Jump to content

Infiltrator

Dedicated Members
  • Posts

    4,287
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by Infiltrator

  1. In addition fish has a good source of Omega 3, which has plenty of goodness for maintaining a healthy body. http://www.youtube.com/watch?v=jLKo5BvhNLU&feature=player_embedded
  2. Came across this JavaScript Obfuscator website. http://www.javascriptobfuscator.com/
  3. Thank you dude, much appreciated I also came across http://www.opennms.org/ I'm still in the process of learning it, and seeing it what it has to offer.
  4. For instance Bill Gates and his wife they are doing a good cause for the humanity, by investing their money into charity. Millions of children die every day, due to hunger or diseases why not invest into medical research or other causes that may help mitigate diseases.
  5. Its a sign that some rich people don't know what to do with their money.
  6. What model is your RAID controller?
  7. During the boot process does it display any options on the screen, like press F1 or f12 to go into advanced set up or something similar. Secondly, once logged onto the server, can you see any HP Storage/SCSI software installed? I am not certain what its called but is there any indication of HP SCSI software loaded.
  8. Since you want to keep the expenditures low, you could go with another 5400 and set it up in a crossfire mode. Or totally upgrade to a ATI HD 6850. It has x3 interfaces, x2 DVI and x1 HDMI. Check out the HD6850 benchmark results for more details. http://www.tomshardware.com/reviews/radeon-hd-6790-barts-gpu-geforce-gtx-460,2917.html
  9. Infiltrator

    Kmlkpwn

    Very nice and handy application. May be you could add another column for the recovered passwords.
  10. Once OpenVPN is installed, all the end user needs to do is visit the OpenVPN URL, the url where the openvpn service is running on, download the client software and enter the user's credentials. And bingo you are in business. It only took me 5 or maybe 10 minutes to get it up and running.
  11. In a way, its bad. Clients do not want to have things breaking all the time. Sometimes you can't help, but if something is breaking all the time, things are not looking good for your reputation and they will get frustrated and look else where, or find a different techie. Someone better that can fix the problem for once. Trust me, its bad and you don't want it.
  12. Just wait a little bit longer until you have a few more posts. Then you should be able to hack your profile.
  13. So what you are trying to do, hook up a phone handset to make free calls?
  14. Cracking WEP is no longer difficult, cracking WPA is a whole different story, but its worth the shot.
  15. Tough I don't like the idea, but if the end user were to commit a crime, that information being held about the end user, could be used to create a profile, and that could then be used to server as evidence in a court of law.
  16. What leg3nd explained to you so far is correct, whether you are on a wired or wireless network, it won't really matter. If you are the attacker or the man in the middle, all traffic coming from the victim computer will pass straight through your computer and then forwarded onto the real gateway. So you are now officially the default gateway for the victim, the victim does not know the attack took place, as it all happens transparently on the background. Best way to mitigate this attack is to set the default gateway MAC address on your computer statically. And deploy ArpON in your computer.
  17. Try OpenVPN, its very easy and safe to use. There are lots of documentation on the website. http://openvpn.net/index.php/access-server/download-openvpn-as-sw.html
  18. Agree with Mr.Protocol, if you want to learn you will need to practice, research and find out how it works from inside out. That's all I can say. If you don't know something, research about it and only then post your question in here so we can assist you. But you will have to do the hard work yourself, that's the only way you become a PRO......
  19. Either way, you can go with VMware 4 or Proxmox but VMware is more suited for virtualizing enterprise servers. For a normal home virtualization, ProxMox would be just the right solution for you. Now the only issue with your current hardware is the CPU, out of box it does not support virtualization, so you will need to upgrade your CPU to one that supports virtualization. http://www.firingsquad.com/hw/7000/AMD_Opteron_285_2.6GHz/ In terms of memory capacity, 8 gigs may be enough for now, but if you plan on running more than 3 VMs at once, consider upgrading it to 10gigs or 16 gigs. You will need to find out how much RAM your system supports.
  20. I am just going to download the episode tonight, I think I am gonna like it.
  21. Found this link, should be able to answer your question, as I am not sure myself. http://www.variety.com/review/VE1117944947?refcatid=32
  22. Just set up a netcat listener on the attacker machine and then set NetCat to reverse connect to the attacker machine from the linux server. Reason to that is very simple, you can not initiate a connection to a server that is behind a firewall from the outside of a network. Unless port forwarding is enabled.
  23. http://www.youtube.com/watch?v=z0JelXjf_Lk
×
×
  • Create New...