Jump to content

Infiltrator

Dedicated Members
  • Posts

    4,287
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by Infiltrator

  1. What extension does your rainbow table ends with? Generally the file extension of the rainbow tables should be one of those with .rt and .rtc
  2. Here is a list with the top 500 most common passwords http://www.whatsmypass.com/the-top-500-worst-passwords-of-all-time
  3. Hi All, I will be building a couple of super desktop computers, with dual processor motherboards and at lest 3 or 4 Nvidia GTX 580 graphics cards. But I want to know what software would one use for measuring the computer performance in FLOPS. I need to know how much Flop per seconds are my machines outputting. This is going to be an ongoing project. Any suggestions will be greatly appreciated. Thank you in advance.
  4. A lot of companies are still using Windows 2003 server, even the company I work for they are still using windows server 2003 on their farm, but they do have a few 2008 machines running in virtual environment. If I were you, I would study for Windows 7 and not worry about Windows XP since MS will be phasing it out soon.
  5. We are now living in a technology era, where everything is possible. Whether we are being monitored or a software has a backdoor, we should always remain skeptical. I take my privacy matters very seriously too, and now with all this cyber attacks happening around the internet, its really something to think about and be proactive, before its too late.
  6. Its amazing to see, how many users are still using very basic and week passwords.
  7. By Matthew DeCarlo, TechSpot.com Published: December 14, 2010, 4:00 PM EST Gawker Media suffered a massive security breach on Sunday night after the email addresses and passwords for more than a million members leaked online. A hacker group dubbed "Gnosis" has claimed credit for publishing the information, which is now available as a 487MB torrent download. "We understand how important trust is on the internet, and we're deeply sorry for and embarrassed about this breach of security -- and of trust. We're working around the clock to ensure our security (and our commenters' account security) moving forward," the blog network said in a FAQ post Sunday. Users who log into Gawker sites via Twitter or Facebook don't have to worry about their data, and while all of the standard account passwords were originally encrypted, nearly 200,000 weak ones have already been decoded. The WSJ has analyzed the cracked passwords revealing a scary trend. As we've seen in previous leaks, some of the most popular passwords can hardly be considered passwords at all. More than 3,000 of the decrypted passwords were simply "123456". Nearly 2,000 other accounts were 'protected' by "password", while more than a thousand used "12345678". Hundreds of other users chose clever safeguards such as "qwerty", "0", "letmein", "passw0rd", and "trustno1" (a reference to the X-Files). If you're bored, The Wall Street Journal has published an anonymized list of the 188,279 cracked passwords on Google Fusion Tables. All Gawker members should change their password immediately for safety's sake, and you can use Slate's widget to determine if your account has been compromised. Folks using passwords like "123456" outside of Gawker should exercise a little preemptive damage control and change those, too. Source: http://www.techspot.com/news/41571-13-million-gawker-emails-and-passwords-available-in-a-torrent.html
  8. That's why email encryption is a must. I would hate to see the authorities spying on my emails. Of course, I unless i have committed a crime, but whether I have or not, I would not like the idea, of having someone going through my emails. This would be a good segment for Darren to do.
  9. By Matthew DeCarlo, TechSpot.com Published: December 14, 2010, 6:00 PM EST The Electronic Frontier Foundation (EFF) announced today that the Sixth Circuit Court of Appeals has ruled that email is covered by the Fourth Amendment, which protects U.S. citizens from unreasonable searches and seizures. The court determined that the government must obtain a warrant to access your email in a criminal investigation. The case (U.S. v. Warshak) stems back to 2006 when criminal defendant Steven Warshak (the guy behind Enzyte) filed a civil suit against the government for warrantlessly seizing his emails. At the time, the court agreed that Warshak's Fourth Amendment rights had been violated, but that decision was later vacated on procedural grounds. In 2008, Warshak was found guilty of 93 counts of conspiracy, fraud, and money laundering and received a 25-year prison sentence with a $93,000 fine. He appealed the criminal ruling, thus bringing the Fourth Amendment debate back to court. The Sixth Circuit has again concluded that a warrant is necessary for the government to read your email. "It would defy common sense to afford emails lesser Fourth Amendment protection," the court said, comparing email to traditional mail and phone calls. "The police may not storm the post office and intercept a letter, and they are likewise forbidden from using the phone system to make a clandestine recording of a telephone call." The EFF has trumpeted today's ruling as the "only federal appellate decision currently on the books that squarely rules on this critically important privacy issue, an issue made all the more important by the fact that current federal law -- in particular, the Stored Communications Act -- allows the government to secretly obtain emails without a warrant." Source: http://www.techspot.com/news/41570-sixth-circuit-us-government-needs-warrant-to-read-your-email.html
  10. To be honest with you, a lot of my work colleges recommended me to take Windows 7 exam, but I took a different path. So I went and studied for the XP exam and then booked for the exam and I passed it. And a few days later received an email from Microsoft saying Congratulations and welcome to the MCP program. But I do plan to take the Windows 7, exam once i have finished my server exam.
  11. Try placing the tables in the same directory, as the cracker program is. And then try running again.
  12. There are tons of certification, but the ones I think will be important for you are: 1. MCSA/MCSE Self Paced Training Kit (Exam 70-290): Managing and Maintaining a Microsoft Windows Server 2003 Environment 2. MCSE Self-paced Training Kit (exam 70-297): Designing a Microsoft Windows Server 2003 Active Directory and Network Infrastructure 3. MCTS Self-paced Training Kit (exam 70-680): Configuring Windows 7 4. Interconnecting Cisco Network Devices, Part 1 (ICND1): CCNA Exam 640-802 and ICND1 Exam 640-822 5. Interconnecting Cisco Network Devices, Part 2 (ICND2): (CCNA Exam 640-802 and ICND Exam 640-816) So far I have only completed one Exam, MCP (Windows XP), I am now studying for my next exam, Windows Server 2003 (Exam 70-290). And then once I have completed it, I will be moving onto the next ones.
  13. I think I did, but it was ages ago, so I can't remember which scene you are referring to.
  14. This is not good at all, I won't even use it, in fear of being monitored by the FBI.
  15. Journalists should not be trusted at all. They are all there to gather as much as evidence as possible, and then make it public. Whether its on the record or not, the person who is being interviewed should always be careful about, what they say to the journalist.
  16. Correct if I am wrong, but an amplifier would just introduce more noise and decrease the signal strength, what if I added a high gain antenna, would that work better.
  17. Infiltrator

