Jump to content

IOSys

Active Members
  • Posts

    169
  • Joined

  • Last visited

Posts posted by IOSys

  1. They didn't deem jailbreaking legal, they deemed that jailbreaking doesn't violate the DMCA.

    It still violates shrinkwrap/clickwrap agreements and your warranty, and jailbreakers don't get a get-out-of-jail-free card (no pun intended) for jailbreakers.

    You need to figure out how to jailbreak your phone yourself :P

    Uhm... Since jailbraking isn't hacking, the tools needed are not "hacker-tools",

    they are tools that serve a legitimate (and legal) purpose .

    And it doesn't even matter if you use the word "hack" in it's true meaning or the media-meaning ("hack" = "crime") :)

    I'm looking forward to rock-boxing my wrong-generation iPod Classic ( It was a prize ) and then use it ..

    Since there is no way in Hell I'll instal iTunes it just collects dust somewhere atm .

  2. Scytheon3, thanks for this, I'll take a look and let you know. I have needed a solution "like" this, but pretty much have been to lazy to bother looking at and working out TrueCrypt

    Then don't bother using it .

    Using apps like truecrypt without understanding what they do and how only leads to a false sense of security .

    Besides, "being to lazy to bother" is a noobish attitude ..

    But go ahead and download this little password-entry GUI with no source-code from a unknown guy with 10 posts ..

  3. Cracker please, everyone knows the word hacker can mean good or bad things these days.

    No it can't .

    Just because the media and the skiddies confuse the terms it doesn't make hackers crackers or vice versa .

    And file-sharers aren't "pirates", despite what the media (and even the most juvenile file-sharers) want

    you to believe .. "Piracy is a war-like act committed by private parties (not affiliated with any government) that engage in acts of robbery and/or criminal violence at sea" ..

    Words actually have defined meanings and the words you choose to use influence peoples perception of the issue.

  4. If you really want to learn Linux, Gentoo isn't a bad distro to choose..

    True, it is not as easy as Ubuntu.. and that's exactly why it's a great place to start learning Linux ..

    CentOS and FreeBSD are nice, but I can't be arsed to learn them when Ubuntu works what I want to do.

    Now that's the spirit of a true hacker [/s]

  5. Why let the hackers have the advantage?

    As professional cryptologists and reverse engineers, we are not on their side.

    :wacko:

    So, a bunch of crackers, who claim to be "professional cryptologists and reverse engineers"

    CRACK a programs encryption-implementation (a clearly ILLEGAL thing to do btw )

    and then start talking bad about "hackers" ?

    I smell commercial bullshit !

  6. Uhm.. Guess why it's called "whole disk encryption" ??

    You can either encrypt individual partitions or you can encrypt the entire device .

    In either case, ALL space of the volume is encrypted .

    (yes, pgp can also create file-hosted volumes but you can't stuff your OS inside a file and still be able to boot)

    When you encrypt a storage-volume it is filled entirely with randomly-looking garbage,

    ie overwritten once .

    Despite what NIST, The US Military etc etc could make you believe,

    there are no documented examples of ANY data being recovered from a HDD that has been fully overwritten once .

    Ever ..

    Despite this fact, you may be required to sanitize the disk in accordance with Federal guidelines anyway,

    and depending on the nature of your operation and the data you store, you may even be required to have proof

    that the disk was sanitized ..

  7. Theses numbers are from Samsungs own data-sheets, you can find the sheets

    with Google by searching for the part-# :

    SLC : Samsung OneNAND KFW4G16Q2M rated@ 100k erase-cycles

    MLC : Samsung K9G8G08U0M rated@ 5-10k erase cycles

    This is quite good for anyone wanting to know a bit more :

    "Western Digital White Paper describing calculation and effects of SSD endurance"

    http://www.wdc.com/WDProducts/SSD/whitepapers/en/NAND_Evolution_0812.pdf

  8. All flash drives, including the links to the ones I posted as well as the traditional USB plug in flash drives are SSDs.

    Absolutely, windblows will treat them like any other HDD, allowing you to install and boot windblows from them .

    A "normal" flash-drive won't let you do that because it behaves like "removable media" instead of a "fixed" or "local"

    HDD .. However, most flash-drives can be made to appear as a "Fixed" HDD, using their "Mass-Production Tool"

    The main difference between "normal", relatively cheap, flash-drives and these small "Disk-on-Module" (DoM)

    devices is that almost all DoM's use Single Level Cell (SLC) NAND-RAM, giving you at least 10x more erase-cycles ..

