Jump to content

HALEN666

Active Members
  • Posts

    37
  • Joined

  • Last visited

Everything posted by HALEN666

  1. If the FBI was able to do something like that, I don;t want to imagine what CIA and NSA have done. They will do everything they can to spy on Linux users as well. I am pretty sure they are do it one way or the other. The have money, power, and knowledge, so what makes you think they can't do it. If I were them I would focus more on Linux users than WIndows Users because most computers savvies that can participate in cybercrime love Linux. Do you really think those agencies will avoid Linux just because it is open source. They will cheat, pay or do anything they can to have control on it as well. This is not a conspiracy theory it is just reality. Lets be honest, just because it is open does not mean you can just go and read the code much less understand it. Even people who have the skills to do it would not check millions and millions of lines of code. It would take a huge amount of time and effort to do something like that. A lot of people say that the bigger the code the more bugs are likely to appear in a piece of software, but it is also easier for somebody to put something in there that can be used as a backdoor. Very old bugs have been found even in the Linux kernel that can give total access to the system, that proves it is not as easy as it seems to detect bugs that can be used as backdoors. Who knows maybe they were put there, but somebody screw them up. Lets just accept it and stop saying open source is the way to go because all it does is to give a false sense of security to people that can't prove it. I agree it is better, but lets just admit it is not bullet proof. Facts not words are what counts.
  2. When was the last time you checked "line by line" in the linux kernel or any open source software added in the Linux distribution you use?. I trust open source not because I have the knowledge and skills to debug and check every single line of code of the software I use, but because people with that knowledge says they do. However, it is kind of difficult to do that now because they forget about it when they are given money. At the end they are just humans who make mistakes and are weak to certain things in life. I know BSD != Linux, but they are both open source that the point. Took almost 10 years to "find" the backdoor (which by the way, it does not guarantee it will be easy to find it after 10 yeras and all the modification that has been done to OpenBSD).
  3. I don't think Linus or anybody in charge of the decisions for Linux has or has had the nuts to say no to the FBI or CIA. I wouldn't blame the though because I gues they would not any other choice. However, that stings because they give us a false sense of security and freedom.
  4. The US Federal Bureau of Investigation implemented a number of backdoors in the open cryptographic framework used in OpenBSD, according to a former developer of the operating system. Gregory Perry wrote to OpenBSD project chief Theo de Raadt a few days back, explaining that he was revealing this information now because he could - his non-disclosure agreement with the FBI had expired. http://www.itwire.com/opinion-and-analysis/open-sauce/43933-developer-claims-fbi-implemented-backdoors-in-openbsd This is just another prove that even open source can have backdoors. Took almost 9 years to find out about this hahaha. Guess we can't complain about Windows too much now. Pretty ssure there has to be something going on in those millions of lines of code in Linux. This is sad cause we can't feel secure. I dont have the knowledge to analyze millions and millions of lines of code in an open source project such has BSD or Linux. Guess my dependency on other people to keep open source projects to make sure it is backdoor free is just the same dependency I have in Close Source Projects.
  5. I forgot to mentiones. I am not allowed to use any sorting method, such as sort, bubble sort, binary sort, etc. I pretty much have to compare each element in the array and put it in their correct place. I have spend 2 hours trying to figure it out and still can't get it to work.
