-
Posts
7,832 -
Joined
-
Last visited
-
Days Won
9
Posts posted by Sparda
-
-
-
VaKo, have you gone mad? He's talking about FC5 (Fedora Core 5!).
nope, i'm stoned and i thought... well... fuck knows what i thought... sorry, you can start the beating now...
Now it makes more sence ^^
-
Let me correct your gramma a little ^^
Hey all you forum whores, my Internet connection SUCKS! I have about 10kbps at max plus a sucky neighbor with T1 and he has wireless. well... he has it WAD (Do you mean WPA?) encypted, is their such a program which will let me crack it? and hack on it (wtf?!). Please Respond!
Much better, but some bits plain don't make sence.
-
VaKo, have you gone mad? He's talking about FC5 (Fedora Core 5!).
-
I'm looking for some gaming grade headsets basicly, but they will probably be used for VoIP (out side games) aswell.
-
"I have the correct boot order in the BIOS."
What exacly is this "correct" boot order?
Is it:
1st: Floppy
2nd: Hard Disk
3rd: USB Flash memory
4th: network
?
-
Ye, other things, like any free to ditrabute software that you show cased, would be cool.
-
For the last week or so i'v been looking for a good headset, looked in my local Dixsons and the best they had where not very good (and had some kind of Skype logo/warning on them), I'm looking for a high quality headset (with microphone), prefrably some thing under £50 (86.82 US$), what do you surgest?
-
[nit picking]
scr's are executable files, if you rename any .exe to .scr, it will still work fine.
[/nit picking]
-
Im tired of microsoft and there bullshit, my uber pc is almost done and the os will be Kn0ppiX well actually knoppix v4.0 and i will also run xenopix 3.0 SO YEAH LINUX FOR LIFE
0|||y 73|-| |337 Us3 |1||Ux
Lovley, I wish you all the best.
-
Putting it in my signiture is almost automated spam, How would you make a link atractive?
-
As some of you may noticed I have a evil signiture, witch toys with peoples emotions by saying not to click it, but they click it any way, and they get owned (muhahaha), what is the best way to get lots of people to click a link? (this is often the easist way of braking into a computer system, and so is related to the whole hacking theme)
Note: You can track the ownage here: http://sparda.hopto.org/file.txt
-
what does it do btw?
It owns you ^^
-
*Owned*
Your number 33
-
no, it just sounds like some thing I would say.
-
What I don't get is why everyone is against the Inland Lake Yachting Association? I mean if you look at there web page (www.ilya.org) they seem like decent enough people.
That seems like some thing I would say...
-
Norton is not the best, it's ok, but anoying. I personaly use AntiVir Personal edition, it's free and doesn't have anoy anoyingness about it, well, not nearly as much as Norton. http://www.free-av.com/
-
<offtopic> What is up with .NET? <rant> I mean, I had to write a VB .NET program to work with an Access database, and not only is it stupidly slow at doing any thing with the database, the programing involved is so unesserily complex for a program of it's type. I would have much rather writen it in PHP, since the senario we had to make it for use over a network any way it makes so much more sence!</rant></offtopic>
-
Insted of host file, edit that file i can't remerb of the name of that is for IP and trafic farwarding.
-
80.3.160.13 - 1st - Owned ^^
-
Couldn't you edit the hosts file of the server so that it's own IP address points to another IP address some where else (asuming packets don't say they are from 127.0.0.1), so that when the ping requests comin, the server insted of trying to send a replie to it's self it sends it some where else, prefrably to a specific computer on the LAN so that 1. It doesn't hog any more internet band width 2. the server doesn't waste time trying to send the packets to an address that does not exsist, but I see no way for you to stop packets to be claiming to be from another IP address that is not it's own.
-
I'm intregued, and want to hear/read more!
-
This is almost off topic...
Who here dosn't have NoScript installed?
Firefox + NoScript = about as secure a web browser can get. I say this becasue that exploit makes use of JavaScript.
-
probalby the easist way to get access to the file is to use some kind of hardware keylogger, at least thats what i would have done, braking in to a system isn't just related to software stuff, if the hardware is comprimised, you may as well have no software security at all.
Help me quit smoking with technolust...
in Hak5
Posted
Set up some thing that requiers constant monitoring for some thing, and then, don't move.