    MLC-flash is usually rated at 10k erase-cycles pr cell, as opposed to the guaranteed minimum of 100k erase-cycles for SLC-NAND-RAM. You can also get DoM's that will fit into a IDE-slot on your MoBo and there are also SATA-versions available ..

  9. http://www.memorydepot.com/details.asp?id=DOM2GUSB

    The reason they are so expensive ?

    Well, they aren't that much more expensive if you compare the price to other, physically much larger, SLC-flash-drives .

    ( As is usually the case, "miniature" does cost a bit extra ..)

    Just an example, the "OCZ Rally 2 Turbo High Performance 8GB USB2.0 Dual Channel Flash Memory Drive"

    will cost you about 120$ ..

  10. lol not quite. Most flash drives can also be written to... that's usually what their intended purpose is.

    That's not what he meant , he means you can't modify the firmware of the controller ..

    .. but that's only because it's closed-source .

    (You can modify certain pre-defined variables in the firmware with the controllers mass-production tool)

    As there is no real processor to do anything on it

    There is a processor, some of those flash-controllers have modified

    ARM-CPU's (or whatever we should call those things :) ) embedded,

    others use in-house designs, but they do have a processor .

  11. DD-WRT is a rip-off, use the one it's stolen from instead ..

    (Still won't work on DIR-655)

    http://openwrt.org/

    Check this out :

    http://www.ebox-platform.com/

    Not exactly a "router-distro", this has EVERYTHING :

    IMAP-server, NAS, SAMBA, BIND, openVPN etc etc .

    Uses Ubuntu server-distro with web-administration (firefox included), runs on x86 CPU's ..

    See the full feature-list here : http://trac.ebox-platform.com/wiki/Features

  12. This thread is for posting info on devices that might be fun

    to hack ..

    My first candidate is : Yoggie Open-Firewall SOHO

    http://www.yoggie.com/Open-Firewall-SOHO

    post-3222-1276201192_thumb.jpg

    post-3222-1276200622_thumb.jpg

    Main specs :

    * Intel PXA270 642MHz CPU (Xscale)

    * 128Mb SDRAM

    * 128Mb Flash

    * SD slot (supports SDIO)

    * 4Mb secured flash

    * 2 10/100 Ethernet ports (!!)

    * USB OTG (on-the-go) (!!)

    * SSH shell-access

    Image of the board :

    post-3222-1276199667_thumb.jpg

    The SD-slot and RJ45 connectors should give you an idea of how tiny this thing is .

    A small review available here :

    http://www.raiden.net/articles/hardware_re..._soho_firewall/

    There's a kit containing the "Yoggie Open-SOHO", a Debug-board and a SDK available for US$ 105 :

    http://www.yoggie.com/e-store/product_info.php?cPath=23&products_id=65

    People like us should probably buy that as it allows us to "unbrick" the device in case anything goes wrong :)

    Things to do with this :

    Pretty much anything, this is a mini-computer capable of running linux !

  13. UbicomĀ® Announces OpenWRT Compliant Router Platform

    Industry's leading open source router now runs on the world's most efficient multi-processor platform

    http://www.ubicom.com/company/news_events.php?pressid=1

    Unfortunately only for the IP7100-processor or higher, the DIR 655 uses a 5000-series processor :(

    It's really a shame, there's so much more the 655 could do, like openVPN, NAS over USB-port .....

    This is the best router-distro I've come across, it has almost everything :

    http://www.zeroshell.net/eng/

    My box is an old pentium with 512MB RAM and 2 giga-NIC's, works great .

    There are also special versions for certain router-boards :

    http://www.zeroshell.net/eng/hw/

  14. You have successfully blocked the tracker-communications and DHT .

    However, the actual data-exchange is "encrypted" if the client is set up to require encrypted transport .

    Bit-torrent uses 2 flavours of RC4-"encryption" :

    "Plain" where only the packet-header is encrypted and "Full" (sometimes just called "RC4" in the client )

    where the entire packet is encrypted. On top, many torrent-clients are switching from TCP to UDP for the peer-"connection" . And inside those encrypted packets you also have "PEX" running .

    "Peer EXchange" lets clients share info about peers directly with each other ...

    So, there's a good chance the unknown encrypted packets you see ARE bit-torrent .

    Even Sandvine can't reliably block bit-torrent .

    PS : I still don't get why they run torrents over TOR, just browsing over it is a royal PITA ..

    And who trusts a system made by the US Navy and MIT anyways ?

    I realise it's probably a lost cause but it would be a lot better to try and educate people about why using TOR for torrents is a real bad idea. The least dumb will probably understand this :

    https://blog.torproject.org/blog/bittorrent...-isnt-good-idea

×
×
  • Create New...