  6. How would you sort in ascending order an arraylist in java. In other words. You have an arraylist (list1) nwith random values, how would you put those values in ascending order in a second arraylist(list2)? I have all the code, but I can get that part working, it is a logic error. Help please
  7. Do you any of you guys know how to create a virtual machine whose hard drive (the virtual one) can be in a secondary hard drive (in the real pc) in vmware server 2.3? Every time I create a new machine, vmware don't seem to see secondary or external hard drives, it just created the hard drives for the virtual machines in the primary hard drive, which is bad for performance. Thank you
  8. I have Hiren's cd 10.0, konboot, ubuntu in my usb. However, I have not been able to find the grub4dos code for knoppix 6.1. Does anybody know the code to add it to my usb bootloader? thank you
  9. Save your pics for yourself dude, I think you didn't get my point. IN order to get your system compromise (in this case your windows box) somebody would have to install some piece of software in it such as a rootkit, BUUUUUUUTTTT (HOPE YOU UNDERSTAND THIS) MICROSOFT DOES NOT HAVE TO DO THAT CAUSE THEY HAVE FULL CONTROL OF THAT LITTLE CD WITH WHICH YOU INSTALLED WINDOWS IN BOX, SO THEY CAN INSTALL AND HAVE AS MANY ROOTKITS AS THEY WANT CAUSE THEY MIGHT BE ALREADY BE IN YOUR SYSTEM AS SOON AS IT IS DONE INSTALLING. come on dude, the chinese hackers do it with crack windows images, so of course microsoft can do it too. I do know you can see packtes going out of your box if you have another box sniffing packets going out, my question is (DO YOU FREAKING DO IT) (DO ALL THE MILLIONS OF WINDOWS USERS DO IT????) hell no and microsoft knows. Likewise, even if you sniff traffic from another machine, how would you know if those "updates" that you are getting from microsoft are really updates and not something else. Jesus dude, this is not so difficult to understand, they have infinite get your system. You must really love Gate's balls to defend him even when you know I have a point. About the nasa hacker """""OF COURSE IT WAS AN IDIOT THAT DIDN'T KNOW HIS SYSTEM, AND THATS MY POINT GENIOUS, THERE ARE MILLIONS OF PEOPLE JUST LIKE THAT IDIOT THAT WORK FOR POWERFUL AGENCIES LIKE NASA AND BECAUSE OF THEM, THEY GET HACKED. I THOUGHT YOU SAID PEOPLE IN THOSE AGENCIES KNOW THEIR SYSTEMS WELL!!!!!! AND BECAUSE OF PEOPLE LIKE YOU WHO TRUST IN COMPANIES SUCH AS MICROSOFT AND THEIR "WONDERFUL" PRODUCTS GET HACKED TOO.
  10. "if you know anything about your system and network" thats the problem. Dude, the guy whose nickname is the"nasa hacker" got access to nasa's system for more than A YEAR, did they really know their system? hell no. I do knot you have to compromise a system in order to hide packets, that is my point. How can you make sure, windows don;t have rootkits for your window system, out of the box?? It is like the Chinese routers report a while back. There was an article saying that the U.S. was blaming China for installing backdoors in routers that they exported to the U.S. M$ don;t have to compromise your system after you get it, cause they can do it even after start selling their software, thats the problem with close source stuff. About the riots, nahh. As my Gov teacher said, we are too lazy to do stuff like that, and the gov knows it. It was windows 95 when the nsa starting having backdoors and decode keys for windows. I know spying is something normal among people. We all have used keyloggers, trojans and stuff, but what pisses me off is that they do it with our taxes and violate our rights. I would not be surprised if they decide to set up a firewall like the one in China. Haahaha about the toaster, yeah dude i knew that. That is what some electro domestic companies use to spy on us lol. they use fire alarm devices to see you naked in the bathroom. lol
  11. I used to use it when I was using windows. It was a pretty good app. however, I would recommend you use returnil if you really want to sandbox not only some programs, but your whole OS.
