Jump to content

boristsr

Active Members
  • Posts

    96
  • Joined

  • Last visited

Posts posted by boristsr

  1. This is actually how easy it is:

    Insert Ubutnu live CD, boot it.

    sudo apt-get update
    
    sudo apt-get install ntfsprogs

    and then

    sudo ntfsundelete /dev/hda

    will list all files that are 'undeleteable', then do

    sudo ntfsundelete -u <insert file name here>

    to 'undelete' a given file.

    It is literally that easy.

    imagine doing that on 50 computers. fair enough they can write a script, but booting ubuntu is hardly quick. and yes they could do it on dsl or whatever but i doubt a search is any more thorough than a search for "*.wav *.mp3 *.avi *.wmv *.wma *.mpg". due to the amount of computers they need to check and the average computer literacy of highschool students, anything more is not worth it. not many would even know it's possible to undelete. geeks aren't in high numbers at high school.

    btw, you also forgot that there are hundreds of tools capable of scanning drives and undeleting files from within windows itself.

    i just don't think it's gonna be that thorough. i'd have to say truecrypt would be the best solution (as it also stops you from loosing your data incase it gets overridden by something when it's deleted), even just make it a virtual drive, don't worry about hiding the partition just call it data.pak and chuck it in a game directory.

  2. thanks! you saved me! well i should have said what i'm using this for. i live at a bording school and they do computer check while i'm not in the room so i wanted to make a quick cmd script for my roomate to click to delete certain files i dont want to school getting. do you remember the show i'm talking about? its really killing me. i think it might be hak.5 but i cant find the segment in the show notes, and i know it wasn't the broken or system or diggnation.

    You do realise I already said it's really easy to get back any file that is deleted with the del (or delete) command don't you?

    while that is true, do you expect it to be that thorough? i wouldn't. nothing wrong with having a safer method than needed though.
  3. that is ridiculous question to ask without more info. what is your goal in getting one? do you want to be able to run apps on it? gp2x. want portable gaming with commercial games? ds variant (i'd go lite). want a stationary console with innovative gameplay? wii.

    the wii is incomparable to the others as it serves a different role imo.

    the decision would be easier (but still very dependent on what you want out of it) if it was a toss up between gp2x and ds.

    Personally however, i'd buy the wii. the psp serves my portable gaming. and i already have way too many projects to work on with my desktop and laptop to even consider getting a homebrew dependent device like the gp2x.

    so, to sum up: what do YOU want out of the unit you get? innovative but stationary gameplay? some cool projects to work on? or great portable gaming with large number of games?

  4. whats the issue with them being there? there is no article for them (yet) so it is saying create the article. what do you want done? remove the link until there is an article?(this wasn't meant sarcastically, but i realise that is how it sounds) the links seem legitimate to me.

    I'm guessing this may be a mis-understanding of wiki markup. They are just links, and wikimedia automatically creates the link to edit the article if the article doesn't exist.

  5. Desktop: (mine)

    Self built

    Windows XP SP2

    p4 3.4ghz

    2 gig ram ddr 400 dual channel

    2 120gig drives

    1 80 gig drive

    dual layer dvd-ram 16x

    nVidia 6800GT (o/c'ed to 6800Ultra)

    20" Dell LCD

    Laptop: (mine)

    Compaq

    Ubuntu 6.06

    celeron m 1.5ghz

    1gig ram (recent addition as i increasingly use VM's)

    onboard graphics

    60 gig hdd

    Server: (brothers)

    Self built

    Fedora Core 2

    p4 2.4ghz

    1 gig ram

    300gig hdd

    dvd-rom

    2 NIC's

    (for filestorage, routing, print server, and many other small things, i'm not particularly happy with it being used as just a router nor am i happy with putting important or private info on it if it is directly connected to the internet, it's the source of many arguments between me and my brother)

    there is 4-6 others on my network however i don't use them (such as the "family" computer) or they aren't mine so i'll skip them.

