Jump to content

MagnusTheRed90

Active Members
  • Content Count

    7
  • Joined

  • Last visited

About MagnusTheRed90

  • Rank
    Newbie

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. So, I have been thinking about applying brute forcing to other things in computer programming, like for example brute forcing the most effective LRM's on a battlemech (Mechwarrior online) such that I get maximum damage potential for given tonnage and slot space. I actually have some convincing code, but I am in need of a simple hello world of brute forcing in order to exhaust all possibilities. I remember a few years ago someone did a brute forcer in java and posted the code on stack overflow. It was great, but the post has since been garbage collected or something. I can't wrap my head around
  2. Well, thanks anyway digininja. There probably has to be some other explanation to what was happening. I'm not trying to be creepy or anything. I typically would not be on a hacker site.
  3. I am sorry. I will research p0f. The trick is simply that I got the impression that people knew more about where I was browsing than they should in public places. Things like what I had ordered in my previous shopping cart. The computers have been rebuilt a few times. I lived in my parents house with several other people, so they should have not been able to differentiate between a sys-admin's traffic and a software developers.
  4. Question is simply about Network Allocation Tables. Not really aiming at much. Short story I may have seen a trick that I don't know how to quantify, but I could be barking up the wrong tree however. Perhaps you should tell me what kinds of information p0f can tell you. Can it narrow it down to operating system and machine build?
  5. Would social media identifiers be transmitted via url? From what I understand DNS is not encrypted right?
  6. I was wondering if from the outside the ISP could readily determine what individual computers on the other side of the router would be doing, example http browsing, while simultaneously accounting for the new Session Ids of the NAT table. They rotate or something. I was wondering if it was possible to see through the NAT configurations.
  7. Is it possible to statistically or via some algorithm to see through NAT on a router on the internet. I don't necessarily want to preform anything, I simply want to know. This is curiosity.
×
×
  • Create New...