  12. Yeah I guess you right about accepting what is going on, but accepting it and not being able to do anything is what pisses me off. You right no people do anything cause we all got lazy to make the government listen to us. My Gov teacher shared that point with us too; however, where is all this going? Like the other guy said, I do believe people isnot gonna be using desktops in the future anymore, the iphone is a good example for us to see that you don't a desktop computer or even a laptop to enjoy life on the net; however the gov knows that too and I am sure they will not let the iphone or other devicesgive us the privacy that we want. I don;t even have a facebook profile cause I do know what you mean. About the guy that said something about rogue packets. Come on man, even federal agencies have a real hard time to find out who is hacking their systems, what makes you think you could see whether microsoft is hacking your system or not. microsoft might be crafting packets everytime you access the internet and you might not even know it. We are talking about professionals that have a higher computer and programming education and skills that we all together. Than you know stuff about security does not means you know it all, they have better chances to fool us cause they know more about this stuff whether i like it or not, and they have windows source to make any changes they want. Oh by the way, you might be right about microsoft being afraid of open source and because of that they are helping them. however, don;t you think thats making everything even worse for them. I bet my grandma would switch to linux, if he heard on tv that linux is free and better than windows. In a way, microsoft is increasing linux popularity and making people aware it exist. None in my family knew that linux was, much less it was free and better than windows. I am sure there are thousands or even millions that don't even know linux exist (usually people that do not know much about computers), which I think microsoft likes to keep it that way. This discussion is not about what operating system is better, but about all those "weird" changes and stuff that are going on out there. I like reading your replies cause at least I can see what other people think about all this, on the streets people seem to void the subject. Thanks guys
  13. , haha i know right, sorry I could not help it. You don't have to have an open port in order to have a backdoor in your system. I know the word backdoor might sound like I talked about open ports in your system but not really. Any vulnerability in windows can give them a backdoor to your system. Even a simple macro in a doc document. It is easy for hackers to hack windows, but it is even easier for microsoft to hack you cause they have full control in windows; likewise, do you think you could be able to detect a rootkit created by them? you can barely detect the most popular ones with some good tools such as icesword. About open ports, you can hide open ports with a simple rootkit. NOw imagine how powerful would be a rootkit created by them. are they gonna tell you about it, nope. if it is difficult to find backdoors in open source software, it is even more difficult to find it in windows cause you don;t have the source; unless, you get it from the chinese goverment lol. Anyway, my point with this is that it is just getting worse. first microsoft, then skype, cisco, google and some others that we might not even know about, are working for them. As one guy in the radio said the other day, I guess we all are gonna live in houses made of glass some day. By, the way, don;t take me wrong about all this. This is not about microsoft itself, but about the fact that we might not have privacy in the future, which is good in a way, but it is bad as well cause I wonder if I can spy on the president and see what porn sites he visits hahah
  14. Hey guys, it has been a while since the last time I posted in this forums, but anyway. I wanna ask you something that makes me wonder about microsoft and his move to start helping the open source community. I read an article about microsoft supporting open source projects (some of them of course) at least for now. However, I wonder, What are they really trying to do here???. The only reason I switched from windows to kubuntu and fedora is because I know microsoft helps federal agencies such as fbi and nsa to spy on people. All those security problems that microsoft has, are just excuses for them to have open doors in peoples' computers. Don't get me wrong here, I do not do anything illegal, at least that I know. Do you think, microsoft's move is to have certain control on open source software, so they can keep helping federal agencies to spy on people, or at least on linux users too??? If the NSA really has backdoors in windows, I am sure they might have some in MACs. Linux seems to be the only choice for people that want to have privacy nowadays. However, I don't think they will let linux users have that privilege. I read an article that said NSA could have included backdoors in selinux, in order to be able to spy on linux users (at least on the ones that use selinux). I know you will say that selinux is open source, but then let me ask you this. Who are the ones checking all those thousands or millions lines of code?? it is you? or is it somebody called bob, that gets paid for telling you that everything is OK in the code. Just because you know c++, python, etc or even assembly does not mean you can really understand all that code. The people that do, well, then can get paid for not looking at certain places in the code. They want you to find the exploits in the everything, so you can;t knock them down in the future. Security researches are just helping them to have the perfect operating systems, so they and only they can have access to your computer, but you can;t have access to theirs. Look I am just wonder about our future. They have control in our computers, they have gps systems in our cars, they have cameras everywhere, they have all