I'm having a hard time understanding the question because I think the OP is talking about potentional solutions without addressing the problem.
Let's take a step back and define requirements. At a user level, what is it you want to do. I believe there is more to this than has been explained and if we can see the bigger picture we may find that the solution is much simpler than two hard drives.
Are you looking to mirror your drive, run two operating systems off one set of hardware, what?
And as for multiple masters on one chain, that's a simple thing to do. Connect two hard drives to one IDE chain. Set the jumpers for both as master. Wire an SPDT switch between the molexs so that you can choose which to boot. Wess could probably explain it better than I could but that's the basic idea.
After "reading" the NachoCheese post, and now seeing this, I have come to the conclusion that a higher being is attempting to communicate with us mortals. However the message is lost on me. Obviously my puny mind cannot comprehend the awesomeness that is StrawMan.
Happy birthday Vako!
I had almost forgotten to send you the details of the new Hak.5 profit sharing program. By my calculations your cut over the last 6 months is ($1373).
We accept check, credit, and paypal. I'll send you an invoice this week.
The interesting thing about most of these access points is that, while you can't get web traffic through, and proxies don't help, you are able to get DNS queries. Go ahead and try to nslookup something while on one of these.
I've actually seen a hack that is to setup a special DNS tunnel server at home. It may not be quite fast, but it may just work.
Another thing to look at is nocatauth. google and ye shall find. that might be of much help in phishing usernames and passwords from other tmobile users.
And of course there's always arp cache poisoning and packet sniffing.
/me bookmarks this thread and mods it +5 Interesting
it is spam. the question is will everyone keep posting to the thread, or let it die on it's own. will it evolve into something beautiful, or will a mod lock it? will the spammer change his ways, or will the thread just get deleted.
so many options.
Or they would use WPA on a segregated wireless network connected to a VPN server, so that even *if* you were able to somehow bypass the WPA security you would still need credentials to connect to the VPN, and thus the rest of the network.
Agreed. One of the perks of doing CFH is that we get to go to Canada and bring back the good beer. Unfortunately Harrison still doesn't know how to drink a beer out of a glass bottle, a skill that obviously eludes even the most leet hacker, as seen by the amount of head in that beer.
Harrison good buddy, leave some room for the beer to breathe when you sip it or get a mug. ;)