketRAID 3500 Family Series http://www.highpoint-tech.com/USA_new/series_rr3500.htm Online capacity expansion (OCE) and Online RAID level migration (ORLM) RAID Array Roaming Unplug/Remove RAID array Hot key (ctrl-h) boot-up RAID manager via BIOS Firmware update while running the Operating System Verify RAID Array for Bad Sectors and Parity Check Task Scheduler Automatic RAID rebuild Automatic drive (insert / removal) detection Hot Spare Disk Staggered Drive Spinup Rebuild Priority (Low - Highest) Spin Down Idle Mode Hot Swap and Hot plug Bad sector repair and remapping to reduce dropped drives Multiple RAID array Multiple Logical Drive 64bit LBA support greater than 2TB per volume
  23. That is true, but I've seen a few times before, users posting questions or topics not related to IT/Computers at all. But there could be a possibility that, he is a bot after all.
  24. Try using Private Shell SSH Client http://www.privateshell.com/ It also supports X11 Tunneling, which is what you are working with at the moment.
×
×
  • Create New...