your information including the financial one, they even want to implant small chips in people, so they can be safe from kidnapping and other stuff, they get help fromthe biggest search engine in the world to see what you are looking for on the net and have kind of a psychological picture of you, they get help from social networking sites such as facebook and myspace to know more about you and what you do on the net, why do you think they want you to use your email address as a user name ion those sites? so they can have a picture of you and know whose email addresses belong to who. Everything they do, they do it in the name of safety and for your one good, but don;t you think that is the perfect excuse to shut your mouth up against what they do. I don't bother letting them see my dog pictures that I have in my computer, or see me driving or where I go to. As long as they give me the power to spy on them too. Just imagine what a crazy guy could do with all that power. SOrry guys for bringing this up. I feel better now that I said all that, amd I am sure you might feel the same way. links: http://news.techworld.com/operating-system...or-open-source/ http://www.theforbiddenknowledge.com/hardt...oor_windows.htm http://blog.tmcnet.com/blog/tom-keating/sk...pe-backdoor.asp http://www.schneier.com/blog/archives/2007...ps_micro_1.html http://blogs.techrepublic.com.com/opensour...mobile.php?p=37
  15. Hi guys. This is going to be a really dumb question for you, but I really need to ask you, for I don;t want to spend 100 dollars in something that I don't need. I just got a new motherboard (Asus M2N68-AM SE2) I have everything in place; however, I am confused about the chipset. The chipset is NVIDIA GeForce 7025/n Force 630a; When I go to the video card options, it says that my video card is a NVIDIA GeForce 7025/n Force 630a (it is included in the motherboard itself). My question is Is my video card a NVIDIA GeForce 7025/n Force 630a really? or vista is just telling me that my chipset is that. There is a video game I want to play and the video requirements is NVIDIA 7000 Series above. I know this is a stupid quesstion, but I am totally new at video cards and motherboard. I am focus on the software part, that is why I don;t understand much about all those video card names, advantages, etc. Thank you
  16. I try that but putty will run the program in bash which keeps me away from my mom's enviroment. The only solution I see is running netcat in her computer and then create a tunnel in putty to connect to that port just like I do with vnc. However, I don;t want to do that cause I don't want to have netcat running in her computer
  17. cmon man, that stuff is pretty pretty old. The NSA has backdoors in windows since windows 95. Which is not new news. I am sure macs have backdoors to for the goverment. Now that Obama will have full power to disconnect from the internet any company he wants, the NSAn FBI and CIA will have total control even when everybody knows about. To be honest they don;t have to have all that power to do it, cause all they have to do to use trojans, internet sniffers and stuff is to deny everything people say they do and keep doing it in secret. You might think, well using linux we are safe, cmon, woulnd't you accept a couple of thousand of dollars for setting up a backdoor in Linux if you could??? Even open source software is not secure cause, just because it is open source does not mean programmers really read and check all those millions of lines of code to make sure nothing bad is going on and even if they did, they are humans so with some money given to them they can pretend they didin;t see anything. Remember nothing in life is free at all. Nowadays the goverment is blaming China and Russia for hackin goverment systems, which is just an excuse to start a cyber war with them in the future, don;t be surprise the goverment will blame china or russia if a missile is lunch without authorization or if the internet is down. After 911 verybody was complaning about what the gov was doing with our privacy. FBI, CIA, etc were wire tapping telephones, getting access to emails and stuff and everybody was upset about that, did the gov care or stop? no, now after 8 years the goverment is still doing that, but now nobody caplains about it. that is what will happen with what the FBI is doind with "hackers". They are actually doing it with everybody, and if they don;t have a reason to have a trojan in your moms computer, they will say she is a hacker so they can have an excuse to do it hahahah just like the terrorist word. which before used to be witch and women got burned just by being called like that even if they were not, same thing with twrrorist and hackers and who knows what new term the gov will use in the future
  18. I have set up a ssh server in my mom's computer, she lives in California, but I live in Houston. Sometimes she has some problems with her computer so I help her out by using vnc throught vnc and that kind of stuff. However, when i use the command prompt to run command remotely, They don't have any effect in her computer. In other words when I log in and get to the bash then I type cmd to get a command prompt shell. Any command that I run there won't be run in her enviroment, even though I am in her account. I try to run programs such as nircmd, or try to open firefox from the command line, but they don;t appear in her enviroment. I can see the processes running but the windows of those applications such as firefox and stuff don;t appear in her session. It is like if i were running all those commans in the system account instead of her account, but I am actually logged in her account through putty and openssh. Is there a setting in openssh that I have to set up in order to be able ro run commands in her invoroment, so that if I type start firefox.exe www.yourson.com she can see firefox starting and see the website???. or is there an option in putty to run commands in her current enviroment instaead of running any command I type in a system kind of enviroment????
