Jump to content

Infiltrator

Dedicated Members
  • Posts

    4,287
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by Infiltrator

  1. And thanks to the torrent files too. They have saved me a lot of money.
  2. Hi Everyone, I was just surfing the net and stumbled across this web site, that contains the top 20 best Hacker movies. Just wanted to share it with you guys. # 20) The Net (1995) Sandra Bullock plays a software engineer who loses her identity to digital thieves. Filmed during the fanatic years of the then-novel World Wide Web, this film is now cliched. Nevertheless, fans of Sandra Bullock will still enjoy watching this B movie. # 19) Pirates of Silicon Valley (1999) This is the flawed storytelling of how Apple and Microsoft came to be. While this movie got mixed reviews, many people have commented they loved it. Three dollars at your video store, and you can decide for yourself if this was a good film. # 18) The Conversation (1974) While you won't see computers in this classic film, the theme of surveillance and the violation of people's privacy is so masterfully explored here. **Related movie: The Conversation was re-imagined as Will Smith's Enemy of the State in 2001. The 2001 treatment of the story was designed as a modern techno thriller, and has some tremendous special effects and satellite surveillance sequences. Having Gene Hackman star with Will Smith makes it worth the price of a DVD rental. # 17) The Matrix (1999) This was such a groundbreaking adventure in reality and existentialism. No, you will not learn how to break into a Linux server by watching Trinity port-scanning with "nmap". But this movie is definitely cool, nonetheless. # 16) Takedown (2000) This is the sensationalized story of famous phone phreaker, Kevin Mitnick. This is a cult classic that is very hard to find in rental stores. # 15) Antitrust (2001) This movie has some strong points about it. Two idealistic computer whiz kids graduate from Stanford, and one of them enters the world of private sector programming. Sure enough, these two programmers find themselves in the middle of cybercrime scandals. Definitely worth renting for three bucks. # 14) Real Genius (1985) There is only about 5 minutes of actual "hacking" in this comedy, where Laslo "brute-forces" his way into the defense network, and Kent and Mitch do phone bugging. But there are laughs aplenty in this fun B movie. Definite smile factor if you like playful and quirky humor movies. # 13) The Thirteenth Floor(1999) A very extreme version of "The Sims", this movie is about scientists who create a virtual world where participants plug in and take over a computer character's life. The characters are unaware of their puppet existence, but then a real life murder shakes the foundation of the game. # 12) Hackers (1995) Well, this story was really weak, and the hacking scenes were nowhere near reality. But you have to watch this just to say you did. Plus: Angelina Jolie is reason enough for some males to rent this. # 11) Mission Impossible (1996) While many people no longer like Tom Cruise, his first MI movie did have I.T. and computer hacking sequences. Some good action, too. # 10) The Italian Job (2003) Modern heist movies always involve some sort of hacking. This particular heist movie is extremely entertaining, especially when the supposed true inventor of "Napster" is the main hacker. At least 20 minutes of hacking footage in this actioner. Definitely worth renting if you haven't seen it. # 9) Foolproof (2003) A lower-budget movie about hobby bank robbers, this was a delightful surprise to many viewers. Ryan Reynolds and his friends "virtually" rob banks for fun, but are blackmailed into doing a heist for real. This is a good action rental. # 8) Revolution OS (2001) This documentary tells the story about the Linux operating system, and how it forwarded the philosophy of "open source" and free intellectual property. Not an action movie, but definitely interesting for people who want to learn more about why computer culture is the way it is. If you can find a copy of this, definitely rent it. # 7) eXistenZ (1999) A David Cronenberg film, this is the creepiest entry in the list. A game designer creates an artificial reality game that plugs directly into people's minds. The line between reality and game then blurs in a violent and gruesome way. This is very much a powerful art film, and not for everyone. # 6) The Score (2001) Edward Norton and Robert De Niro are fabulous in this heist flick. In a clever plot to rob a Montreal customs house of some royal artifacts, Norton and De Niro must break into the security systems with the help of a socially-awkward hacker who lives in his mother's basement. Ten minutes of hacking, and 100 minutes of phenomenal robbery storytelling! # 5) Swordfish (2001) Over-the-top violence, preposterous situations, sexy women, and outstanding special effects make this a great popcorn rental. No, don't bring your brain to watch this, but if you like techno-thrillers, definitely rent this. John Travolta is the slimy villain, Hugh Jackman is the studly hero hacker, and Halle Berry is the mysterious damsel. # 4) Sneakers (1992) While dated, this movie was groundbreaking at the time, and is still charming to this day. The story revolves around two college buddies who take different paths in life. One becomes an ethical hacker, and the other...well, he is not quite so noble. Some great plot twists and comic scenes make this a good way to spend a Saturday afternoon at home. # 3) Die Hard 4: Live Free or Die Hard (2007) Leave it to Bruce Willis to save the world from uber hackers. Macintosh advertising personality, Justin Long, plays the