• Content count

  • Joined

  • Last visited

Community Reputation

1 Neutral


  • Rank
    !Pee-Wee Pimpin!

Profile Information

  • Interests
    Runing up my phone bill?

Contact Methods

  • Website URL
  • ICQ

Recent Profile Visitors

1,762 profile views
  1. Hey I don't mean to be intrusive but I noticed your from the bay area. So am I! Have you checked out the SF hacker space yet? Ive been meaning to see what its all about..
  2. Speaking of iPhone bullshit LINK
  3. Why wouldn't they? And if your selected for one of the 10,000 "officials" you better believe you will be signing your life away with security clearances.
  4. This is definitely going to be interesting, the FEDS are recruiting publicly!
  5. Every one knew something like this was coming sooner or later. LINK Are you ready for Mobile Bot Nets?
  6. Where I currently live a new Digital Power Meter was installed. Has anyone played around with one of these things yet? These things seem vulnerable now because you can no longer see the instrumentation of the meters. All one can see is a digital LED meter. I'm a bit tempted to open the case up and see if any hacking can be done, but here in AMERICA that would be a big NO-NO. Any body else notice these things? Magnets maybe?
  7. How come my damn cookie never expires?

  8. Why though? Being a nuisance and preventing communication can be just as useful of a tool for "cyber-warfare" as more 'tactical strikes' with a much lower technical barrier. Also, exploits can be patched (in a perfect world, they would be patched) and then lose their value to the attacker, but a DDoS can be a right bitch to deal with. I guess that is what makes you a dangerous free thinker.... It just seems like a government like N.K., if they wanted to could possibly do better... crippling some major infastructure or what-not. I've not researched it much, so my opinion is coming from what Mitnick stated about the attacks - something to the effect it was more teenage in nature than government. Looking at the attack, something was obviously compromised though, in order to get a botnet that large. I'm not saying N.Korea did this, but I wouldn't be surprised, because they've done alot of childish things lately. True dat. Not binge on another topic, but N.K. is scary: they want nukes to protect what? Who wants North Korea? I'd like to say it was North Korean Teenagers, but I don't think teenagers in that country can go on the Internet. The speculation I have is.. Kim Jong il is planning on retiring. I think he is simply just preparing his son to take leadership. I just hope I'm right. Just as I thought. Looks like we won't have to "IRAQ" North Korea after all. I guess we will have to wait and see who takes the throne. Also: Apparently someone or thing in the UK could be responsible, according to the article.
  9. I read about the bullshit attack on Yahoo. The FEDZ play every DoS attack like no tomorrow. Average people don't understand that a DoS attack should really be taken with a grain of salt now a days because they happen every day. Any major corporation or government body worth its salt probably has the staff or bandwidth to fend off a botnet now a days, and to label DoS'ing as an "attack" is over zealous, I think. Further more, for the U.S. Government to say that some kid in Russia has the capability to take down entire networks is down right bullshit. Where are the people who question the capability of the U.S. Gov if their supporting propaganda like that? This CyberSecurity Act is the first foot in the coffin for the internet here in the US because knowing the Gov if someone and their buddies decide to PING the pentagon non-stop it will hit news papers tomorrow. But the real concern is if the Act is passed, any one including our very own government can literally DOS networks causing our government to shutdown the net in the name of SECURITY, catch my drift? Where are the checks and balances?
  10. North Korea my ass! They're barely building nukes. Rockafeller's Cyber Security Act of 2009 is right around the corner from being presented in congress. Think out side the box people, it doesn't hurt every once in a while.
  11. Besides RootRepeal and Secured2K, did you use anything else to clean your system? I usually result to re-imaging a system to rest assure the integrity of the OS hasn't been compromised. I have only encountered a virus on a warez site once, the exploit was the latest adobe reader sploit on, symantec bloodhound sniffed up the code right away.
  12. Sometimes I can't help but wonder if the G0V does this on purpose... I guess we will see what happens with the new CyberSecurity Task Force..
  13. I never liked the "VIBE" from that site. Back in my AOHELL days it always lead me to spyware and annoying pop-ups. I am glad they got owned. I never understood their whole "SUBSCRIPTION" service, it always seemed like a joke to me because everything they offered in their member section seemed to already be in the public section. Plus nothing as ever been produced from their site.
  14. This question is probably "googlable", but do you know if one can cluster graphic cards to brute force encryption with CUDA? It would be cool to have a dedicated cracking server with a MoBo stacked with graphic cards..
  15. Restoring the entire PC with a disk image made by a disk imaging program solves the need for all that. It'll even restore it with all the drives and updates you had intact. When I said it restores the PC to the way it was, I meant everything is back to normal and that means everything. No need to reinstall programs, do updates again, reinstall drives and service packs... all that's already in your saved disk image you'd restore. Using programs like this, you're just 3 clicks away from being done with it - cool. In fact, rescue disks are now no longer needed with these types of programs around. Hooray for a lot less work! What software suite are you using? From what I have read, most imaging software will not refresh the MBR. But using a the Recovery option on a Windows disc is a simple task. I ended up figuring out that making an image is the best way to go, and saves a SHITLOAD of time. I stumbled upon Acronis. It has the option to create a hidden partition on a HD and create a bootable backup. If something goes wrong all one has to do is press F11 during backup and start the recovery process, it kicks ass basically. I'm not to worried about failing HD's, because by then they would be no need to install a fresh OS. To save me time in the future I cloned a fresh install and saved it on a external HD like you mentioned, incase I ever need to refresh another relatives system that doesn't have the Acronis software already installed. The only problem I might run into is if said relative is running anything other than Xp Pro, I wont be able to reactivate their installation if I recover from a backup image Also, if anyone else is ever tasked with having to do such dirty work, REMEMBER to BACKUP ALL DRIVERS! By the way does any one know of a source where I can download a shitlist of drivers to save on a external HD? Unfortunately HP's website does not offer all the drivers needed to do a fresh install. I remember surfing into a site that had gigs of down loadable drivers that could be used with nLite....