Jump to content

jollyrancher82

Dedicated Members
  • Posts

    919
  • Joined

  • Last visited

Everything posted by jollyrancher82

  1. If it's a woman they will probably forget to turn on keyboard and mouse control.
  2. Funny you should say that, there was a recent video of someone switching between them on Parallels on a MacBook.
  3. I don't think there is a 100% way of not leaving any tracks. It's also dependant on how good the person tracking you is and how desperate they are.
  4. I don't understand, I think I misread the title, but is this just burning an ISO image to a CD/DVD?
  5. Got to do the easy stuff even if you know it to get somewhere.
  6. Whoever started this thread.
  7. Seriously, you post a retarded post, and then tell people not to post like this?
  8. Gentoo installer is good :P and I don't mean the new UI one.
  9. If you are interested in websec (web security) you should pretty much understand the different protocols on the web, i.e TCP/IP, FTP, HTTP, SSH, etc. Knowledge of HTML, PHP, ASP, SQL, Perl, and Python is good. HTML: http://www.w3schools.com PHP: http://www.php.net ASP.NET: http://www.asp.net/Default.aspx?tabindex=0&tabid=1 SQL: http://www.mysql.com Perl: http://www.perl.com/ Python: http://www.python.org
  10. Programming Related: Teach Yourself C in 21 Days: http://neonatus.net/C/index.html Teach Yourself C++ in 21 Days: http://cma.zdnet.com/book/c++/ The Art of Assembly Language Programming: http://maven.smith.edu/~thiebaut/ArtOfAssembly/artofasm.html Microsoft Developers Network: http://msdn.microsoft.com Security Related: SecurityFocus: http://www.securityfocus.com/ Milw0rm: http://www.milw0rm.com SecurityForest: http://securityforest.com/wiki/index.php/Main_Page Video Resources: Watching/reading papers or videos from past conventions such as Shmoocon, DefCon, or BlackHat, is a good idea.
  11. Courtesy of TomB sarcastic productions: No it is not possible to hack someone in a different city if you have their IP, the reasoning behind this is that like telephone numbers IPs themselves to, need a city/county code prefixed to the IP, now these city/country codes are classified information. This is why it is highly illegal to hack accross city and state lines, because to do this you have to have the city/country codes for the IP, now the only way you code have obtained this code is via illegal methods. Now I suggest you should go find the person and hack them in the face with an axe. You will end up in jail, and for a lesser sentence due to not stealing city/country codes for IPs. </sarcasm>
  12. Would you like the TomB truth or TomB sarcastic answer?
  13. As of last night or this morning Pandora.com has removed the artist name and song title from the titlebar of the browsers. This means a majority of Pandora hacks are now broken. You can still copy the MP3 files over manually and rename them, but the chances of an automatic program to do this is minimal.
  14. Oh the code was only a temp thing for me to test the finding window code. I only search for the window in the 3tunes program once.
  15. Dirty D different people learn in different ways. Some people prefer reading a tutorial, and some people like to have things explained to them by an actual person.
  16. Which would end up with about the same amount of code.
×
×
  • Create New...