Jump to content

stingwray

Dedicated Members
  • Posts

    1,455
  • Joined

  • Last visited

Everything posted by stingwray

  1. There's no external memory on the iPhone, just the inbuilt stuff. As far as I know you can use the iPhone in disk mode like all iPods, but those files are only accessible from a computer it is connected to. I believe there is a ban on any file-management systems in the app store. This is why the iPhone hasn't worked in Japan because of its dependency on being used with a full computer.
  2. OpenBSD with OpenVPN of course, wouldn't have it any other way.
  3. Isn't there no file manager on the iPhone, making an application to encrypt files and access them pretty pointless, as no other application will be able to access the files. Isn't also any file manager banned by the AppStore? I remember reading somewhere about Apple coming up with some device encryption for corporate use, but haven't heard anything since. But the rule of thumb should be if its worth encrypting then it shouldn't be kept on the iPhone!
  4. Attendee List Perhaps if people start putting themselves into the 'Are you coming list' on the wiki we can get an idea of concrete numbers.
  5. I need the VPN anyway for when I was on external sites so really using it for wireless wasn't any trouble as it was all there. Just gave the firewall another port which only the AP network is attached to.
  6. That would be awesome, but probably would need booking soon to get the cheap tickets. Getting a block of seats would also be a problem. Who's sorting out the accommodation out for you lot?
  7. RADIUS only provides Authentication, Authorization and Accounting which is useful for some people, doesn't increase the security of the system generally, just gives a nicer way of administering the network. I use a Kerberos for Authentication and Authorization and VPN for encrypting the traffic. The VPN server sits on the private side of the network. To access that network you must go through the VPN, the network only permits VPN traffic through its firewall so the only method of compromise would be an exploit to the firewall or VPN server realistically. There are security systems that are impossible to hack electronically, you just take a wrench to someone with access to gain permissions. I think the argument that 99% of people don't know how to crack WEP is a very bad one, given that it is pretty trivial to do, doesn't require special equipment and the knowledge is very hard to find, realistically one one with a laptop within range could be an attacker. Just because people can't do it now, isn't a security measure, give them 5 minutes googling 'how to get into a passworded wifi network' and they'll probably be able to do it if they have half a brain.
  8. Wireless is perfectly secure, if yours isn't then your doing it wrong. For instance I have complete faith in my setup which doesn't even use WPA or WEP of any kind, I haven't bothered with that for along time because its too fussy on certain systems. *by 'perfectly secure' I mean that I mean 99.9% as we all no system is perfect, the most likely way someone is going to get access to my network that way is by taking a wrench to me.
  9. I've got a reader/writer I can bring.
  10. Well I was assuming that the chord would be parallel to the z-axis so that to make it into 3D you would just need to multiple by the z-axis difference value. If you want it so that the chord is at an angle so that the area at the top and bottom is different. Then that needs some serious thought.
  11. If you simplify to a circle rather than a cylinder then. 1. If you mark the cord, where it cross the the circumference draw lines into the center point. 2. Find the angle between the two lines which converge at the center point. 3. Work out the area of that section of the circle. 4. Now with those to lines you can form a triangle with the chord that cut it. 5. Find the area of this. 6. Minus the triangle area from the section of the circle area. You now have the area of the circle cut away from the cord, which you could minus from the whole area to get the area of the circle without the cord. Obvious for a cylinder you just need to put it back in 3D. Hope this helps and is what you wanted.
  12. Actually it is more like having a database storing all e-mails, phonecalls, text messages, social networking website information, browsing habits, physical movements, etc. Whether it is possibly or not is another question, but there has been a lot of information recently on how they are trying. You can't protest in front of the house of government without prior written permission and your not even allowed to take photographs of the authorities now. You have to have proof of identity when purchasing a new mobile phone even on a payg system, sounds like a real utopia to me.
  13. You really should stop going on about our "freedoms", if you want to take a look at what the British government is currently doing to privacy laws and freedoms, you'll understand that the grass really isn't much greener on the other side.
  14. I'm guessing its: 1835-3E73-OEM-x Where x >= 0 && x <= 99999999 Not many combinations to try.
  15. The Internet isn't a rite or a privilege really, given how it is made up. However connection to the internet, is a privilege and you should abide by the T&C. If you want to use the Book analogy, Books aren't a rite or a privilege, you get to privilege to read the book or borrow it from a library, bot of which have conditions. Breaking the law because the law is wrong is used by a lot of people and it offers absolutely no defense. Many things are illegal in countries that are really silly laws, including some in the USA, Europe etc. Cryptography laws have always been restrictive and especially to do with export, which is even more difficult to control with the Internet. Using the excuse about no one being prosecuted for breaking certain laws is a very bad one and I doubt that its the case that no one ever has. Also its also more likely to make the authorities make an example of you when they do catch you, as has been the case with the limited number of "hacking" trials. I think your best course of action would be to look for a different connection to the internet which is less restrictive.
  16. I don't know about Government satellite's but a lot of private satellites don't use any encryption at all! There are a number of papers out already on this.
  17. Before you do anything, check your conditions of use of the internet, if your behind a proxy which bans a lot of things, circumventing the proxy may be a breach of the T&C, at which point limited internet becomes a hell of a lot better than no internet at all. Also depending on your situation, it may in fact be illegal, wouldn't want you to end up in prison.
  18. Shall we move this forward now...?
  19. Dual Core Atom mini-ITX boards are great, stick 2GB of memory in and you get a great machine. For TV you might want to add a hardware encoder but it'll still work out cheaper and more power efficient.
  20. Seemed like a really crap bundle to me, nothing I want. If they are all like that they are just targeting people who will see the $600 off and buy it, no matter what.
  21. Eclipse or Netbeans, need a proper IDE for doing the work that I get into. If I want to be quick then i'll use Smultron just as a text editor.
  22. Can't wait until you have a problem with your phone/cable line.
  23. You need to alter your regex so that it allows spaces, something like: /[^a-zA-Z\s]/ Probably.
  24. stingwray

    BBC botnet

    Quite likely, but given that its the BBC, they have a lot of power and can get press attention, so the botnet herders are hardly going to want that. On your point about what botnet it was, it probably wasn't storm, as storm has been dead for a little while, unless the BBC started off its death. It was shown how to remove storm at the 25C3, but the developers weren't going to do it because of the legal implications, we all know how to call now, the Beeb!
  25. stingwray

    BBC botnet

    If you really want to get pedantic about it, the BBC didn't buy the botnet, they rented it. But people do buy and sell bots all the time, criminals occasionally need more money for things than they had previously estimated.
×
×
  • Create New...