Jump to content

KidBuu

Active Members
  • Posts

    5
  • Joined

  • Last visited

Everything posted by KidBuu

  1. Technically everything encrypted is crackable, the strength behind an encryption is whether or not it is computationally feasable to recover the key. Basically to decrypt the ciphertext output by encryption algorithms that are called "uncrackable" you would need to enumerate all possible keys in order to recover the original data. For example, suppose that you use an encryption algorithm using a 128-bit key. Then you would need to try 2^128 keys by trying to break the encryption algorithm by brute force (assuming that cryptanalysis doesn't reduce the number of possibilities given a ciphertext), which even on hundreds of super computers would take hundreds of years if not more to break (don't feel like doing the math right now). AES is one of the most secure symmetric encryption algorithms as of now so if you use truecrypt I would probably choose that encryption algorithm. However, I read a research paper a few months ago where they basically found that if someone get's your computer in sleep mode they can examine memory to recover your encryption key (they didn't test truecrypt although). So furthermore, disk encryption is only secure if the computer is not powered on when it is taken. Search "cold booting" if you're interested in the disk encryption vulnerability
  2. Lol I feel that, just wanted to give you a heads up. Guess it's just that whole hacker thirst for knowledge :). On another note, did you ever see the biquad dish antenna plans for wifi? I'm thinking about building a pair of these this summer. One of my friends lives right near a lake and I'm thinking these may be my answer to the terrible 3g/4g connection while on the boat. Programming while relaxing on a boat + decent internet access = heaven in my eyes lol. Here's a page with the basic plans: http://www.engadget.com/2005/11/15/how-to-build-a-wifi-biquad-dish-antenna/
  3. That's an awesome set-up. Lol I'd be instantly disabling my wifi if I saw someone using that in an airport. But note that you may not want to post anything containing personal information on a website full of hackers, Rich W. of ---- L---r Ct, V---- S-----, California :D. I blanked out parts of the address in an attempt not to be that big of a dick. I'd probably edit the second image from the bottom if I were you :)
  4. I remember seeing something online a few years ago that our government has engineers inspect the chips before they are installed if they are used for anything important like military uses and in infrastructure. However, we would be totally screwed if they decided to backdoor consumer PCs and/or smartphone chips to create an army of zombies. Think widespread DDOS attacks with a hundreds of million zombies (considering theres an estimated 200 million computers in the US alone).
  5. Basically for the operating system just make sure that it is based on the Linux kernel (Backtrack/Ubuntu/Fedora) as Jason and Bobby said and then read up on some system calls and then shell scripting. As for the programming languages, I would probably pick up a beginner programming book in any programming language (recommend C++ or Java to begin) to learn the fundamentals of programming (data types, conditional statements, iteration, recursion, data structures, subroutines, etc...). Also, I would look up the basics behind how computers based on the von Neumann architecture work such as memory addressing, procedure call stack, etc.. Last but not least, read up on networking basics such as the OSI model, networking protocols and things of that nature. Books and google will be your best friends.
×
×
  • Create New...