Jump to content

sablefoxx

Dedicated Members
  • Posts

    572
  • Joined

  • Last visited

  • Days Won

    1

Posts posted by sablefoxx

  1. Yeah I agree the game, and the "hack" (if you can call it that) are very pointless. Just something I found interesting and thought I'd share it with others. It will give you bragging points among your friends though, however you may want to put in a sleep call so its not obvious you're cheating.

    Total time to make this was less then 5 mins.

    I should also note that I have never played the game (Facebook app privacy scares me), that's a screen shot of my friend's score.

  2. So some of you may have seen this game on Facebook, you have to type A-Z five times as fast as you can, then it compares your time to everyone else who has played the game, but it is easily beaten using a short script me and a friend wrote in AHK, observe;

    9r15r9.jpg

    Here is the source code, or download a compiled version here (just run the program and press 'a'):

    #Persistent
    #InstallKeybdHook
    #SingleInstance, Force
    
    
    $a::
    SendInput, abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzab
    cdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyz
    ExitApp

    Have fun! :rolleyes:

  3. Depends of course, I still have a Windows 3.1 box in my collection to show off to my friends it doesn't have much practical use. I also have about 15 old IDE hard drives laying around... haven't found a use for those yet.

    BTW, Crystal Method == Awesome DJs

  4. If you want to stay in the hotel book ahead of time, it almost always sells out.

    Do's

    1. Make friends

    2. Drink

    3. Learn cool stuff

    4. Shower, Brush Teeth (for the good of other attendees)

    5. Disable wifi / bluetooth on your smart phone

    6. Go to Toxic BBQ (bring beer)

    Don'ts

    1. Connect to Defon wifi AP, unless you're prepared to defend yourself

    2. Use the ATM's in the Riv

    3. Attempt to bungee jump off roof

    4. Be a douche

  5. Yes, I have an ugly (somewhat) multipass version working, before I left for a two week vacation in Europe. If you want to setup a site feel free everything here is completely public domain. if you want, link to my site (very crude at the moment still setting it up) www.d0tmayhem.com on which (as well as here) I plan to release updates and other fun stuff.

  6. I know this maybe dumb but i want to learn dont you have a guide for dumbies or something?? ive spent days reading and reading about these things but all of these new words and all i just dont get what im supposed to do or where to start???

    A more specific question please...

  7. Well, its one of the options. But it took me less than 30min to code this one so, if someone gets the code, he can alter it in no-time. So ether we post the bins and the code when the voting is over, or the one that sets the challenge takes the code and posts it for voting. ^_^

    Agreed, post screen shots, source code on the last day. I'd still prefer no bins.

  8. Code Challenge - Starts 8/11/09 - Ends 8/31/09

    Write a program in C that changes the desktop background of a Windows XP machine.

    Requirements:

    1 - Must take command line argument for file path of image (i.e. C:\image.bmp)

    2 - Program must not crash on invalid input

    3 - Changes must take affect, (at the very latest) on reboot.

    Winner is the person who's program uses the fewest characters (white space doesn't count).

    Hint

  9. Just boot any live disc and copy the sam/system files.

    The point of using PWDump is to defeat the kernel protection for the SAM file and get to the hashes. If you've boot'd into your own OS they're no need for this, just copy the SAM file there's no kernel protecting it.

  10. If you want to know more about the cold boot attack, here are some things I've had in my collection since it's release.

    25 C3 Talk on Full Disk Crypto (crash course)

    25 C3 - Advanced Memory Forensics (This talk is by one of the guys who did the attacks, same kid who helped brake md5 signed ssl certs)

    Lest We Remember Cold Boot Attacks (pdf)

    Lest We Remember Cold Boot Attacks (example video)

    Article on Possible Fix for Key Leakage (use cpu cache?)

×
×
  • Create New...