Jump to content

Forgotten

Active Members
  • Posts

    46
  • Joined

  • Last visited

Posts posted by Forgotten

  1. -----BEGIN PGP SIGNED MESSAGE-----

    Hash: SHA1

    As the topic goes: Am I able to digitally sign my email to verify my authenticity? Especially in gmail?

    I am still learning the PGP concept, but my public key block is now on the MIT keyserver as well as http://www.c3studios.ca/pubkey.asc on my website. Now, if I want to send an email and sign it.. How do I go about doing that? (I also have my private key... dur)

    I am using WinPT (aka GPG for windows).

    Thanks everyone!

    [EDIT] Hey all! I was able to figure it out. A great extension called FireGPG seamlessly intergrates itsself into the Gmail interface providing all of my signing, crypting, verifying, decrypting needs! It works with WinPT and/or GPG to provide a nice easy service.

    Check it out:

    http://firegpg.tuxfamily.org/

    http://www.chuckcaplan.com/blog/archives/2...ox_gmail_a.html (Tutorial)

    Needless to say that it all works on Windows, Mac OSX, and Linux... In fact, I'm signing this message! My public key is at http://www.c3studios.ca/pubkey.asc

    -----BEGIN PGP SIGNATURE-----

    Version: GnuPG v1.2.1 (MingW32)

    Comment: http://firegpg.tuxfamily.org

    iD8DBQFHHByg8547IonQybMRAiXHAJ9wEDCE+YJdeA9deniOMSopfy5iMgCdGixj

    Vj5A3ypBuRjR5ecDaXucYT8=

    =MZHK

    -----END PGP SIGNATURE-----

  2. Sorry, I was a little tired.

    At this point in time, the script cannot open the log, make the data a variable. So when the if(@data) statement is made, it won't continue the script. Again, being tired I forgot the write the line that will replace the line with nothing, then chomp()... I believe that will work?

  3. Hey guys,

    This script isn't really meant to be run from a site but rather from the command line/shell/terminal.

    I really don't know much about perl at all and I wrote this script by researching and looking at other perl scripts.

    This script is meant to perform housecleaning on a log: it opens the log, removes every line containing an ip, and the tells you how many lines were removed. The trouble is that the script breaks and I have no clue what to do.

    #!/usr/bin/perl -w
    
    use strict;
    
    my $path = "/var/log/httpd/access_log";
    my $ip = "127.0.0.1";
    
    # Call subroutine
    remove($path,$ip);
    
    # Define remove subroutine
    sub remove {
        # Fix input variables
        my($log,$uip) = @_; 
        # Check for valid path
        if (-e $log) {
            # Open log and turn contents into variable
            open(DATA, "<$log") or die "[-] Error: Logfile could not be opened: $!n";
            my @data = <DATA>;
            close(DATA);
            # Declare status variables
            my $found = 0;
            my $count = 0;
            # Check if data exists
            if(@data) {
                # Run script for every line in $path
                foreach my $line (@data) {
                    # For every line that contains the IP
                    if($line =~m/$uip/) {
                        open(LOG, ">$log") or die "[-] Error: Logfile could not be opened: $!n";
                        chomp($line) or die "[-] Error: Logfile could not be written to: $!n";
                        close(LOG);
                        # Set find status to found
                        $found = 1;
                        # Increase number of IPs
                        $count++;
                    }
                }
                # No lines containing IP regex found
                if (!$found) {
                    print "[-] $uip was not found in the logfile. Rest easy!n";
                } else {
                    print "[-] Log edit success! Removed $count instances of $uipn";
                }
            } else {
                print "[-] Error: Data error?n";
            }
        } else {
            print "[-] Error: $log does not exist or you have incorrect permissionsn";
        }
    }

  4. Ahh Counter-Strike: Source, the game I own but have no skill at playing. I'm all for it, but I also agree with the idea of a RTS as a side project.

    I can totally see a Starcraft Private Server being put up full of original and UMS games! :-)

  5. *Was on vacation*

    Yes, it seems that I will wait for the service pack, but with a recent wipe of the harddrive (Dual-booted Mac OS X), I am left with a very plain vanilla XP. I am not bothering to install anything that I usually have because I know I will nix the harddrive again.

    Good thing for my backups!

    A lot of magazines seem to be showing off some rather impressive features of the new vista. Apparently there is a program within windows that monitors and gives a detailed analysis of its stability. Its features like these that make me want to switch. But I am a bit of a gamer, and therefore wary of the slowdowns I may experience, especially since I am on a laptop.

    DirectX 10, as I've been told, is a great leap ahead but with a drawback: GFX support (Leave it to microsoft for legacy systems). Apparently in order for DX10 to preform at its best you need a gpu that supports its new way of processing threads. Hopefully my "Vista Compatible" laptop with a fairly new nVidia graphics card will accept the new DX10.

    Any final pieces of information I should know about?

  6. I have a friend who works at a business and has obtained a spare legal copy of vista for me. It sounds promising but I worry on what vista will take away that XP offers.

    I use lots of programs that are pretty specific and I like being able to tweak my computer to my liking. Will vista take away from that experience?

    And what of compatibility? What are the odds my nVidia, Intel Pro Wireless, and various other hardwares will work / have working drivers available? I have heard Vista is a bit of a nuisance when it comes to that.