  6. From what I understand you want to know if you'll get into legal trouble if you use no cd cracks for you're IPTV show, well 'no cd cracks' are legal because you're not cracking the cd. So I'd say you're good...

    But if you want to try again and use some spelling/grammar and a touch of proof reading I'd be happy to have you a second opinion.

    i'm gonna disagree with that. atleast in australia license agreements usually state you may not reverse engineer the product. if its the same where you are, you're SOL
  7. best way earn some money and buy you're own computer

    meh, i did buy it... still didnt stop them from 1-snapping the memory chips, 2-throwing it at the wall and out the door, and 3-finally throwing it out. i built that thing from scratch! wahh i miss it, it ran faster than most computers<cuz people dont kno how to actuallt take care of them> anyways my mom n dad r like YOUR ADDICTED and there was mad drama, but thats a different story...<im not addiicted to the computer i swear, i just like to go on itt>

    *pictures scene from hackers* *joey takes a puff and sips his coffee* No really! i'm not an addict!

    don't worry, we are all addicts here ;)

    however, thats horrible :/ power tripping parents ftw. Luckily my parents chose the opposite strategy, and only getting slightly worried about the time i spent on the computer but still encouraging my talents. it does seem to be paying off now :D

  8. The guy who tries to get access to your network is not obligatory a guy who wants to harm your network. He may just want to have an internet connection for free (or maybe he's just an internet addict, he just moved and can't wait for his internet connection).
    that's exactly my point. i'm not sure about your area, but around my area there is atleast a 1:1 ratio of unsecured wireless networks to secured wireless network (possibly even approaching 2:1). now, if he has no specific purpose to get access to MY network, then why would he even bother? he can drive an extra 200m and he can connect with no trouble.
    My advice, if you use the WI-FI anyway, it's at least to use WPA, change your key regulary and monitor your network too..and don't use P2P. There's a chance the guy can't make injection of packets but p2p will help him a lot. In less than one day, he will get enough packets.
    solid advice. my point before when stating that WEP with mac address filtering is enough for most people is highlighting the fact that security issues are probably quite overstated due to paranoia. and that it's much easier to just find an unsecured network than it is to bother breaking even the simplest of security measures. it's also less risky for the attacker as there is less chance of the admin/owner having a clue and monitoring the network.

    Another very good thing to do is change the broadcast strength of the wireless AP to as low as you can have it while still serving your needs, while it can still be accessed with the use of a dish or cantenna, it's less likely to be seen in the first place.

    i'm lucky in this case because my neighbors have no clue and i live in a battleaxe (i'm not sure if this is an aussie term or not, but it's essentially a house behind a house, with a long driveway which goes to 2 houses, resembling a battleaxe from the air) so it's even weaker to access from the road.

  9. it's secure to an extent if you set it up properly. but sorry guys, nothing beats cable (except of course, no network connection).

    Also, when choosing how to set up your network, it's important to understand what sort of information people will be able to access, and who exactly will want to access it. If you are using WPA with mac address filtering, it's secure enough for 99.999999999999999999999% of people. For someone to actually bother trying to gain access to your network is highly improbable unless they are after you specifically.

    i would say for a lot of people also that WEP with mac address filtering is secure enough. sure it CAN be cracked, but the amount of completely unsecured networks around here, it's still too annoying to bother with. it's also likely that the unsecured wifi's have less knowledgeable people behind them, so it's even more unlikely to get caught.

  10. boristsr which tafe you go to,

    i would like to see this working and just seeing a wireshark network dump

    there is nothing wrong with running this in a VM or even on your own internal network, just change the IP address to your target computer.

  11. in TAFE (government funded australian college) one day we were just talking crap and decided on DOS'ing the rooms server (this particular room didn't conform to TAFE's security and setup policy so it was a seperate network that belonged to the campus only). the server at the time did little else other than provide a few network shares (which weren't even used) and i believe also DHCP.

    save as g.bat

    :x
    
    start g.bat
    
    ping 192.168.0.1 -n 1 -l 65000 -w 100
    
    goto x

    this was the most simple yet was incredibly successful, although, the machine itself also crashed (well, it didn't really crash, but it was unrecoverable). it looked really awesome after a while because all the command prompts stopped drawing in their own window and just drew in the upper left hand corner.

    it's worth noting: no permanent damage was done and noone was affected. we weren't doing it to be pricks.

