Jump to content

Struthian

Active Members
  • Posts

    111
  • Joined

  • Last visited

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

Struthian's Achievements

  1. How exactly did you try and "go to the internet"? What steps did you take, from what point of operation? Did you try Wifi or did you try a wired connection?
  2. Further experimenting. It appears that if one disconnects a "good" keyboard and then reconnects it - that works. However, if one disconnects a good one and then connects one of the ones that seem to not work, then goes back to the good one - it doesn't work. Can someone confirm this? If so it appears that keyboards that won't log cause some internal error that prevents further function.
  3. My keycroc worked just fine with a mac keyboard (a pretty old one) but a USB keyboard. After the update, which I did today, the same day I got the Croc, it didn't work. The croc behaved as if there was no keyboard connected. The keyboard just fine without the croc. Next I tried a Logitech wireless keyboard, which shares a receiver with a mouse. The Croc worked with that keyboard as expected. HOWEVER - when I moved the mouse, it's movements came out as jumbled text in the computer. I would have to say that with such a keyboard, this would not be a good thing. Finally I tried a very old dell keyboard (which is old enough to drink), has a DIN connector. I happen to have a DIN to USB adapter. That worked exactly as advertised with Version 1.3. I think 1.3 needs some more work. To summarize, that which worked before does not work in 1.3. MAC keyboard on a PC is admittedly unlikely in the real world. Logitech wireless keyboard + mouse is a bit more likely. Geoff
  4. https://techcrunch.com/2018/01/02/these-psychedelic-stickers-blow-ai-minds/ This also demonstrates an interesting principle. Something small and weird can distract from something big and important. Similar ideas work in psychology and AI.
  5. Struthian

    VPN's

    I think there seems to be a confusion between"Censoring" the internet as a global interconnect and with an organization controlling access and use of it's own equipment. The organization, in this case, is a school for children. However Rayvn should understand that in work, in government there are also limitations. There is a difference between institutional or employment access and retail use from an internet provider. There is a legal and even moral difference. Rayvn would do well to put more effort into grammar, civics, and understanding the world around that is accessible rather than one which is not and which Rayvn can't even explain what they expect to get from it. It's just a "principle" except actually - it isn't. For Rayvn's information - any institution or employer can legally control and even monitor the use of it's own equipment by students, workers or whatever. If caught in these endeavors, Rayvn hasn't a legal leg to stand on. A warrant is not required to monitor telephone or internet within an institution or place of employment. I have terminated employees based on monitoring. Their outrage over their "Rights" did not even find a lawyer willing to help them. Rayvn needs to focus on graduating from school and entering a good college.
  6. Anytime a Lithium battery is growing, that's not good. Take the support ticket from Foxtrot, keep it in some sort of plastic container that can let off pressure (eg: tupperware) and - keep it outside. Take a photo of it for documentation purposes and follow foxtrots instructions on returning it. These type of battery issues are usually not completely under the Vendors control. It's a part that they got from somewhere else.
  7. CES in Las Vegas lost power. I'm wondering if this was a hack. It seems localized. Any thoughts? I'll also say that the "Official answer" when we have one, may not be the truth.
  8. The goal I'm exploring is windows based exploits. One advantage of Powershell being layered on the object oriented .Net library is that regular expressions are not as needed. Things are already set into properties within objects. There are also great list processing capabilities. I can think of few to none functions that are available in the windows GUI and not in Powershell. .Net shims can also be created for anything else. For Windows exploits, I think powershell is under utilized. I hope to have some more interesting (and involved) bits to share soon.
  9. If the OS is Raspbian or even Debian, then it's all still true. A disk image is a disk image, that is to say, it represents the entire image of the disk. I don't know of a non image backup - though it might exist. A non image backup is complicated by creating the appropriate partitions within the disk and then restoring the proper files to those partitions. All this is exactly why (in addition to saving money) I use SD cards that are just enough to fulfill my needs. If that need increases, I step up to a larger SD card, restore to that and then expand into it.
  10. There is a utility in Raspbian that will duplicate your system to another SD card one that is mounted in a USB adapter. I know nothing of TRK but that's how I back up my Pi. Also the "Win32 Disk Imager" which I used to make SD card's for the PI, does the same thing, making an image from the disk which you store as a file. What might be jamming you in all cases, you can't create a disk image to a medium smaller than the disk. So - you can't put a 250gb image on a 128gb card. You can put a 250gb image on a 250gb file on your PC, then Zip it. I might add, I do just fine with a 32gb card on my PI, using a thumb drive for "big stuff" when that comes up. Restore would simply be a matter of using that second SD card instead of the first.
  11. For a larger project, I am exploring the use of Powershell to automate network tasks. In the enclosed script, I am assuming someone has a Raspberry Pi named PiM3.local with default username and password on my local network. I use Posh-SSH which can be installed within Powershell by Install-Module Posh-SSH . I then execute a command with SSH, grab the .bash-history and put a new file in the Pi. One could, of course, use nmap to find computers with port 22 and then proceed with something like this to see what happens. One could of course use the wifi pineapple to ... and so on. Are there loose pi's where you live? RaspberySFTP.ps1
  12. His sister was Noor Inayat Khan, a spy during WWII who was murdered by the Nazis and never gave up her network.
  13. Here is something more peaceful that gets me in the zone.
  14. As far as I know, the only way to really destroy the data on a flash drive is to destroy internal configuration tables which redirect around bad sectors. To delete all data beyond recovery but, leaving a still useful drive would take significant time. If you really want to remove all evidence, it would be faster to simply take the ducky apart, remove the SD and destroy it.
×
×
  • Create New...