  19. hey guys i hope somebody can help me to understand this. i have been using psexec for a long time, i have copy winvnc.exe vnchooks.dll and also the reg files i need to set up tightvnc in the remote computer; hovever, when i start vnc in the remote computer throgh psexec i cannot connect to the remote computer, i checked the listening ports and it shows me the port i am using for vnc in the remote computer, i also see the process in the tasklist but when i try to connect to the remote computer is says "connection close" everything seems to be alright , theoinly problem i have is that vnc is closing the connection in the remote computer. the other computer doesn't have a firewall so it can't be that. the only thing i can think of is that i cannot use vnc unless i have the password for the accoun being used in that computer; however, i am using the system account in that computer, so i shouldn't have any problems. is there anything i am doing wrong?? by the way, the computer is in a domain, i dont have the password for every user that uses that computer because that computer is in a domain; however, i have the password for the administrator account. i have used the admin account and the system account in that computer but i cannot get the connection to work. likewise, i knows the vnc sever in that computer detects my connection because when i type a wrong password it tells me that the authentication failed, and when i type the right password it says " connections close" by the way i am using the reg files i got from the usb hacked, i changed many things such as password, port, and some other settings, but even my settings or the original reg file serttings won't work. i hope some of you guys can help me to figure this out. thanks by the way, i have the same problem with all other computer in the domain, and i do know i can open any port i want in those computer because backdoors such as netcat works great in those computers
  20. even better, if you wanna hide the icon in the tray bar just add this reg to the first reg file HKLMSOFTWAREORLWinVNC3DisableTrayIcon DWORD "1"
  21. why would you need a port scanner?? too see how nice it looks?? oh ok
  22. i am glad it helps you, but man that was just an example that i wrote in 5 minutes, you migh want to use nircmd in your brothers computer hohohoho check all the parameters that nircmd has, you will be amazed how much that little tool can do. one of my favorite things to do with it is this write a batch file that contains this very simple code :start nircmr setdisplay 800 600 8 nircmd monitor off nircmd cdrom open nircmd beep 500 500 nircmd cdrom close nircmd beep 700 500 nircmd cdrom open nircmd beep 900 500 nircmd cdrom close nircmd beep 1500 500 nircmd cdrom open nircmd beep 2000 200 nircmd cdrom close nircmd beep 2200 200 nircmd cdrom open nircmd beep 2500 20000 goto start exit or any other frequency at which you want his computer speaker to beep it is really anoying once you can't stop it now if you use this batch file from your computer by using psexec and accesing a different account in your brother's computer your brother will not be able to see the cmd windows open unless he closes it from the task manager now that batch file will be under control as long as you dont make it as the other. there are thousand of combinations you can use with nircmd and some other command line tools (if you want to you can use netcat and nircmd together to create a nice command line trojan) just use your imagination cya
  23. hey guys, i know this is gonna sound kind of dumb, but do you guys know about a good command line keylogger???? i know there are many keyloger out there, but i have't fgound any that will show me what people is typing from the command line. for instance, it would be nice to use tools such as psexec with a cmd keylogger so that i could see what the person is typing like in the video in youtube that talks about how secure windows vista is, the guy uses some kind of keylogger that shows him in live what the other guy is typing in a website, but the attacker sees everything from the command pompt. please if you guys knows about a good tool that does that please lemme know. thank you
  24. why dont you use a vpn client( not the one for windows) that might help you out
  25. it will basically move all the documents in "my documents" and " the desktop" folders of the guy that uses that batch file, so if you sent that to somebody then it would move all his documents to a folder in the system 32, then it would hide the folder (minor security) and then it would crash his computer by opening many many many cmd shells that will try to "read" all the dll's files in the system 32 which is something that windows can't handle very good, once it starts readint the files your computer (desktop computer) will beep like crazy, then only way to stop it will be by rebooting your copmputer, of course if you add that batch file to the registry then iw would do the same thing over and over even when the guy reboots his computer, unless he uses safe mode. there are some other keys in the registry that would start the file before the logon screen which is fun too. anyway there are thousands of ways to bother somebody with a batch file, the best thing is that antiviruses dont detect them lol anyway iof you try to send it by email then put it in a zip file otherwise some email companies will not accept it (hotmail) yahoo does
×
×
  • Create New...