Jump to content

bestoftincho

Active Members
  • Posts

    6
  • Joined

  • Last visited

Posts posted by bestoftincho

  1. While I won't get into the 'script kiddie' argument (which btw feels like the ongoing VI vs. EMACS debate) I can comment about the way we handle subjects like this on the show.

    The vast majority of our audience don't already know this stuff. Here on the forums or in IRC it's much different since we're obviously the more technical users or hardcore fans. But to someone interested it's much easier to keep attention when we try to show results and keep things hands on. We've also got a hard limit on the length of a segment that's shorter than other IPTV shows. Of course we could go on for 40 minutes about one topic, but at that point it's no longer a variety show and we've put a number of people asleep. One of the best parts of the show is the variety and if you're not so much into one segment, don't fret in 5-7 minutes there will be another one. We aim to provide general overviews of topics while giving demonstrations and pointing out key elements. If what is shown sparks the viewers interest they will be inclined to visit the show notes for more information on the subject.

    As we all know hacking (in the most general and oldschool use of the word) cannot be taught. We've all come to where we are technologically by learning on our own. However we wouldn't have known what to research if we didn't see or hear about it somewhere. (for me one of those first somewheres was WarGames and example bas files) I think you get what I'm trying to say here.

    And as for the buffer overflow segment, I've just got to say that it was WAY better before they got drunk. I'll also take the blame as the director of that segment since I was really pushing time and getting in the way. This was before Wess started directing and we we're still getting our feet wet. Before the booz and cameras the conversation was indept, accurate, and interesting.

    Wow, great talk!!

    I totally agree with you aardwolf, and for those who still don't get it, watch 8.5

    By the way, a question to aardwolf: whose hands are the ones on the dvorak layed keyboard on chapter 8.5?

    another: just for curiosity, how much of a "penetration terster" are you aardwolf?

    You guys are great!!

  2. I found a person who is working on one:

    http://ajaxtorrent.wordpress.com/

    great' date=' thx, I am going to see what is about.

    I have already tried uTorrent with encrypted protocol and it worked at the beginning but it doestn't work any longer (I only get reasonable speeds with extremly seeded files).

    Have you told uTorrent to only accept encrypted connection? If so then I recommend that you turn it using encrypted preferable but still accept normal connection. Other than that I can't suggest anything, I don't see how your ISP would be able to filter your encrypted traffic, its bascially impossible because what it looks like. Have you tried changing the port on the client you use, uTorrent has a feature for randomising the port number it uses, try that.

    I have tried everything you have told me already. My guess is that they filter my traffic when there are too many conections established with different ip's. I don't know how they do it, but they certainly do it. I download at 126KB/s with HTTP and at 8KB/s with very-seeded torrents, while I used to download at 100KB/s with this kind of torrents.

  3. Yes, my ISP is using traffic shapers (they filter p2p traffic, including BitTorrent). I have already tried uTorrent with encrypted protocol and it worked at the beginning but it doestn't work any longer (I only get reasonable speeds with extremly seeded files).

    Or will I have to invent a p2p client using Ajax and home-http-xml client-servers?? hehehe

  4. Are there any antivirus that are not detected by antivirus?? Maybe if installed with a rootkit? Harisson?

    I have never knowen any antivirus software that is detected as a virus. I remember a few instances where some anti-spyware programs where detected by antivirus software, but that hasn't happened recently.

    I meant keyloggers

×
×
  • Create New...