  12. All Microsoft would have to do is, say, change the filesystem on Linux to whatever rubbish they're putting on Vista. Or add some proprietary code here and there. Whatever. Even though a huge proportion of code is still "Linux", the product becomes "Microsoft", and the GPL goes right out the windows. Pun intended.

    but dosn't the GPL say that if you include any code from a program released under the GPL, you must also release your program under the GPL, or is that the GNU licence?

    they are both the same license :P GNU Public License. and yes the GPL does state that. however, technically they can release it in the same package but as seperate software, so technically they can use a lot of GPL software, including the linux kernel and write their own GUI, and not use X. so they could effectively still make their version of linux incompatible. although it'll never happen.

    they can't touch the linux kernel, or anything else under the GPL without making all their changes available as well. so they can't kill it. technically they could "acquire" the project, so any future versions they could change the license on, but they can't change already available versions (because people have already agreed to the license and hence already have perfectly valid licenses to use it). no matter what they do, they can't kill linux that way.

    Patents are a possible angle of attack, but that'd be corporate suicide, even for microsoft. Large companies (including IBM i believe, among many others), have stated they will use their entire patent portfolio against any company that attacks open source software with patents (different companies do it to different levels, most of those companies have said they are protecting specific open source projects, not every open source project)

    (this is why software patents suck, not only are they stupid, when copyright provides adequate protection, it just brings in a cold war MAD situation among the large companies, and screws up the little projects/people/companies.)

  13. ahh, so thats the not operator. ty sparda, i shall remember this ;) i've been meaning to learn RegExp's for a while now.

    *edit* btw, is it just more or does it look like he is cleaning out a directory where he just dumped a crawl of a porn site? :P

  14. using cp *[1234567890a].jpg should get you all the files you want out of that list.

    it's a pattern matching command, it's basically asking for any file that ends in .jpg, as well as the character before that being in the approved list (enclosed in the square brackets)

    as long as none of your other files end in d or b, you should be fine making it something like

    cp *[1234567890acefghijklmnopqrstuvwxyz].jpg &lt;your destination directory&gt;

  15. hmm, that does make it a bit harder, i'll take a look round, see what i can find. i beleive what you're going to need though is a file copier which uses regular expressions, which i don't think cp supports.

  16. well, one way would be to use 3 commands per directory

    (this is presuming that the numbers are not of uniform length)

    cp picture?.jpg &lt;insert your destination folder here&gt;
    
    cp picture??.jpg &lt;insert your destination folder here&gt;
    
    cp picture???.jpg &lt;insert your destination folder here&gt;

    ? is a wild character similar to * except that it means that it can be replaced by any single character, not multiple characters.

    ofcourse, this task is made much easier if the numbers are of uniform length (eg, 3 characters such as 001)

    this could also be chucked in a script to automate each directory.

    my linux command line skills aren't the best though, so maybe there is a way to have multiple source files in the one command.

    **edit**

    just did some exploring, this should work for you

    cp picture?.jpg picture??.jpg picture???.jpg &lt;insert your destination folder here&gt;

  17. what I do is have a base and varables

    eg

    *****EKuyG

    the first two are radom letters and the next 3 numbers ... so since noone knows my real base all i do is in the pass hint put the varable

    except for one simple problem: now everyone knows this and has a very simple to crack 5 byte password. hell, that can be brute forced in no time.

  18. i'll get the program name off my brother (it'll take a few hours as he is out atm), but there is a program where you can script mouse movements. afaik it also records your movements. that'd be the easiest way for you to do it.

    it's possible to make a program to do that, however, i don't have time to write it atm.

×
×
  • Create New...