Jump to content

boristsr

Active Members
  • Posts

    96
  • Joined

  • Last visited

Everything posted by boristsr

  1. depends. i learn pretty well at any time of the day, given the right circumstances. however, i find self motivated learning tends to be best done after midnight when people are in bed. have to be quiet and there is nothing else todo.
  2. boristsr

    CMD codes

    You do realise I already said it's really easy to get back any file that is deleted with the del (or delete) command don't you? while that is true, do you expect it to be that thorough? i wouldn't. nothing wrong with having a safer method than needed though.
  3. that is ridiculous question to ask without more info. what is your goal in getting one? do you want to be able to run apps on it? gp2x. want portable gaming with commercial games? ds variant (i'd go lite). want a stationary console with innovative gameplay? wii. the wii is incomparable to the others as it serves a different role imo. the decision would be easier (but still very dependent on what you want out of it) if it was a toss up between gp2x and ds. Personally however, i'd buy the wii. the psp serves my portable gaming. and i already have way too many projects to work on with my desktop and laptop to even consider getting a homebrew dependent device like the gp2x. so, to sum up: what do YOU want out of the unit you get? innovative but stationary gameplay? some cool projects to work on? or great portable gaming with large number of games?
  4. whats the issue with them being there? there is no article for them (yet) so it is saying create the article. what do you want done? remove the link until there is an article?(this wasn't meant sarcastically, but i realise that is how it sounds) the links seem legitimate to me. I'm guessing this may be a mis-understanding of wiki markup. They are just links, and wikimedia automatically creates the link to edit the article if the article doesn't exist.
  5. Desktop: (mine) Self built Windows XP SP2 p4 3.4ghz 2 gig ram ddr 400 dual channel 2 120gig drives 1 80 gig drive dual layer dvd-ram 16x nVidia 6800GT (o/c'ed to 6800Ultra) 20" Dell LCD Laptop: (mine) Compaq Ubuntu 6.06 celeron m 1.5ghz 1gig ram (recent addition as i increasingly use VM's) onboard graphics 60 gig hdd Server: (brothers) Self built Fedora Core 2 p4 2.4ghz 1 gig ram 300gig hdd dvd-rom 2 NIC's (for filestorage, routing, print server, and many other small things, i'm not particularly happy with it being used as just a router nor am i happy with putting important or private info on it if it is directly connected to the internet, it's the source of many arguments between me and my brother) there is 4-6 others on my network however i don't use them (such as the "family" computer) or they aren't mine so i'll skip them.
  6. i'm gonna disagree with that. atleast in australia license agreements usually state you may not reverse engineer the product. if its the same where you are, you're SOL
  7. meh, i did buy it... still didnt stop them from 1-snapping the memory chips, 2-throwing it at the wall and out the door, and 3-finally throwing it out. i built that thing from scratch! wahh i miss it, it ran faster than most computers<cuz people dont kno how to actuallt take care of them> anyways my mom n dad r like YOUR ADDICTED and there was mad drama, but thats a different story...<im not addiicted to the computer i swear, i just like to go on itt> *pictures scene from hackers* *joey takes a puff and sips his coffee* No really! i'm not an addict! don't worry, we are all addicts here ;) however, thats horrible :/ power tripping parents ftw. Luckily my parents chose the opposite strategy, and only getting slightly worried about the time i spent on the computer but still encouraging my talents. it does seem to be paying off now :D
  8. boristsr

    Mac Address

    that's exactly my point. i'm not sure about your area, but around my area there is atleast a 1:1 ratio of unsecured wireless networks to secured wireless network (possibly even approaching 2:1). now, if he has no specific purpose to get access to MY network, then why would he even bother? he can drive an extra 200m and he can connect with no trouble. solid advice. my point before when stating that WEP with mac address filtering is enough for most people is highlighting the fact that security issues are probably quite overstated due to paranoia. and that it's much easier to just find an unsecured network than it is to bother breaking even the simplest of security measures. it's also less risky for the attacker as there is less chance of the admin/owner having a clue and monitoring the network.Another very good thing to do is change the broadcast strength of the wireless AP to as low as you can have it while still serving your needs, while it can still be accessed with the use of a dish or cantenna, it's less likely to be seen in the first place. i'm lucky in this case because my neighbors have no clue and i live in a battleaxe (i'm not sure if this is an aussie term or not, but it's essentially a house behind a house, with a long driveway which goes to 2 houses, resembling a battleaxe from the air) so it's even weaker to access from the road.
  9. boristsr

