Jump to content

JokerKing

Active Members
  • Posts

    11
  • Joined

  • Last visited

Everything posted by JokerKing

  1. BTW, you can use any Linux CD on a Mac. Infact, OS X is based on BSD, which is the base of many Linux distros.
  2. I'm just going to list some ideas for you to try. -Run a portscan on yourself (might need to setup a proxy to make sure you're looking at yourself as the outside world sees you. TOR is a good way to do this). -Disable NAT on your modem. You'll have to google how to do this. My modem is currently set to 'bridge' mode which means that the *only* thing it does is act as a translator between the coax cable and the ethernet cable. My router is handling the sign-in, and if you ping me then you're actually pinging the router NOT the modem. This ensures that the modem isn't doing any sort of NAT on your packets. -As mentioned above, setting a static IP and forwarding the ports statically is a good thing. Have you tried to VNC into your machine from within the network? If this works then the problem lays with a firewall or NAT not being done properly. If none of these work feel free to PM me and I'll help you get this working. Good luck!
  3. I have an AMD-based system, but in the BIOS it has an MTRR setting for "memory wrapping" so that 4GB or more of memory. Not sure if this helps or if it's applicable, but there it is.
  4. Chances are you're running the Linksys default firmwware. First step is to change your password to access the router; I've been able to get into countless AP's with the default password. Second step is to change your SSID to something other then 'default' and disable the SSID broadcast (note: you will have o manually type in the SSID on anyone's computer who wants to connect to your AP after you've disabled the SSID.) Third step is to set your WiFi mode to G-Only, this immediatly rules out all WiFi-B devices, which could potentially speed up your network (as soon as a WiFi-B device connects to the AP the network immediatly slows down to WiFi-B speeds, regarldess if you're using WiFi-G). Fourth is to actually secure the network with a WPA2 Personal (TKIP + AES) key, I reccomend doing an alternating letter/number combo with at least one double letter and double number key (i.e. a1b2cd3e45....) as this will give a possible 260^X (where X is the length of the key) keys, lots to sort through. Also, I recommend a minimum length of 10. That should be secure enough; but if you're paranoid then set your MAC address filtering to exclusive and enter your MAC address. I won't go into MAC address's as I'm lazy, but there are lots of guides to do MAC address filtering on the net.
  5. You may be interested to look under the 'Access Restrictions' as it has both bittorrent filtering and a checkbox for stopping all P2P protocols, as well as scheduler support.
  6. [Hulk] AMD64 X2 4400+ s939 with Zalman CNPS9500-AM2 2GB OCZ PC4000 RAM 3-3-3-8 (currently running at 2.5-3-2-7) ASUS A8N32-SLI Deluxe EVGA 7900GT KO (590/800) w/ Zalman VF700-CU Creative X-Fi Platinum 1x WD 250GB SATA-II Antec P180 Windows XP Pro and soon to dual-boot with Gentoo MacBook Pro October 2006 revision [ultraSurve] AMD64 3200+ s939 512MB generic/mixed DDR RAM Asrock something or other nVidia 6100 onboard (16 shared) nVidia onboard sound 80GB WD Harddrive (IDE) Gentoo setup as a server [blackbox] AMD K6 300MHz 256MB PC100 SD Gentoo (currently has no use) + I have several other computers in components laying around, this is excluding the rest of the computers in my home LAN.
  7. First: get off WEP; you may as well just use an unencrypted network; use WPA2 TKIP + AES, and use a long passkey, alternating numbers and letters, with 1 double number and 1x double letter pair (i.e. 1a2b3c45d6e7fg8...), if you use X characters then there are 260 ^ X possible permutations. Second: setup MAC address filtering for exclusive, so that only the MAC address you specify will be allowed to connect to the wireless Third: disable your SSID broadcast, might not do much but hey, at this point everything you do might help Fourth: turn down your Xmit power, he won't be able to use a network that's physically not reaching him Fifth: setup your network to use RADIUS authentication, it might be annoying but at least you'll know he can't get by this one.
  8. Most schools will be able to track everything back to your room. It doesn't matter what type of MAC spoofing or web annonymiouser you use, they will be able to track it back to your room. If you're worried about doing something that might be viewed as 'bad' by the admins then spoof your MAC and get into someone's wireless network, that's the best protection you'll be able to get from the admins if you're doing anything inside the network. If you're going to be doing things outside the network there are several options you could look into: If you're going to be doing alot of just web browsing then look into http://tor.eff.org/. What TOR does basically is bounce your traffic through a series of 8 proxies, each connection having its own unique SSH encrypted session, including (most importantly) the initial connecttion between you and the first node. Each time you connect to the TOR network you get a new series of proxies. If you're going to be doing alot of torrenting or file transfers then your best bet would be to setup an off-campus server with a good upstream. Then, set it up as an SSH proxy, and SSH into it. This will create (again) an encrypted connection, admins won't be able to see what you're doing. Note: no matter what you do, if you use TOR or the off-campus server, admins will always be able to look at how much traffic you've sent/recieved; if not what you're doing; so if your school emposes bandwidth caps you're SOL.
  9. Hello All! I've been folliowing Hak .5 for a while, and decided to join the forums finally. I've been working with computers since I was 6 and managed to, on my family's first $4,000 CAD Pentium-1 computer with a whopping 16mb of EDO RAM running an unpatched Windows 95 V1.0, delete the hard drive. Man were they pissed, we'd only had the computer for 2 weeks haha. Anyways, since then I've been working on comptuer's, frequently fixing them and assisting my school with setting up labs and whatnot. Now I'm in University for computer security and hope to get into either the RCMP Cybercrimes detachment or CSIS, but that's not for a while yet haha. Anyways; <?PHP echo 'hello world!'; ?> Edit: sorry for this being in the wrong section, I don't see a remove post button :(
  10. Hey guys, I've been playing wit the USB hacksaw for a while; just prank stuff to my sister and parents and whatnot, so I was fairly familar with it. However, when a member of another forum I frequent asks how to get the Windows password to his sisters computer as nobody's seen or heard from her for a few days. I send him the links to the USB Hacksaw project. A day later he comes back saying he was able to locate her thanks to the Hacksaw. A big thank you to everyone who has contributed to this project -JokerKing.
×
×
  • Create New...