Jump to content

stingwray

Dedicated Members
  • Posts

    1,455
  • Joined

  • Last visited

Everything posted by stingwray

  1. Once again metatron showing us how its really done.
  2. The only way you could accomplish at the moment is by making the second OS installation a VM and running it in the operating system which is decrypted first. But that leads to interesting ideas about virtualisation forensics. Much better option in my mind is just to use something read-only to store the OS, that way nothing can be written to the disk like log etc. Then if you need to save or load anything, just hide it else where, maybe a dual encrypted partition or online.
  3. The iFrame isn't going to receive any information though, definitely not with PHP. Also, few browsers actually specify referrals in reality, when I've been dealing with this I get very poor results. Finally, most people now don't click on links, they open them in new tabs, which don't have a back button and they simply close them when wanting to return.
  4. More so than this, educate your users about SSL given the latest MITM attack announced at Black Hat. Security is no good if the user doesn't know how or why to lock the door.
  5. Depends on what sort of car and image she is looking for as Audi and Lexus are very different. If she wants a hybrid then she'll have to get a Lexus, if she wants a convertible, then it's got to be an Audi. More information would be good.
  6. Sure, good luck with that, can't help you I'm afraid, 10.5 is running fine and that's the ways shes staying.
  7. And look, he's programming open source on a Mac! That's the worst kind of open source!
  8. My opinion on these sort of matters, like beta software, is just not to touch them. There beta for a reason, buggy, unreliable and have security flaws often. Experiencing this just ruins the impressions of the final product I think and also I don't agree with testing software for free for large companies like this. If they want me to do that, then they'll have to pay me.
  9. Why can't you wait until its actually released and save you all the trouble? Good things come to those who wait.
  10. I like to commit 'random hacking' and 'global crime' riding public transport using the free municipal wireless internet. It's awesome! However, free software is buggy, doesn't work and supports communism, not to mention insecure, so don't use it! Remember that next time you think about installing Linsux or downloading other open source stuffz from the tubes.
  11. It can't, PHP is server side only, you'll need a client-side technology like Javascript to perform encryption on the computer before sending to the sever.
  12. In a text file in my documents directory named passwords.txt And I'm not kidding either.
  13. I was refering to the fact they got hacked: Kaspersky Hacked I don't think they give you an option on the install to stop them getting hacked. Admittedly it is more of a problem for corporate users than personal.
  14. It might be an awesome all-in-one, but kaspersky has just given all your personal data away if you bought it through them or registered it with them.
  15. I think I've solved this problem, with key exchange using no asymmetric crypto and both user and server authenticating to each other. I'll post more a little later, as I'm just stamping out a POC and will upload it to my server for people to play with, as well as release the source. I've just got to verify somethings and increase the security a little more. EDIT: also to make this clear, I'm not guaranteeing this in anyway against to be equally as secure as SSL, and will be looking for feedback, but I believe it has promise.
  16. I'm with Spardal, I have avast installed to stop windows bitching me but it never runs. Best defense is not to be stupid about were you go on the internet and what you do. For instance, your worried about being shot when you go out, but you live in a nice enough area so thats ok, you don't go and put a bullet proof jacket on and go to the wrong side of town do you? Because something will get through, you simple don't go to the wrong side of town. Or if you need to, you take more than just a jacket.
  17. I believe that is done, folding@home has some support for GPGPU. Don't know what GPUs though.
  18. None. GPUs are highly parallel, something that is operating systems and the applications that they run are not. Because of having lots of core, each core is actually quite slow, but its the fact that you have lots of them that makes the card very fast. Also the cores are heavily specialized to certain mathematical calculations and memory access, generally OS and most applications don't make of this because they do lots of other things. Because of the complete different architecture, your only option if you were desperate to do this would be linux or bsd as you would need to make some serious changes to the kernel, then you would have to change any application so it could run on it as well. It'd also be really slow, so stick to your normal CPU, and keep your GPU rendering video or your games, this it is fast at.
  19. So if its not the case then, would you like to show us the research? Because when they announced this research it was pretty big stuff, so much so that we weren't even told what the talk was about until about an hour before, all we knew before was it was about attacking a piece of critical internet infrastructure and that Jacob said that it would be at the end of his presentation on the Cold-Boot attack.
  20. Given that hardly anyone upgrades their PC, making it future proof is not a top priority, also given the price of DDR2, you can max that out and spend about half what you would have had to pay for less DDR3 memory. The Phenom II does support DDR3, in its AM3 socket, which might I add, its backwards compatible with socket AM2+, given you lots of future proof and upgrade-ability if you want it, something Intel has never done. Also these always turn into fanboy threads, for the record, I like AMDs design, but Intel has a much better solution at the moment, especially with motherboard chipsets, whether they are there's or nVidia's.
  21. If you like at the side wall, you'll notice that there is a distinct change in the bricks used in its construction, with the fault line being in the middle. This is because the wall has been re-built at some point in its life (you can tell this because the fault line is vertical, changing bricks in construction would result in a horizontal line). The reason for being rebuilt is because the house probably has a foundation problem causing structural weakness, you need to actually build a house correctly, not just use good materials for it to be secure.
  22. This I seriously doubt, you require a citation.
  23. Well the fact that you call it an "Intel based mac" generally implies your working with an Apple computer, like a MacBook or MacBook Pro. At whatever rate, I really can't be arsed any more to help you, if you can't be bothered to write a decent question with lots of information your going to get crap answers.
  24. You have to use the table which is for that hash. You'll have to find out what hashing algorithm was used yourself.
  25. Looks to me like the house which has been destroyed was made of wood, and the two building made of brick are still standing.
×
×
  • Create New...