Jump to content

ben

Active Members
  • Posts

    65
  • Joined

  • Last visited

Everything posted by ben

  1. I've been playing around with Helix lately and it should do the job for you. It's "a customized distribution of the Knoppix Live Linux CD" that is designed for computer forensics but has a great ability to recover files in unallocated file space. The key is making sure you don't write anything new to the drive because deleting a file is one thing, but overwriting a file will require a whole lot of money to recover it. Ben
  2. All I have to say is: 1. Jet Kune Do 2. Bruce Lee had to slow down his marshal arts moves because they cameras couldn't film fast enough Bruce Lee will probably never be replaced. Ben
  3. ben

    *nix

    Good luck with OpenBSD. Personally, I much prefer FreeBSD because of the FreeBSD Handbook. It's very helpful for someone just started out. I tried to use OpenBSD when making the switch from Linux but found the community very demeaning. After that I tried FreeBSD and found the community very helpful. As for OpenBSD being "more secure", it's as secure as the administrator. Someone who knows what they're doing with FreeBSD can make a system just as secure as OpenBSD and someone who doesn't know what they're doing can make OpenBSD just as insecure as Windows. The more I work with OS X the more I'm convinced it's not a very good nix. No matter what they say it's a proprietary OS. When they start converting config files into binaries and messing with "standard" *NIX file structures they just mess things up. Don't get me wrong, it's a great OS for certain things, but it's move a long way (and is going further) from being *NIX. Ben
  4. I love FreeBSD and am glad to see that others are getting interested. I am still fairly new to the OS (only been using it a couple of years) but have found that the FreeBSD Handbook and FreeBSD-Questions mailing list are both very helpful (much more so than anything OpenBSD offers. As for your dilemma with not being able to afford new blank CDs, get some CD-RWs. I purchased 2 packs a couple of years ago (for about $15) and have been using those CD-RWs ever since. They're great if you're using something that you may not be interested in having after a while (like installer ISOs). Ben
  5. I'd love to move completely over to FreeBSD, or even Linux, but gaming needs Windows (until companies move away from DirectX). Speaking of DirectX, has everyone seen the DirectX 10 trailer from Crytek?? DirectX 10 will be my biggest reason for upgrading so I may wait until those games are out before I upgrade/move to Vista. Ben
  6. Technologique - Is this the show you're talking about?? If it is maybe this link will help to find more information. Ben A few more links: http://www.scifi.com/sfw/issue183/screen3.html http://www.allyourtv.com/shows/l/showguidelevel9.html http://www.google.com/search?hl=en&q=%...G=Google+Search
  7. Days of the New - Touch, Peel and Stand
  8. Dave Mathew's Band - Don't Drink the Water
  9. Velvet Revolver - Fall To Pieces
  10. Oasis* - Half The World Away * = Best Band Ever
  11. Alice in Chains - Down in a hole
  12. The Brothers Gibb - Stayin' Alive
  13. Well, I'm not sure if this is an industry standard but a group of people have dubbed what you want to do as screencasting (follow the link for more software). You've got a couple of ways you can do this. 1. Run VMware, QEMU, or some other emulation program and capture the environment using Windows software. 2. Run TightVNC or some other remote desktop program and capture the environment using Windows software. 3. Run Wink, Xvidcap, or some other native application and capture the environment or window natively. 4. Figure out how to do X11 forwarding from your Linux system to your Windows system (I use PuTTY, OpenSSH, and Xming) and capture the X11 window using Windows software. Make sure to let us know when it's out. It's always good to have more good content to watch. Ben
  14. ben

    USB Apps

    PortableApps.com is another great site for getting stand-alone apps for your USB drive. Between PortableApps and mubix's page, I think most of us will be well covered for USB apps. Ben
  15. Well, I'm not that familiar with Xen but could you use IP aliasing (Linux tutorial here) set up virtual interfaces on your system?? This would prevent you from having to put multiple NICs in a system however you'll have reduced throughput for each Xen session since they're sharing the same physical device. Of course, you'll have reduced throughput if you have more than one Xen session anyway since you're probably running multiple NICs off of the same PCI bus. Ben
  16. You'll need to use a proxy of some sorts (I suggest Firefox with the Switch Proxy Tool extension that uses Privoxy that uses Tor) but any proxy should do. Note: Going through a proxy will significantly reduce your browser speed because you're not taking the fastest route to the web server. Ben
  17. I'm not sure if I understand your question or not but I'll give an answer a shot anyway. To run the cluster you're going to need a master node that distributes the load to the slave nodes. That master node could have one, two, or more NICs in it. If it only has one the slaves would be theoretically visible to the outside world. If you have two NICs you could set it up just like a NAT router. The master node would have to understand some way of distributing the work to the slaves (e.g. round robin). I hope that answers your question. If it doesn't could you please explain a bit more about what you're trying to understand?? Ben
  18. This solution wouldn't work because that hosts file is only for name resolution. The incoming packets are only listening to a specific IP. This would work if an attack was going to hit a domain name. All you would need to do is update your DNS servers (which is what Microsoft did to deflect the Blaster worm attack against windowsupdate.com) but would not work if the attack targeted an IP. Ben
  19. Could you release it at the Hak.5 Store?? I believe they allow the sale of DVDs and it may be a good way to link a few T-shirt sales with the DVD. Ben
  20. I first read about this probably 4 years ago when Steve Gibson wrote his Distributed Reflection Denial of Service page about an attack on his web site. It's a good read for those of you who would like to hear about a real live attack or would like to see some visual descriptions. I'm surprised there hasn't been more news about major attacks using this method. I'm sure it's only a matter of time though. Ben
  21. Huh?? I don't recall hearing an announcement. Ben
  22. I'm using FreeBSD 6 as a server at home (mail, www, file, etc.) and have been since FreeBSD 5.0. But I must admit that I mostly am logged into a different Windows XP machine. The real reason I'm logged is to play games. If Guild Wars were released on FreeBSD (or maybe even Linux) I'd probably convert my main OS from Windows. As far as what I do most things in, most of my downloading is done via a SSH shell. All of my seeding of torrents are done using the screen command from my FreeBSD box. Would I call myself a *nix user?? Yes. I use it frequently enough, and know enough about it, that I'd call myself a user. Ben
  23. How is computer #3 connected to computer #2?? Are they connected with a crossover cable with computer #2 bridging the connections?? In any case, you could put a firewall on computer #3 that would drop all traffic except that going to your local network (e.g. 192.168.x.x). Ben
  24. A better analogy would be, can you get arrested for going around to people's houses and trying to open doors?? careless223 was actually trying to get in to the system, not just using the system and noticing a vuln. I would say that careless223 should do nothing or anonymously tell the admins. Don't try to patch it and don't just leave a text file saying that it's vulnerable. Definitely do not ever use the vulnerability again. The best thing to do may be to send an e-mail from an anonymous account. Ben
×
×
  • Create New...