Jump to content

stingwray

Dedicated Members
  • Posts

    1,455
  • Joined

  • Last visited

Posts posted by stingwray

  1. Does the iphone take external memory, sd cards or such? If so, I imagine you could encrypt files to store on there, but you would probably have to write an app to do it. Like stingwray said, if there is no local storage, what good is encrypting a file? I don't have nor ever used an iPhone, so just asking.

    There's no external memory on the iPhone, just the inbuilt stuff. As far as I know you can use the iPhone in disk mode like all iPods, but those files are only accessible from a computer it is connected to. I believe there is a ban on any file-management systems in the app store.

    This is why the iPhone hasn't worked in Japan because of its dependency on being used with a full computer.

  2. Ah nice one Rayman,

    Out of curiosity what o.s are you running your VPN on? you just using a windows xp machine, windows 2k server or something? Reason I ask is I am considering rigging something like this up myself. I was previously just using windows xp pro for VPNing on my desktop but I now currently have access to a server that I was considering using.

    OpenBSD with OpenVPN of course, wouldn't have it any other way.

  3. does anyone know an alternative for truecrypt on iphone?

    (or any solution for file encryption)

    thanks..

    Isn't there no file manager on the iPhone, making an application to encrypt files and access them pretty pointless, as no other application will be able to access the files. Isn't also any file manager banned by the AppStore?

    I remember reading somewhere about Apple coming up with some device encryption for corporate use, but haven't heard anything since.

    But the rule of thumb should be if its worth encrypting then it shouldn't be kept on the iPhone!

  4. Damn stingray VPN implamentation just to use a wireless connection is pretty hardcore for home use. I am guessing you deal with important data when it comes to work related stuff, either that or you are one avid computer enthusiast.

    I need the VPN anyway for when I was on external sites so really using it for wireless wasn't any trouble as it was all there. Just gave the firewall another port which only the AP network is attached to.

  5. It is expensive but this would be a good Saturday night treat - Derren Brown

    That would be awesome, but probably would need booking soon to get the cheap tickets.

    Getting a block of seats would also be a problem.

    Who's sorting out the accommodation out for you lot?

  6. What do you use then? RADIUS?

    RADIUS only provides Authentication, Authorization and Accounting which is useful for some people, doesn't increase the security of the system generally, just gives a nicer way of administering the network.

    I use a Kerberos for Authentication and Authorization and VPN for encrypting the traffic. The VPN server sits on the private side of the network. To access that network you must go through the VPN, the network only permits VPN traffic through its firewall so the only method of compromise would be an exploit to the firewall or VPN server realistically.

    Mine is "Wireless WPA" but only because i need to have wep for cracking and i dont want someone else thinking its wep

    on the subject of security every wireless network can be cracked but its a matter of risks vs hasstle. If your paro and think the world is out to get you then do have a wifi network. but if you know that 99% of people cant crack wep let alone wpa so you should be sweet with a simple password. ;)

    There are security systems that are impossible to hack electronically, you just take a wrench to someone with access to gain permissions.

    I think the argument that 99% of people don't know how to crack WEP is a very bad one, given that it is pretty trivial to do, doesn't require special equipment and the knowledge is very hard to find, realistically one one with a laptop within range could be an attacker. Just because people can't do it now, isn't a security measure, give them 5 minutes googling 'how to get into a passworded wifi network' and they'll probably be able to do it if they have half a brain.

  7. I don't use wireless for my network. Its not secure. But I do notice lots of other peoples SSID's in my neighborhood... ;)

    Wireless is perfectly secure, if yours isn't then your doing it wrong.

    For instance I have complete faith in my setup which doesn't even use WPA or WEP of any kind, I haven't bothered with that for along time because its too fussy on certain systems.

    *by 'perfectly secure' I mean that I mean 99.9% as we all no system is perfect, the most likely way someone is going to get access to my network that way is by taking a wrench to me.

  8. Anyone got any RFID stuff they can bring for me to play with? It is a technology I'd like to explore but have nothing around me that uses RFID so can't really justify getting the kit just so I can read and write the dummy chips that come with the package.

    I've got a reader/writer I can bring.

  9. Yes yes, this is a perfect representation. How, exactly do I find the volume of either piece (as divided by the pink line) without necessarily having the rest. I think I tried integrating infinitely many of those rectangles created by the cylinder (from the bottom to the top, as if it was lying on its side horizontally, not circle base to circle top) but my equation must have been wrong. If it was right, the answer would have been the same as $\pi$r^2*h, but it wasn't.

