Jump to content

Infiltrator

Dedicated Members
  • Posts

    4,287
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by Infiltrator

  1. Are you trying to do something similar to StegHide?
  2. Just out of curiosity, your wireless router is it on the same subnet as the wired network? Do both networks share the same ip address scheme. 10.0.0.X or 192.168.1.x
  3. I was talking about this functionality with a friend of mine the other day, and he told me there is no way to turn this tracking functionality off. Its something that Apple made built into the phone. When I first heard about it, I was like WTF. Since this functionality can't be turned off, you can however delete the file that keeps record of your location.
  4. Thanks Digip!!! Now I wonder if it was a firewall port issue or something else.
  5. With Digip examples, you should be able to add those ports to the firewall. If you follow them correctly, it should work without any issues. Also what type of service are you trying to run?
  6. He could add an exception to the antivirus, and see if that's really causing the issue. Also Microsoft made a hotfix available to correct the problem http://support.microsoft.com/kb/955427
  7. Found something that may help you http://www.simplehelp.net/2009/04/15/how-to-redirect-traffic-to-another-machine-in-linux/
  8. Check if there is a hotfix, for the problem. Edit: Also try disabling "Remote Differential Decompression" that has a tendency of slowing file transfers sometimes. This only works in Windows Vista or 7. The article that, digip suggested has some registry tweaks you can try, to boost file transfer performance in XP. In the past, I had a lot of issues with XP, so I decided to ditch in favor of Win 7. Besides tweaking the registry, you could also try enabling jumbo frame support on your network. A few things to be aware of tough are, your NIC and switch much support jumbo frame, in order for this to work.
  9. I found this discussion on Subnetting on Tom'shardware website, quite interesting I think its worth a read, just to get some general idea of how to tackle your situation. http://www.tomshardware.com/forum/21918-42-setting-network-subnets
  10. First off all, does your router support RIP protocol? If it does, you will need to enable it and specify the subnets.
  11. You cannot delete it, did u log in with an administrator account at all?
  12. Sorry double post, connection kept on dropping out.
  13. That's the problem with malware, viruses and worms in general. They can come from anywhere. 1) Email attachments 2) Infected USBs 3) Infected PCs on a network 4) From the internet, by visiting websites 5) From network file sharing apps, such Limewire, Emule or Torrents. To minimize the risks of infections, always keep your computer software updated, have a good antivirus installed and always maintain it updated. Don't go clicking on links or downloading files that you are not certain where they are from. The above should keep you safe. Furthermore, if I am going to do something that I know it's going to infect my PC, I always use Vmware or Virtual Box to create a virtual machine where the infection will be contained within the VM itself.
  14. A friend of my mum, asked me to take a look at her computer and determine the cause why it was running so slowly. After analyzing it for sometime, discovered it was infected with more than 5 different types of Malware and Trojan. Whenever I opened an Internet Explorer window, at the title bar I could read the very same line "Ygoow And Moorhunt". If I were you I would run a full virus scan and if that doesn't fix the issue, reinstall Windows. Good luck.
  15. Hello, online shoppers! Today we have new and improved products from online stores at the low, low price of free! That's right, security researchers discovered how to exploit security holes in a software development kit from Amazon Payments so that anyone with a computer and about $25 can be a "qualified attacker." If a person exploited logic flaws, then that malicious shopper could purchase at "an arbitrarily-set price, shop for free after paying for one item, or even avoid payment." Full story: http://www.networkworld.com/community/node/72919
  16. They should employ some white hat personnel to do the computer security for them.
  17. That's something I would not risk. I would make sure, I did not include the memory card, or would buy a new one as a replacement. For the physical memory, I would try to run some kind of software to destroy any evidence.
  18. Maybe he wasn't a very notorious hacker for what he did. Taking down websites everyone can do nowadays. But what made Kavin truly known to the public, was the way how he manipulated people into disclosing confidential information. Kevin was a truly master of Social Engineering.
  19. No need to apology, at some point in our lives we must go through some obstacles. That's why we never stop learning. Its also important to note that, not all systems are going to be easily exploitable. There are ways to make your system vulnerable. Read this article, it should help you understand how to use Metasploit better, besides there are tons of videos to watch in Youtube.com and Irongeek.com http://www.offensive-security.com/metasploit-unleashed/Introduction
  20. See if its under /pentest/payloads/ directory.
  21. I know what you mean, but I didn't publish the article. And yes, I don't see Kevin as a black hat either. Tough back in the old days, but nowadays hes changed.
  22. I bet some of you didn't know, but its a worth a shot of knowing them. Black Hat Crackers The Internet abounds with hackers, known as crackers or "black hats," who work to exploit computer systems. They are the ones you've seen on the news being hauled away for cybercrimes. Some of them do it for fun and curiosity, while others are looking for personal gain. In this section we profile five of the most famous and interesting "black hat" hackers. Jonathan James Adrian Lamo Kevin Mitnick (My favorite hacker) Kevin Poulsen Robert Tappan Morris White Hat Hackers Hackers that use their skills for good are classified as "white hat." These white hats often work as certified "Ethical Hackers," hired by companies to test the integrity of their systems. Others, operate without company permission by bending but not breaking laws and in the process have created some really cool stuff. In this section we profile five white hat hackers and the technologies they have developed. Stephen Wozniak Tim Berners-Lee Linus Torvalds Richard Stallman Tsutomu Shimomura If you want to know more about them, just visit the link below. http://www.itsecurity.com/features/top-10-famous-hackers-042407/
  23. Couldn't agree more, but you know how much they cost a lot. And besides WOW is not a very resource demanding game. I've seen college of mine, playing it before and even a budget laptop can run it without any complain. Any $500 dollars or $1000 dollar laptop will run WOW just fine. Just make sure it has a good CPU clock speed and plenty of RAM.
×
×
  • Create New...