Jump to content

ki4jgt

Active Members
  • Posts

    46
  • Joined

  • Last visited

  • Days Won

    2

Everything posted by ki4jgt

  1. How can Anonymous have a website, and not be able to be tracked? EDIT: NM, LOL, I thought you were saying that Anonymous had a public forum :-)
  2. I agree. They're mostly a bunch of kids. Half of them don't know what they're doing, but it would be great, if we could show them the benefits of a legal society. Most of them are simply retaliating and wanting to war. I'll join and help in this, but only if we get to make those cool youtube videos, like they do :-) Nothing like a lil truth to show people that their fighting for the wrong team, then they get mad and go attack the other team. I think that should be the point you tell them to just be patient. Anon will all get caught sooner or later (at least the groups of it who are doing illegal stuff.) Good idea trying to convert the "Pawns" to our side though. They often use the idea that in the civil rights movement, people sat in lunch counters and denied other people service. What they forget to mention, is that the people who did, did it with full facial disclosure. Hmmm. . . Let me see. . . Who was it that covered their faces again :-) Don't get me wrong, there are times, when anonymous is needed. It's in these times when a person or group are being persecuted, that they put out ideas. They don't do actions anonymously, and anyone who does do an action anonymously is usually up to no good. It also bothers me, that these kids, think they're making decisions, FOR US ALL, as stated by one of their videos, BUT, THEY FAIL TO CONSULT US ALL. You may use any of this in your mission statement. I give you full permission. EDIT: the video you posted was the one I was talking about :-) nice.
  3. :We always said you were the cute one.:I thought I was the cute one:No, you're the fat stupid one with the big mouthGotta love the Hunchback of Notre Dame :-)

  4. Watching Hunchback of Notre Dame

  5. Happy Birthday Cody Russ Sierra Lamb

  6. Just got stung by a wasp :-( Time to bring out the hornet spray. Sorry wasp, but it's you or me.

  7. Recording a hypnosis track. Anyone interested in hearing once finished?

  8. Anyone else want a video of sun rise on their birthday?

  9. 12 pokes 8-| I love you people :-)

  10. I'll give you your first strategy. However, your second is a little off. The protocol strips the email down to ONLY sending address, receiving address, and a small amount of the token (in case multiple emails have been sent). The verification server is it's own variable. It doesn't connect automatically to the server at the end of the sending address. The thing behind this is that it will give away the IP of the hacker.
  11. Sure. . . :-) The token is a 10 character alphanumeric string randomly generated by the sending server and attached to the message, the receiving server then strips the token from the message and sends the two emails involved with the message. If the sending server sends the same token back, the message is verified and NO SPOOFING. The protocol is setup with a variable for a verification server, so the server could be anywhere on the web you wish. EDIT: I believe the document refers to it as a key. I changed it over to a token the night before last.
  12. Jacob Lee Williamson James Williams Nathaniel Williams Happy Birthday Wait?? James and Nathaniel have the same birthday? That's really cool :-) Nick Gaskey Zach Wimpey

  13. Dey hav no managers an hav no1 2 tlk 2. Dey mus stnd on deir feet all day long an no1 evn relizes dat dey're dere. U jus go n 4 2 minuts pay 4 wat u want an leave. If dey were 2 set a fire rite n da mddl of minit mart an start doin indian dances aron it I dout any1 wod notice dem. Sur, dey say Hav a nice day but Im not sur if dey men it at all I no I wudn't

  14. You only get life once. Don't throw it away by allowing other people to press your buttons. God will confront them when he's ready.

  15. As of current, the protocol eliminates email spoofing, using tokens. This is why I introduced this protocol here and a few other places. It successfully eliminates spoofing. I have made it open sourced with modular variables for email messages. But seriously, I'm just doing it for the intellectual exercise of it all. The protocol does work on IPv4 and IPv6. As for the SPAM thing, It gets email spoofing right out, with a little creativity, I'm sure something can be done.
  16. Just wrote my own email protocol: It's incompatible with any other protocol. Have any suggestions? I know this is reinventing the wheel, but I'm wanting an open protocol, which is why I created this one. http://sourceforge.net/projects/smashindex/files/E3%20Protocol/E3%20Protocol.txt/download It's a txt file.
  17. Just wrote one of the most exhausting computer protocols in all history :-( I now have an email protocol to end email spoofing. Anyone want to help?

  18. So, I came up with this a while back. If someone installed Debian on the Zipit Z2, and then Tor, and then ran a VPN as a hidden Tor service, placed this in range of an open wifi system or in range of a (Hacked) password protected setup, what would the router's defenses be? Could the person have untracable access to the network with just a cheap distant computer which was connected to the Hidden Tor VPN? That being said, if hidden, the Zipit would be almost impossible to find, due to it's small size and the fact that it's available online for $15 kind of makes it a nice little spy toy, that is, if it works. :-) Back to the original question, will it work?
  19. Hey guys, has anyone got rootnexus running on the Zipit Z2 recently? I've been recently attempting it. But each time, I failed. I've been looking online for a tutorial for installing it but all I can find is Aliosa's, so without further delay, here's what I did. - Used the flash script with the zimage renamed to kernal.bin from aliosa's site (OpenZipit shows when the device is booted) - Now I've used dd to install rootnexus' image to the card (2 gb card). When I finished dding the card, it instantly becomes unreadable by my machine with another partition. When I insert this into the Zipit, it get stuck on the openzipit screen and doesn't boot. Does anyone have a decent tutorial for this? All help is appreciated. Thanks
  20. Hey guys, I was wondering if Userland was installed to the Micro Card or if it was flashed to the Z2. Thanks.
×
×
  • Create New...