    Mac Address

    it's secure to an extent if you set it up properly. but sorry guys, nothing beats cable (except of course, no network connection). Also, when choosing how to set up your network, it's important to understand what sort of information people will be able to access, and who exactly will want to access it. If you are using WPA with mac address filtering, it's secure enough for 99.999999999999999999999% of people. For someone to actually bother trying to gain access to your network is highly improbable unless they are after you specifically. i would say for a lot of people also that WEP with mac address filtering is secure enough. sure it CAN be cracked, but the amount of completely unsecured networks around here, it's still too annoying to bother with. it's also likely that the unsecured wifi's have less knowledgeable people behind them, so it's even more unlikely to get caught.
  10. there is nothing wrong with running this in a VM or even on your own internal network, just change the IP address to your target computer.
  11. in TAFE (government funded australian college) one day we were just talking crap and decided on DOS'ing the rooms server (this particular room didn't conform to TAFE's security and setup policy so it was a seperate network that belonged to the campus only). the server at the time did little else other than provide a few network shares (which weren't even used) and i believe also DHCP. save as g.bat :x start g.bat ping 192.168.0.1 -n 1 -l 65000 -w 100 goto x this was the most simple yet was incredibly successful, although, the machine itself also crashed (well, it didn't really crash, but it was unrecoverable). it looked really awesome after a while because all the command prompts stopped drawing in their own window and just drew in the upper left hand corner. it's worth noting: no permanent damage was done and noone was affected. we weren't doing it to be pricks.
  12. but dosn't the GPL say that if you include any code from a program released under the GPL, you must also release your program under the GPL, or is that the GNU licence? they are both the same license :P GNU Public License. and yes the GPL does state that. however, technically they can release it in the same package but as seperate software, so technically they can use a lot of GPL software, including the linux kernel and write their own GUI, and not use X. so they could effectively still make their version of linux incompatible. although it'll never happen.they can't touch the linux kernel, or anything else under the GPL without making all their changes available as well. so they can't kill it. technically they could "acquire" the project, so any future versions they could change the license on, but they can't change already available versions (because people have already agreed to the license and hence already have perfectly valid licenses to use it). no matter what they do, they can't kill linux that way. Patents are a possible angle of attack, but that'd be corporate suicide, even for microsoft. Large companies (including IBM i believe, among many others), have stated they will use their entire patent portfolio against any company that attacks open source software with patents (different companies do it to different levels, most of those companies have said they are protecting specific open source projects, not every open source project) (this is why software patents suck, not only are they stupid, when copyright provides adequate protection, it just brings in a cold war MAD situation among the large companies, and screws up the little projects/people/companies.)
  13. ahh, so thats the not operator. ty sparda, i shall remember this ;) i've been meaning to learn RegExp's for a while now. *edit* btw, is it just more or does it look like he is cleaning out a directory where he just dumped a crawl of a porn site? :P
  14. using cp *[1234567890a].jpg should get you all the files you want out of that list. it's a pattern matching command, it's basically asking for any file that ends in .jpg, as well as the character before that being in the approved list (enclosed in the square brackets) as long as none of your other files end in d or b, you should be fine making it something like cp *[1234567890acefghijklmnopqrstuvwxyz].jpg &lt;your destination directory&gt;
  15. sparda is right apparently cp does support regular expressions.
  16. hmm, that does make it a bit harder, i'll take a look round, see what i can find. i beleive what you're going to need though is a file copier which uses regular expressions, which i don't think cp supports.
  17. agreed, Visual Basic or C# are great for windows applications. great GUI editors and VB is very easy to learn. the express editions are free. go over to msdn.microsoft.com to grab them.
  18. well, one way would be to use 3 commands per directory (this is presuming that the numbers are not of uniform length) cp picture?.jpg &lt;insert your destination folder here&gt; cp picture??.jpg &lt;insert your destination folder here&gt; cp picture???.jpg &lt;insert your destination folder here&gt; ? is a wild character similar to * except that it means that it can be replaced by any single character, not multiple characters. ofcourse, this task is made much easier if the numbers are of uniform length (eg, 3 characters such as 001) this could also be chucked in a script to automate each directory. my linux command line skills aren't the best though, so maybe there is a way to have multiple source files in the one command. **edit** just did some exploring, this should work for you cp picture?.jpg picture??.jpg picture???.jpg &lt;insert your destination folder here&gt;
  19. except for one simple problem: now everyone knows this and has a very simple to crack 5 byte password. hell, that can be brute forced in no time.
  20. umm, you need to upload it to a publically accessible webserver then post the url. you can't just put the address of the file on your computer. try http://www.imageshack.us
  21. i'll get the program name off my brother (it'll take a few hours as he is out atm), but there is a program where you can script mouse movements. afaik it also records your movements. that'd be the easiest way for you to do it. it's possible to make a program to do that, however, i don't have time to write it atm.
  22. i beleive you are missing an option "HELL YES!", by that i mean, i wouldn't eat a whole pizza, but i'd jump at the oppurtunity to have just one slice.
  23. right click my computer->properties->adanced->performance-> settings->Data Execution Protection->ensure it's set to "Turn on DEP for essential windows programs and services only" that should mean it won't run on things like real player.
  24. i'll keep that in mind and make sure to document the process and post it here ;)i had possible security ideas for it too such as not allowing clients onto the network unless they were running this app so i could track anyone on the network (eg. outsiders). possible extensions to the idea such as getting a router with an open firmware and track people with or without the client
×
×
  • Create New...