Jump to content

DLSS

Dedicated Members
  • Posts

    994
  • Joined

  • Last visited

Posts posted by DLSS

  1. Maybe Flash based for storage to write only, but eventually it will become un usable because all Flash memory has only so many re-writes before they fail and become a paper weight. For all those people using them as xtra ram in Vista, eventually the devices will be of no use and you will lost the data. When used strictly as a read only media device after you backup a file or whatever, then I would say I would use it, but not for a Laptop or PC because you will at some point (sooner than conventional hard drives) need to replace it.

    With all the things I do on a PC I need something that I know will last a long time, and while hard drives do fail eventually, I think their lifespan is much longer than these Flash based hard drives.

    i have to agree with that , i mean i'm allready scared when i see all the flash based mp3 players seeing as they cost as much or more (incase of an ipod) then harddisk based ones and break faster, and i change the music on my portable player daily (well add to the list , modify files etc ....)

  2. why isn't half this ram working ?

    - (larger pic)

    -

    ---whyisnthalftheramworkinqg4.png---

    yeah this is a old box that was given to me and i'm now useing as a backup pc till my good one's fixed and i always though it only had 256mb ram but i just saw in cpu-z that it has 512MB but 2 different typse of ram , (that possibly aint compatible ?)

    i guess they are incompatible but if not why would half not working ? ...

  3. The UK is 18+ to buy alcohol in a bar unless your with your parents or something, and quite a few places seem to have door policy's that prevent entry to minors, despite the fact the can legally enter and just drink juice or soda.
    ye , belgian drinking age = 16 tho so i voted 16+

    not tht i care for myself cos by the time this is happening i'll allready be 18 ...

  4. yay!!! Hak5 returns to use ^_^. sorry no offence intended, but latly with the move and such it seems to have through Hak5 totaly off balance, the yeps were still informative, but sadly not... as entertaning?

    This ep is awsum! interviews were great, and the whole Ep flowed well :D

    Wess looks like a space monkey, even more in this ep though :S could be to do with the fact i watched FC again today as i do most Easters :P

    i have to agree , you're finally getting back to the level of the switchblade ep ...

    also wess looks a lot better again now :P

    he looked terrible in 2x07 , like he got out of bed with a hangover after a long night of booze&pillz

  5. (sorry if its been posted before)

    A DAY IN THE LIFE OF A LEET HAX0R

    by 0rin

    Part 1: A School Day

    ---------------------

    7:20am: Elite hax0r wakes up to prepare for another challenging day of 7th grade.

    7:25: Elite hax0r signs onto AOL (computer is never turned off)

    7:30: Elite hax0r checks new mail for elite hacking progs and warez

    7:40: After 10 minutes of chatting in with the folks in leet, elite hax0r's mom takes the telephone off the hook.

    7:55: m0m and elite hax0r are having an argument about wasted time online.

    8:00: elite hax0r's dad drops him off at Mitnick Middle School

    8:05: elite hax0r enters typing class. this is his elite hacking playground, and he loves to confuse the teacher by pressing num lock,

    and shouting '3y3 hax0red j00!!!'

    9:00: typing class is over, and elite hax0r travels to his history class. No 'puters here, so, he strategically places his copy of 2600

    inside his history book and memorizes the 'how to steal stuff' article.

    9:30: history teacher catches elite hax0r with the clandestine 2600 and takes it away from him. elite hax0r begins a

    heart-wrenching speel about freedom of speech, and his right as a citizen of this country to read his elite 2600 whenever he

    pleases. he compares this atrocity to the unjust imprisonment of hax0rs everywhere, and takes comfort in his martyrdom. leet is

    definitely hearing about this tonight.

    10:05: elite hax0r goes to english.

    10:50: elite hax0r goes to lunch period. here, he sits with his class in the cafeteria and takes his usual spot near the lunchlady's

    cashregister so he can write down people's lunch numbers. This comes in handy, as they could possibly use their lunch number as

    their AOL password. And if not, its always really leet to have even the most insignificant 1nph0z.

    11:25: elite hax0r goes to pre algebra. today, he makes the kid in the desk next to him ph33r when he types 1134 on the calculator

    and holds it upside down. he wonders if this is similar to hacking an LED sign like in 2600..?

    12:15: elite hax0r goes to science class where he learns about the reproductive system. elite hax0r excuses himself from class where

    he performs a quick wetware hack.

    1:30: elite hax0r gathers his books and stands in front of the school

    1:35: elite hax0r is picked up by the small yellow bus with the power lift on the back.

    2:00: elite hax0r is dropped off at home, and he rushes inside to sign on and check his mail.

    2:30: after 30 minutes online, elite hax0r is forced to sign off and take a nap. Ms. Hax0r cant have her baby getting cranky.

    4:45: elite hax0r wakes up, and begins writing his manifesto, which he plans to present to his history teacher tomorrow.

    4:47: elite hax0r gets tired of writing and feels like going outside. he and his little brother ride their bikes around in circles in the

    carport.

    5:15: Ms. Hax0r calls the children inside for dinner.

    6:00: hax0r children finish dinner, and elite hax0r asks for permission to get online and hack some stuff.