reluctant programmer caught up in an digital terrorism scheme. Like Swordfish, this movie has over-the-top violence and outrageous action sequences, but if you liked the Die Hard series, definitely see this . # 2) Wargames (1983) Yes, this movie is very old, but it is still a pivotal film in many viewers' minds. A young man finds a back door into a military computer that is linked to the nuclear defense grid of the United States. A preposterous plot, but a compelling commentary on nuclear war and the destruction of the human race. You have to see this movie just to say you have seen it. # 1) Tron (1982) A classic! A hacker is transported into the digital universe inside a computer, and must survive combat as a cyber gladiator in order to stop the villanous Master Control. The imagination behind this movie made big ripples in the science fiction world, and today, Tron is a cult classic that every computer user should see at least once. Web reference: http://netforbeginners.about.com/od/hackin...kermovies_2.htm Thanks Infiltrator
  3. Read up on these articles, they will give you a good understanding on what is network access control and perhaps more ideas. http://searchnetworking.techtarget.com/sDe...1211593,00.html http://www.itsecurity.com/features/essenti...ide-nac-062308/ http://www.itsecurity.com/features/sure-ne...-secure-031708/ http://www.tippingpoint.com/products_nac.html
  4. I think with the current gear you have, you should be able to achieve your goal. Though 1gb of ram is not a lot but it should be enough to get things going.
  5. 4-2.) I don't know about the area you are in but where I am small computer shops have a bum rap because of incidents where people were dropping computers off for repair, given a claim ticket and return in a week only to be told some blatant lie about how their computer is not here and someone else picked it up or they had a break in the previous night, etc etc. When in reality the owner gutted the PC and sold it for parts or built new machines from it... Trust me, It's happened and at more than 1 computer shop. Hope this helps. Have they been prosecuted for doing that?
  6. Sorry my bad, I don't know why I keep doing that?
  7. Oh man, your school should seriously consider an upgrade, but I don't know how tight their budget is so I am guessing that won't be possible.
  8. I have a similar project of my own too. My server will have dual processors, 12 to 16 gigs of ram, a couple of SSDs, intel FCOE (Fiber Channel over Ethernet) network adapter. It will be acting as a file server with 4tb of storage capacity in a raid 10 configuration, with a couple of VMs running as well. I also plan to implement other services like web server, ftp server and a database server.
  9. You could consolidate those operating systems onto a single physical machine. For example instead of having two physical machines running Ubuntu 9.10, you could have one machine running two virtual Ubuntu 9.10 at the same time. You could download a software like VMware or VirtualBox to accomplish that. Make sure the machine has plenty or ram as well, I would recommend something like 8 to 10 gigs if your mainboard supports. On the same physical machine, you could set up another virtual machine for running Windows Server 2003/2008. As to what services to run on these servers, you could consider the following: 1. Web server (Apache + PHP + Mysql) For web design/development 2. FTP Server for uploading and downloading videos, music, pictures or whatever 3. A DNS and DHCP server would be ideal to have in this case. 4. A music streaming server 5. A VPN server
  10. That's the only version of Alfa wireless card that seems to work well with backtrack 4
  11. Funny you brought that up, where I live there are still people who have their wireless SSID set to the factory name like "Linksys or Dlink" and what is more interesting is that, they still use WEP over WPA and sometimes no encryption at all. I have tapped several times onto one of this wireless just for surfing the net and to see what else I could infiltrate into.
  12. I think the wireless router would still register any device that has contacted it, even if the log files are deleted you can still find out who is/was connected to the AP.
  13. I think it would be a very interesting and good segment for Hak5 to do.
  14. I don't mean to be rude, but if you do a search in google by searching for "wireless usb modem name" followed by Susi or backtrack 4, you should find a lot of info on how to install it.
  15. Read this forum from virtualbox.org http://www.virtualbox.org/ticket/3303
  16. Moral of the story people should consider upgrading their wireless security to a more effective one, like WAP and implement a very strong passphrase instead of a weak one.
  17. Yes in deed that's the only issue.
  18. Though it is possible to gain elevated privileges on a limited account, that will be a bit tricky to do that.
  19. What internet service are you using, a public internet or an ISP internet
  20. Or you could pose as one of the trusted devices, by changing your computer netbios name and mac address.
  21. Try this tutorial http://lifehacker.com/5305094/how-to-crack...-with-backtrack
  22. What if you put in compatibility mode?
  23. Infiltrator

    Twitter

    That's very strange, https is suppose to prevent you or anyone else from seeing the password in clear text.
  24. Sorry I misread the question. I dont think that is not possible to remove the Message. Its part of the group policy.
  25. Or if you know the administrator password you could disable the local group policy on that particular PC temporary, by going into gpedit.msc.
×
×
  • Create New...