    Stringwray's suggestions were helpful in finding the area of that chunk, but I couldn't figure out how to translate into 3D.

    EDIT: Yes, only cylinders for now.

    Well I was assuming that the chord would be parallel to the z-axis so that to make it into 3D you would just need to multiple by the z-axis difference value.

    If you want it so that the chord is at an angle so that the area at the top and bottom is different. Then that needs some serious thought.

  10. If you simplify to a circle rather than a cylinder then.

    1. If you mark the cord, where it cross the the circumference draw lines into the center point.

    2. Find the angle between the two lines which converge at the center point.

    3. Work out the area of that section of the circle.

    4. Now with those to lines you can form a triangle with the chord that cut it.

    5. Find the area of this.

    6. Minus the triangle area from the section of the circle area.

    You now have the area of the circle cut away from the cord, which you could minus from the whole area to get the area of the circle without the cord.

    Obvious for a cylinder you just need to put it back in 3D.

    Hope this helps and is what you wanted.

  11. That's why I am saying fight for your rights...

    But regardless...

    You are probably a citizen of the UK right? You have far more rights than I do... so they are trying to shut down torrents? Or they might block a few websites??? All of which shouldn't be done, but you are still light years away from what goes on in non-western countries.

    P.S. If England made it illegal to learn about hacking / visit Hak5, would you come anyways? :)

    Actually it is more like having a database storing all e-mails, phonecalls, text messages, social networking website information, browsing habits, physical movements, etc. Whether it is possibly or not is another question, but there has been a lot of information recently on how they are trying.

    You can't protest in front of the house of government without prior written permission and your not even allowed to take photographs of the authorities now. You have to have proof of identity when purchasing a new mobile phone even on a payg system, sounds like a real utopia to me.

  12. Unfortunately, that is not a possibly in my case.

    I want to at least thank you for taking the time to respond to my post.

    Enjoy your freedoms that you have. You are very lucky. Make sure you fight for your rights and freedoms or you will wake up one day without them.

    :)

    You really should stop going on about our "freedoms", if you want to take a look at what the British government is currently doing to privacy laws and freedoms, you'll understand that the grass really isn't much greener on the other side.

  13. The Internet isn't a rite or a privilege really, given how it is made up. However connection to the internet, is a privilege and you should abide by the T&C. If you want to use the Book analogy, Books aren't a rite or a privilege, you get to privilege to read the book or borrow it from a library, bot of which have conditions.

    Breaking the law because the law is wrong is used by a lot of people and it offers absolutely no defense. Many things are illegal in countries that are really silly laws, including some in the USA, Europe etc. Cryptography laws have always been restrictive and especially to do with export, which is even more difficult to control with the Internet.

    Using the excuse about no one being prosecuted for breaking certain laws is a very bad one and I doubt that its the case that no one ever has. Also its also more likely to make the authorities make an example of you when they do catch you, as has been the case with the limited number of "hacking" trials.

    I think your best course of action would be to look for a different connection to the internet which is less restrictive.

  14. Before you do anything, check your conditions of use of the internet, if your behind a proxy which bans a lot of things, circumventing the proxy may be a breach of the T&C, at which point limited internet becomes a hell of a lot better than no internet at all.

    Also depending on your situation, it may in fact be illegal, wouldn't want you to end up in prison.

  15. My point was simply that, because the BBC rented the Botnet from someone and they then went and removed the bot from around 20,000 zombies that the owners of the Botnet would not be happy because they would be down 20,000 zombies. Not a large number I know but still.

    That was all. :D

    Quite likely, but given that its the BBC, they have a lot of power and can get press attention, so the botnet herders are hardly going to want that.

    On your point about what botnet it was, it probably wasn't storm, as storm has been dead for a little while, unless the BBC started off its death. It was shown how to remove storm at the 25C3, but the developers weren't going to do it because of the legal implications, we all know how to call now, the Beeb!

  16. You normally do not buy a botnet. Usually you will pay for time or action on it, i.e 500 Ddos, 1000 spam, ect.

    If you really want to get pedantic about it, the BBC didn't buy the botnet, they rented it. But people do buy and sell bots all the time, criminals occasionally need more money for things than they had previously estimated.

×
×
  • Create New...