    6:05: elite hax0r battles AOL's perpetual busy signal; its probably just a ploy by AOL to block him from coming online, in ph33r he

    might hax0r their network.

    7:05: elite hax0r continues to hax0r away at AOL's "busy signal"

    7:30: finally, elite hax0r crax0rs the busy signal and sneaks his way inside. He checks his mail for leet progs and tries to enter pr

    'leet'. But, in another attempt by AOL to bring him down, the room is full (its really just their $3cur1ty 3xp3rt$ trying to keep him

    out).

    7:40: elite hax0r finally busts into 'leet' in 137 tries.

    he chats with his homies.

    8:00: elite hax0r is still chatting with the leets, when Ms. Hax0r picks up the fux0ring telephone and signs him offline.

    8:35: after 20 minutes of crax0ring the "busy signal", in an angered retalliation attempt, elite hax0r steals mom's credit cards and

    scrolls them in 'leet' and 'phreak'.

    9:00: elite hax0r finally finishes scrolling, and takes some time to work on his webpage;

    http://members.aol.com/Leethax0r/index.html.Here, he posts his new hax0r's manifesto, and lists $houtoutZ to his homies in 'leet'

    and 'punt', and his main chix0r Annie.

    10:00: after an hour of figuring out how to use the AOL webpage software, he grows tired of all this brain work, and signs offline.

    10:25: leet hax0r brushes his teeth,puts on his kevin mitnick pajamas, and goes to sleep.

    11:00: leet hax0r dreams that he is Dade Murphy, and that he is having wild sex0r with Acid Burn, while hacking the FBI's Main

    Gibson.

  6. Or you can download a known bootcd with a lot of apps, illegal though, starts with an H... ends in iren...

    Whats so illegal about it... I already have copies BTW.

    yeah, why is it illegal?

    cos a lot of tools are actually pay for (w4r3z) and shareware ...

  7. JavaScript botnet code escapes ShmooCon, leaks to Web

    Fast-typing attendee has a naive moment, and then Digg kicked in

    April 02, 2007 (IDG News Service) -- Software that could be used to turn a Web browser into an unwitting hacker's tool has been posted to the Internet, after it was downloaded by a quick-thinking attendee at last month's Shmoocon hacker conference.

    The software, called Jikto, was written by Billy Hoffman, lead researcher at Spy Dynamics Inc. Hoffman demonstrated the code on March 24 as part of a presentation on the dangers of JavaScript malware.

    Hoffman had discovered a way to write a Web vulnerability scanner in JavaScript, a Web language that can run in any browser. This technique circumvents JavaScript's security restrictions and, concerned that his Jikto code could be misused, Hoffman says he took extra steps to prevent the code from getting out.

    However, in order for his demonstration to work, he had to post the Jikto code somewhere on the Internet. "Very briefly you could see the original URL of where the Jikto code got fetched," Hoffman said.

    That was enough for show attendee Mike Schroll to snag a copy.

    "I was sitting pretty close to the front and had my laptop out already," said Schroll, an information security consultant at Security Management Partners Inc. "The second I saw it i just started typing away."

    Schroll posted the code on his Web site March 25, and submitted a link to the code on Digg.com. He removed the software several hours later at Hoffman's request.

    Schroll said he posted the code because he thought it would be useful to other security professionals looking for ways to illustrate just how dangerous a scripting attack can be. "I was pretty interested in it because we do some engagements with clients where we do fake phishing sites," he said. "I wasn't trying to be nefarious or malicious."

    The software was downloaded from his Web site about 100 times, Schroll said.

    Over the past weekend, the code surfaced again, this time on the Sla.ckers.org online discussion forum.

    With Jikto now public, security researchers worry it could be misused by criminals to scan internal networks for sensitive information, or to build a malicious botnet code. "This particular tool is designed to take control of the Web browser," said Jeremiah Grossman, chief technology officer at WhiteHat Security Inc. "It will crawl other Web sites and scan them, looking for vulnerabilities."

    Hoffman was sanguine about the release of his tool, saying that criminals would probably have been able to develop something similar to his short, 800-line application.

    "It's kind of a tragedy that this ended up getting released," Hoffman said. "But in reality the bad guys probably knew this and even if they didn't have it they were probably a couple of months away."

    He said he's not angry at Schroll for snagging and releasing the Jikto code. "He probably did what any curious individual would have done," Hoffman said. "I really can't fault someone for being curious because that's what my job is."

    article source : http://computerworld.com/action/article.do...p;intsrc=kc_top

  8. wow this software is a bitch wot a load of f*cked up shit !!!

    christ , WTF ?? , ....

    i cant get my head around this , your sys admin must really hate you guys,...

    if ours would do that i'd crash teh school server and while hey's fixing it strangle him with some cat5 tbh ....

  9. ok i'm cursed ...

    must be ..

    first my bios of my pmp doesnt continue booting ,

    now my pc hates me and seems to be posessed by the devil (and this time i dont mean bill gates)

    it wont load the bios , snd when i try n open the dvd drive it immediately closes again like its teasing me , mocking me ...

    and finally my spare pc decided it no longer likes the networkdrivers ....

    so i,m typing this on my wii , i just hope it wont fail me

    :cry:

    somebody get me a geeky exorcist :cry:

×
×
  • Create New...