Jump to content

badbass

Active Members
  • Posts

    418
  • Joined

  • Last visited

Everything posted by badbass

  1. I am living in an apartment. I have to use a different cable company than every one else in the area. Just in this complex. Sucks. Half the time it is down. Fiber is not avalible. I am thinking of using my phone to tether much less headache. What is the deal? Everyone around me has comcast we have INC group. Comcast is less than halth a mile away. I know people in the middle of nowhere with fiber. I will try again for Hdsl as my last choice. I have people who are less than tech savy living with me. They would have troulbe tethering a phone.
  2. I learned something from the episode with my paranoid friend. There are rootkits that attack the bios. I think they put a .bin file and a bootable thing. on the computer and change the mbr. There are some things out there signed bios updates and efi or uefi bioses. I think there are two root kits that attack the bios out in the wild. I wonder if metasplot type tools help this. Intel has something in their new chips. win8 has a secure boot. I dont know what the new intel chips and efi or uefi means for linux os's. Thanks for reading.
  3. You rock btw community computer groups are awesome
  4. I would look at the chipset ralink and realteks work best infact the atheros on my laptop works great too. Packet injection is the key.
  5. Thanks I am going to throw the alfa in my bag for emergencies. I am going to flash my collection of wrt rourters with various open source firmware. Sorry did not have any funny quotes.
  6. Back on topic for a change. I am using an alfa r36. I would like to dmz back to my pc. I set up dmz with the host I want. Instead of connecting to the computer I connect to the router login. I did somethine wrong. I set it up as the documentation says. Cant seem to find any help on google. As for quotes. When someone says hey dork I know they are looking for me.
  7. I am helping somone with computers doing weird things. Volunteered as usuall. Anyway scary stuff back to stuff infecting firmware and other hardware. Read something bout cross platform bugs mac/linux. Any thoughts on this... I will post any research I do. P.S I am starting a computer group where I live. The political climate does not like this idea.
  8. My peeps are curious. They are musicans artists writers. Computer people I need to back my work up. My thoughts on this are when it works. Leaving the ses ion open you can add data from the computer that burned the disk. Most of the time it does not work. At least this is my experience with brasso... I COULD BE WRONG
  9. I mean stupid things like they are using the tiny un readable section of the cd to store a root kit. The clamping ring of the disc and every time I log into gmail they get my ip. B.S as far as I it is only in the header of the email. How the heck can they find him when he goes to the library and signs in to email. What is burried in his yard scary thought.
  10. Thanks for helping me out guys. This whole thing makes a great idea for a song computer psycho. People like this are try to hide things. Many criminals have the same mindset thanks guys.
  11. I have a serious question I have a friend who is paranoid about all this stuff. I cant determine if this is real or what? Is he hiding something? He thinks his x is spying on him. He also thinks the I.T department where she works is hacking his computer. (He says she sleeps with every one she can.) He has pictures of her with another guy he says. He also says they send her emails detailing things they did. He says they put root kit on the bios of his computer and router. He also says they put something on his iMAC. Which he found encrypted videos 3gpp's that came off of his phone when he used an un delete utility. To top it off he thinks they rooted pc runing backtrack from a dvd with no hard drive and a ubuntu box. He said they control his phone remotely. He says they get his IP when he logs into gmail. He has an SD card with shadow files on it from his mac. The files look like. He could of done this him self. When I went over see this I found a lot of arp packets he says can you stop this I said no. Arp packets are normal. I did see the metasploit port thou3gh. A spam server from china was also nailing his network. 119 ip address. He also thinks there is a hidden Wifi AP in his house so his x can spy on him that way. Coaxial cable all over the place. To top it off his X says would you like my guy to work on your site for you. I need to learn about web design. HIS X did have a drinking problem. I can validate the drinking problem. I did see her after they went separate ways. If this is a game he has lots to lose. Is he trying to protect his own ass.... Sorry about the long post. Is this guy nuts is this a game. I cant get a straight answer on google about this!!!
  12. I need use it in my own lab to see how much damage I can do to another lab computer.
  13. Will this work does this seem logical? I want to find the bum who is messing with me. Am I close?
  14. I have Backtrack 5 installed on a pc default password stopped working. I know the default pw is toor but it is not working. I googled this and they said it has something to do with a shadow file. What do I need to do boot to the live cd and replace this? There also is something about messing with grub dont know if this will help. Let me know if running the live cd and getting all the data as a worst case thing will work. Has this happened to anyone before.
  15. That was cool guys screwed up again for metasploit or video games as google says. Like I said I will suggest to try closing the port and hope all is well. MD
  16. I keep getting this from the same IP using different user names. I dont think it means anything. Goofle said permissions on a server and exim attack. Since they keep trying different usernames. I curious. I found the area the ip address in.
  17. I dont know if this has anything to do with this I think it uses a database postreg? and TCP 7175???? I do not know if this helps any but I might take a shot. I need to relook at what exactly this does I was poking at it from the other day from my question.
  18. K my fault I knew it wad some sort of gaming. I will just mention it is a vps module try to change the rules on the server case closed. Dont call me a dork I know that now figure out the exim reject log.
  19. This is on a web server
  20. Thamks man the results are in chrome book no. netbook or laptop maybe. I will do more research.
  21. Thamks man the results are in chrome book no. netbook or laptop maybe
  22. I am back in the market. The chromebook has anyone put it in developer mode to use backtrack off of a usb stick. Share your thoughts and ideas about netbook and laptops. Sorry for posting it in the wrong place I will have pictures of my pc later.
  23. I let my CCNA expire which is a long story in itself. I looked at a lot of programs most of them are online. They have no actual lab experience. Does this make it harder to get certified? When I got certified in 2000 I used the cisco neyworking academy at a comunity college. Share your experiences with each thanks.
×
×
  • Create New...