Jump to content

flood

Active Members
  • Posts

    11
  • Joined

  • Last visited

Everything posted by flood

  1. What are some good use cases for TOR? I see they have projects where it's embedded into the browser for secure browsing. But is that really a secure network to trust?
  2. flood

    Cheap Vps

    What are you concerned about?
  3. What VPN client are you using on the ipad? Are both the VPN server and the client setup for IPSec? Why are you setting up a VPN server on an internal ip address?
  4. I like the idea, however, I feel this is a "napster" style idea. Allow me to explain.. Such a product would be dependent on it's community. If it doesn't have enough people using it, then it's not very functional. If enough people use it, then it would work very well. If it got to that point then everyone is going to start using it which could cut into the earning of governments around the nation. Then it becomes outlawed. The user base disappears. You're back at square one. I say go for it.. make sure you get venture capital money before it becomes illegal.
  5. Even if he is successful, his behavior is going to get him caught and he doesn't even know it.
  6. root@bt:~# iptables -L Chain INPUT (policy ACCEPT) target prot opt source destination Chain FORWARD (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination root@bt:~#
  7. have you checked out the netgate appliances? It's cheaper than a pc, smaller energy footprint. http://store.netgate.com/Desktop-Kits-C82.aspx
  8. I would use TightVNC. In the Windows registry you can modify certains keys to prevent it from prompting for a password or showing an icon in the system tray. It's been years since i've done it but the location is the typical HKLM\softare\tightvnc\ ... the keys.. and changing values from 0 to 1 or the other way around.
  9. I don't have much experience with Steganography. I would hide my message in the XIF part of the image.
  10. I've thought about doing this.. but when you factor in power utilization and form factor. It just makes sense to use an off the shelf router with open/dd-wrt
  11. You are probably going to violate Canadian Criminal Code Section 342.1 and maybe even laws of the country where the mail server is hosted.. but... setup a dummy website for her email. Make it look idential to the login page. Redirect that domain (at the proxy or hosts file) to the dummy site. Next time she logs in you obtain the credentials. Mission Accomplished.
×
×
  • Create New...