    Will its new naming system break installs for certain programs? And has Microsoft locked up some tweak-able features?

    My final question is, should I switch to vista? I have the time, requirements, but no knowledge if it is a wise choice.

    Thank you.

  7. I have a SHOUTcast server at the ready, and I wish to relay another video stream.

    Normally I would set the configuration to reflect

    ; RelayPort and RelayServer specify that you want to be a relay server.
    
    ; Relay servers act as clients to another server, and rebroadcast.
    
    ; Set RelayPort to 0, RelayServer to empty, or just leave these commented
    
    ; out to disable relay mode.
    
    RelayPort=8000
    
    RelayServer=http://example.com

    but it appears that I cannot get it to work... I get this lovely verbose with my server up:

    Event log:
    
    <02/03/07@14:06:14> [SHOUTcast] DNAS/win32 v1.9.7 (Jun 23 2006) starting up...
    
    <02/03/07@14:06:14> [main] loaded config from C:Program FilesSHOUTcastsc_serv.ini
    
    <02/03/07@14:06:14> [main] initializing (usermax:3 portbase:8000)...
    
    <02/03/07@14:06:14> [main] No ban file found (sc_serv.ban)
    
    <02/03/07@14:06:14> [main] No rip file found (sc_serv.rip)
    
    <02/03/07@14:06:14> [main] relay thread starting
    
    <02/03/07@14:06:14> [main] opening client socket
    
    <02/03/07@14:06:14> [source] creating relay socket
    
    <02/03/07@14:06:14> [source] resolving relay host
    
    <02/03/07@14:06:14> [main] Client Stream thread [0] starting
    
    <02/03/07@14:06:14> [main] client main thread starting
    
    <02/03/07@14:06:14> [source] error resolving relay host [waiting 30s]
    
    <02/03/07@14:06:44> [source] error connecting to relay host [waiting 30s]

    Any idea what I am doing wrong? I wish to do this so perhaps I will be able to relay the Hak.5 Live shows for those who cannot see it.

  8. you could get the lock picking kit for the loks o the machines, wait untill no noe is around, and pick the machine.

    Once you get access to the inside, you can program it to lower prices if you enter in a code. Its been done.

  9. Or if you wish to just restrict them to X amount of bandwidth per day, and if you have a Linksys Router... I've got a solution for you. Its called DD-WRT, a linux-based firmware that turns your crappy linksys wrt54g, gs, etc. into a magical WiFi administration system.

    Yay! Oh and, the point is, is that the QoS on the DD-WRT firmware will restrict your neighbours to happy bandwidth limits.

    http://www.dd-wrt.com/dd-wrtv2/index.php

    Unfortunately, i dont have Linksys router, however your idea sounds rely good, and usefull in so many ways. I might think about buying one.

    Thanks alot for the suggestion :D

    Hold on there sparky. The reason why this linux firmware was created for the Linksys router is because linksys fucked up royally. The WRT54G v5 is the worst make of their routers (which are none too impressive) and they cost just as much as the next company's router.

    If you want to do it my way, I suggest buying the WRT54G v2 from eBay and then putting the DD-WRT on it.

    Shame, ain't it?

  10. Or if you wish to just restrict them to X amount of bandwidth per day, and if you have a Linksys Router... I've got a solution for you. Its called DD-WRT, a linux-based firmware that turns your crappy linksys wrt54g, gs, etc. into a magical WiFi administration system.

    Yay! Oh and, the point is, is that the QoS on the DD-WRT firmware will restrict your neighbours to happy bandwidth limits.

    http://www.dd-wrt.com/dd-wrtv2/index.php

  11. Well once you've gotten LAMP for your Server2003, or the whole schibang for Linux, you officially have a website.

    Next is to open ports. I suggest www.portforward.com and look for "HTTP" after choosing your router. Also, once your tracker is online, to port forward that too. Or if you're lazy and like viruses you can give your machine a DMZ.

    Tracker Software: http://tinyurl.com/2u5dcz

    or some of the original documentation:

    http://www.bittorrent.com/guide.html

  12. Oh these machines cannot be duped with fake money...

    They scan for weight, size, shape, composition of metals, density. And we all know paper money is on another level.

    Best way is to do a steak out and see if the stock-boy uses the password interface instead of a key...

    A smart person would literally hack the coin slot and splices wires till it goes boom or actually gives you credit.

  13. Or if you happen to have a linux server handy, just ssh tunnel to it with putty.

    stunnel.bat

    putty -D 8080 -P 22 -ssh ssh.example.com

    Set your WoW client to proxy SOCKS4/5 127.0.0.1:8080

    That lets you play WoW through your server computer. Also, if you don't have a linux server, you can get OpenSSH for windows and change that URL to your home ip or no-ip or whatever.

  14. THat's where I got the code the first time for the go.cmd.

    How do i link them together?

    Do I need a blank line inbetween or does one just flow into the next?

    With the payload 1.1 all i can get is the system info, and i noticed in the WIPCMD where the go.cmd file is there are the programs that the code is for in the go.cmd file.

    DO I need the code and the individual programs?

    IS there a certain order?

    ~Thanks for all your help.~

    You can add them any way you want, the go.cmd doesn't care if you have them right next to each other or 50 lines down.. No particular order.

    All files you download go in the /WIP/CMD

×
×
  • Create New...