• Content count

  • Joined

  • Last visited

Community Reputation

0 Neutral

About BSDfan

  • Rank
    SUP3R 31337 P1MP

Contact Methods

  • ICQ

Recent Profile Visitors

5,165 profile views
  1. People are lame.. virtual crimes are even lamer.
  2. Did you even try? :|
  3. Rachael Leigh Cook is hot, she made that movie worth watching... too bad no movies like that are made anymore. (Update) Oh, and the best thing Apple did was use BSD as the basis for their operating system, down with embedded GUI-only operating systems without an adequately sophisticated text interface.
  4. They have a datasheet... it could be running Linux or WinCE... assuming it's obtaining a DHCP lease from your gateway, play around with it.. see if it's running telnet/ssh. Don't be too excited, it has some clearly proprietary functionality.. mostly the HD DRM crap. My advice: disassemble it.. find datasheets for individual components.. learn, post lot's of naked pictures... of it, not you.. thanks.
  5. There should be an organization that rescues computers from unworthy owners.. Love the blog btw, found it referenced in one of your posts... didn't realize you're also the person who demonstrated that video on the 8086 thing. Please ignore any of my violent outbursts, I just use this place to vent.. the people here are rather silly though.
  6. Windows pioneered nothing, nor did Microsoft.. technology and adequately fast computers existed before Microsoft's dominance. All they've done is proliferate technological ignorance, Windows users have no minds... and souls simply don't exist.
  7. Show a little initiative sir.. track down the controlling process, I'll give you a hint.. lsof.
  8. People like moth here should be jailed, indefinitely.. they may have been naive and ignorant, but you're downright arrogant and destructive.
  9. Every fax machine is different obviously, some are more sophisticated then others... you would need to do vendor/model specific research and plan the appropriate "attack vector". This means, obtain an identical model.. attempt to dump any (E)EPROM's.. figure out the architecture used. (It very well could be a in house ASIC design, custom architecture.. embedded OS.). Until you have a chance to disassemble the routines you're interested in "exploiting", you're most definitely flying blind... you'll have to reverse engineer the hardware before the software.
  10. Your comment adds nothing to this topic. There is no method of browsing files on a TFTP server, you must know the file name beforehand.. I'm sure he's aware there is nothing preventing him from scanning a range for available TFTP hosts. My post in 2 words: You suck.
  11. OpenBSD, fluxbox.
  12. People have this weird idea that memory mapped devices "steal" or "utilize" their RAM, that's incorrect... a 32-bit processor can access 4GB of address space, regardless of how much RAM you have installed, there is 4GB of address space, though... most of the addresses are disconnected, i.e: void space, installed RAM and other devices are eventually mapped into this space. Now, if you have 4GB of RAM installed in a computer.. it's obvious you can't map all 4GB of it into physical address space... because other things, MMIO devices for example.. have first dibs. Intel x86 processors for example.. actually have 36-bits of address space, but due to architectural limits.. i.e: 32-bit registers.. you can really utilize it without OS PAE or PSE36 support. In this case, if you install 4GB of RAM on a processor that supports PAE/PSE36, some of that RAM is mapped above 32-bit physical.. out of reach unless the operating system supports PAE/PSE36 properly. So again, memory mapped devices don't steal RAM... they just take its place.. with the exception of some embedded GPU implementations, they do that.. .
  13. Even they allow native applications, granted with a flawed "signing" requirement.. i.e: Apple Store run by nazi ninjas. But, you can run always jail break it, run OpenSSH, turn it into an interesting BSD powered device... Anything running Android is a crippled Java platform... we've seen that already, it's old news.... there are cheaper, less locked down phones out there that allow native applications, they'll always be better then a Java-Phone. As I said, Android is full of lame.. don't deny it.
  14. I think it's lame, they use Linux as a kernel.. but disallow any native applications, it's just some Java crap that's totally useless. This project is full of fail. Java sucks.
  15. I dare say duper and oddflux have shit for brains.