Jump to content

SmoothCriminal

Dedicated Members
  • Content Count

    713
  • Joined

  • Last visited

About SmoothCriminal

  • Rank
    Hak5 Ninja

Contact Methods

  • Website URL
    http://www.google.com
  • ICQ
    0

Profile Information

  • Gender
    Male
  • Location
    Somewhere, US

Recent Profile Visitors

4,273 profile views
  1. http://it.slashdot.org/story/09/07/11/1430...oups-Threatened So I haven't posted here in a while, but I saw this and thought this was crazy and maybe some of you would share my thoughts. The group is stating that security and white hat hackers, like many of the people here, are a bad thing and hurting the community. That by using full disclosure of exploits they are making everything less secure. Simply put I think this is absurd. Sure script kiddies can get a hold of exploits and take advantage of them, but the whole point of full disclosure is so that the vendor can patch the issue and
  2. Has anyone ever taught you about the edit feature?
  3. If you couldn't pick it up from Vako's post, posting things like "I 0wn3d the sch00lz network" isn't exactly smiled upon. Instead start by posting they software/system architecture, how you discovered the vulnerability, and how you exploited it, in a way to educate not bloat about your 1337ness. Vako wasn't personally attacking you per say he was attacking your post. He is basically saying: try this post again. Edit: Oh and post a potential fix for the security weakness if at all possible.
  4. I haven't posted in a while, but the hilarity of this post forced me too. You actually pointed to your school's website! I find the best way to hak this type of system is by going up to your teachers, and telling them that you need their password so that you can "0wn their box".
  5. I think logmein.com is the easiest way, or you could leave your porn browsing for home.
  6. Here's what you do, modify the USB Missile Launcher so that instead of shooting a foam dart, it shoots your hose. Hopefully you live somewhere where it is cold outside, it will teach hooligans to not mess with you.
  7. I would think about security/motion activated lights. You would be surprised by how far they will go to scare off people. If you decide to go with cameras, remember that probably the largest point of failure for most cameras is lack of lighting. So either put lights out with the cameras, or go with more expensive cameras with night vision or cameras with IR lights.
  8. I agree with Vako, but if you are willing to throw down just a little extra, go with the nvidia GTX 200 series. Oh, and on a random note, what is with the start menu/taskbar on top?
  9. SmoothCriminal

    help

    Whatever boats your float.
  10. If you just keep track of which usb goes to which user, you could have the payload just send out an email identifying itself with a number, which corresponds with your data on who got what usb drive. That way you are not technically getting user information (although you probably could get their IP address from this) from them. Though, I agree check with your instructor.
  11. I have heard of both of them. Both companies were at a recent Computer Round table Job fair that my University hosted. Funny story about Tata. I was browsing the career fair, looking for internships. I saw Tata and decided to check them out after all that I had heard about the company recently in the news and in one of my business-technology classes. So I went over there and the person gave me his spiel about the company, and basically said one of the unique internships they offered to me was to go to India and other countries and teach English. Since this did not relate to my field (the
  12. I don't think we should come up with your thesis for you. Some of us have been nice enough to throw ideas at you, from there you should develop your ideas into your own research area. How much do you want us to spoon-feed you?
  13. You could research the insecurities that exist with today's wireless network technology (with things like the jasager), or even you could do a more broad subject of wireless technology in general and the security problems it presents.
  14. Step by step instructions to pwn this guys computer and get an A. >Start >Run >iexplore >ok >enter www.fbi.gov >Submit Crime Tip >Enter your information >Enter the person whose computer you wish to pwn as a suspected cyber-terrorist >FBI owns computer for you!
×
×
  • Create New...