Jump to content

buffy

Active Members
  • Posts

    115
  • Joined

  • Last visited

  • Days Won

    2

Everything posted by buffy

  1. http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=220768216260#description That made me laugh a lot.
  2. Google Chrome > Chromiminnmun Have tried both and found Chrome is less buggy.
  3. Tomshardware isnt what I would call a good source for info on products. If you pay the correct amount you get a stunning review from them. Benching: http://www.anandtech.com/bench/CPU/2 Reviews: http://hardocp.com/ I am running 2x 4890's which have the same power is 1x 5870
  4. That chap is based near me and he knows his shit.
  5. Its been compressed if you view it though chrome element viewer it should show you what it really does.
  6. OpenVPN works lovely in conjunction with ClearOS documentation: http://www.clearcenter.com/support/documentation/clearos_enterprise_5.1/user_guide/pptp_vpn download: http://www.clearfoundation.com/Software/downloads This runs best on dedi hardware, mine is running on an atom D510 2GB and 30GB SSD, however it takes next to nothing to run it. You can install on a Virtual box and run it from there as well.
  7. How can it be cracking when its done in the a control environment and will provide benefits with no drawbacks?
  8. http://www.reghardware.com/2011/03/21/apple_macbook_pro_2011_freezes/ Mac books are the same hardware as PC's cost more and overheat because the engineer didn't think CPU's need cooling .... again.
  9. I got into hacking (NOT CRACKING) because I like to make things and get a kick out of running networks that are efficient and secure. If you want to be a cracker I have little time for you. To start hacking on an exciting level get a wireless access point enabled WEP and set a password. Download backtrack and make a bootable usb stick. Then attempt to hack YOUR wireless access point to see if you can get the password back. There are 100's of tuts and vids on how to do this.
  10. First off really sorry if that has already been looked at and covered but after a quick google and no decent results I thought I should bring the topic up for discussion. 1. Which member of an organisation is lightly to have a smart-phone with exchange capabilities? The network Administrator 2. What level of account access to a lot of network admins account have? Enterprise Admin 3. How many phones get stolen every month in the UK? As many as 10,000 mobile phones are stolen every month - met police So my question is how easy is it to either extract the hash and either straight out decrypt or just pass it? Dose the phone have to be stolen to get access to the password or can we use Ubertooth?
  11. I dont think being crazy should or would in general get you murdered.
  12. Most websites wont go 6 only in my life time (aged 27) Its like this> 1. IPv4 2. IPv6 over IPv4 3. IPv4 over IPv6 4. IPv6
  13. Thats about if a sweeping statement! Did you get that from this book?
  14. If it sounds to good to be true it probably is.
  15. take the bad drivers off the road not the cars. also we as a race are not having a problem with decline in population we need to work out way to increase risk in our lives.
  16. find out what port the hacker is connected on then add a port forward and alter the physical nic the server is on. So effectly you move the server to new IP range on the an orange part of your firewall. This may drop the hackers connection but I would suggest you will see a reconnect with in 10mins. If the system has not crit data on then call the police and make sure all your logs are on, firewall and server, dont block the hacker as you may not be able to track them down again. If it has crit data on, best to start full disclosure as other wise shit like this comes back to bite you, and cut all connections then run a forensics distro to freeze the system.
  17. http://mail.google.com/mail/help/motion.html Not quite TISP
  18. Key logger story is false: http://www.theregister.co.uk/2011/03/31/samsung_keylogger_rumour_debunked/
  19. http://www.fbi.gov/news/stories/2011/march/cryptanalysis_032911/cryptanalysis_032911
  20. buffy

    Backtrack 5

    Exciting looking forward to it :D
  21. Ok this what you need to know about gaming and CPU's You want the process with the most raw power and smallest die. a 4 core AMD will out perform a 6 core AMD when gaming. i5 will whoop the shit of out an AMD 4 core and will cost the same. So i5 + AMD Graphics card = win. If you want proof my suggestion look no further than: http://www.anandtech.com/bench/CPU/2 But now you need to HOLD YOUR HORSES as Bulldozer is just around the corer, and its a game changer. When it comes expect PRICE DROPS.
  22. Nice project! I dont like playing with PSU's cause you can die and tbh, I have many better ways of going out than with a PCB. :)
  23. Best way to eat it is by burning the feck out of it then throwing it away and getting a proper sandwich.
  24. I really would love head over to and meet you dudes then head over to whister for some snowboarding. However its all about timing and funds, as I say you should join us for i42 http://iseries.multiplay.co.uk
  25. Bless you Infiltrator, my comment was a sexual pun.
×
×
  • Create New...