    Day 8

    Nice short film. It could've been longer.
  18. I always keep a backup of all my files on an external HDD. And when I installed Windows 7 for the first time, I made a restore disk, just in case if something goes horribly wrong. I think, I should also keep an image of my hard drive, if everything else fails.
  19. To maintain my computer, as clean and as fast as possible, I install all the apps that I use frequently like, Office, Adobe, Internet surfing, torrent downloading on my VMs. And if one the VMs gets infected or broken down, I just simply restore my VM from a fresh VM Image.
  20. The only issue I see with this set up is, that if someone is watching a video and another person on the other end starts torrenting files, that could have an impact on the video playback.
  21. You know, they should write a novel on Stuxnet, they would make a lot of money. And I would be the first to buy the book.
  22. Before was Stuxnet, now is Wikileaks, so what's next, the internet going down.
  23. If you want to slow down an attacker, you could set up something like a honeypot that basically works as a bait and lures an attacker to it. You could then install some goodies into it to make the attacker more interested in that box, than any other box on your network.
  24. What kind of incoming information are we talking about? Are you talking about filtering a particular website and then notice someone like an Administrator, that that website has been blocked because such and such was trying to access it. Or are you trying to do something like a botnet that receives information from host controller and tells it what to do?
  25. I can't complain, it is one of the best articles I read on Stuxnet so far.
×
×
  • Create New...