Binrev Financier
  • Content count

  • Joined

  • Last visited

Community Reputation

81 Knowledgable

About tekio

  • Rank
    The Man In The Box
  • Birthday April 8

Profile Information

  • Gender
  • Interests
    Eating brains.
  • Country
  • Location
    The Blue Nowhere

Contact Methods

  • Website URL
  • ICQ
  • Yahoo

Recent Profile Visitors

31,845 profile views
  1. You may want to notify local law enforcement. This is a very serious crime and will be investigated to whether it warrants a real investigation. Law enforcement is trained to handle this type of thing. Please, don't so something and risk these people getting off on a technicality because evidence was illegally produced. Let the experts handle something serious as this.
  2. Actually got to use my MCSE subletting skills ay work today. No Solarwinds Subnet Calculator needed. Buwhahahaha

  3. I.P. Address. IMO - anyone who needs to access a remote system should be smart enough to read a word document and follow screen-shots. I actually went through this with our G.M. where I work. Basically said, "the users need to revolve around the I.T. Department. And I'd like to think they could follow these steps (screen shots of putting in an IP address into our remote client). I still have a job. :-) I like to stay away from Dynamic DNS for business. For me, Dynamic DNS leaves a host too discoverable. I have obtained zone transfers from a major DDNS provider before. :-( EDIT: from the way TCP works anything would need to reconnect anyway, for the most part. Anything that established a session would be left dead in the water and need to make a new virtual circuit???? Maybe some remote clients are able to do this. A VPN that tunnels everything into UDP could correct however. But it seems users experience a time-out and try to reconnect anyways. But that's me talking about educated guesses. :-)
  4. Dynamic DNS would work well in the situation: just make script to update DNS. Or better yet - just train offsite employees to use the IP address of failed over static NATs. Internal it would be invisible: the default gateway is the same - the border router would just sense failover, then use the port/interface providing the static NAT to the failover ISP.
  5. I'd use Perl: LWP::UserAgent. Then make a separate browser instance and loop through it for however many number of times you want. HTTP apps should not care about IP address only valid sessions as the programmer defines. Ever-time a tab that is opened in a browser a cookie could make it use the same session for for every instance of the web browser. So looping instances through something like LWP::UserAgent and controlling the sessions making each look like a unique request should work (in LWP::UserAgent give each its own cookie jar). Example: Bob logs into pc and into gmail. Bob's session will be continued and he will auto-login from again with a new tab. Bob log's out of computer and Jane logs in. Jans's HTTP session is different from Bob's. If Jane opens Gmail in Opera and not I.E. she has a different HTTP session. This is because HTTP doesn't have sessions - these are done in PHP, ASP, or JSP. And the developer uses cookies to maintain session state (usually HTTP cookies in memory). So new browser sessions with their own cookie jar. And each should be new to the web-app. However, you may need to see how the web-app checks session state by looking at the cookies.
  6. No, when he mentioned "if you like doing it". That is something a person would need to like doing. Basically a career as a Computer Scientist. I.T. is much easier than Computer Science.
  7. For every bug found, there are several that are never found. Windows 7 is said to of had 40 million lines of code. That's a potential for over 40 million vulnerabilities. EDIT: what glitch was getting at (I think). This type of work is really hard work that takes sacrifice: weekends doing research, all nighters a few nights in a row, girl friends getting disinterested and not allowing time you need to keep up with technology etc... But would be very satisfying as not many achieve the ability to be professional security analysts at that level. Good luck man!
  8. Was war-dialing once and found a Telco switch with common or no credentials (unsure but can remember the first thing I tried logged me into it). Just logged in and looked around for about 5 minutes at different stuff connecting then logged out and never went back. Sure I could have caused some serious mayhem (but also done some serious time). Unsure what it was - but pretty sure it was Telco. Could see different numbers and stuff connecting. Would have taken a screenshot but was too worried about being able to deny it ever happened (LoL).
  9. Apple is funny... Feature number two: we took away a feature so you need new headphones, too.

  10. That's pretty cool. Cannot remember how many times in the past, could have used passthru for a PCMCIA card with BackTrack. Would have saved me hours of dualbooting notebooks.
  11. Triple boot that sucker! 1) vsphere for sever stuff. vsphere's hyper-visor will run VM's faster than Workstation running inside Windows. Probably use a few lRAID arrays for this, Maybe two: one for a data store booting and running the virtual O/S another RAID array for storage datastores.. 2) Windows Install for direct hardware access (running stuff like brute forcing, etc... 3) Linux Install for the same. Here is how I'd configure the RAID / Disks: System boot array: about 500GB-600GB running speedy SSD's for hosting a datastore for system boot disks If you can a separate array for non-boot data-stores about 1TB The better you can segment the RAID arrays for each datastore, the faster disk access in a virtual server will be. For example to run say Sever 2012 and Linux: 300GB SSD RAID Array = DataStore0 == Windows C:\ Drive 1TB HDD RAID Array = Datastore1 == G:; H: 300GB RAID Array = DataStore2 == Linux /boot; /bin; /lib; sbin 1TB RAID Array = Datastaore3 == /home; /etc 250GB SSD == Windows for direct hardware access 250GB SSD == Linux direct hardware access 32GB SSD == vsphere HyperVisor install Get the most use out of that hardware as possible. Just my opinion and what I'd do with it. :-) EDIT: for gaming and what you wanted hardware passthru would work, as Dins stated. Didn't know a GPU was supported though. I thought for vsphere passthru was just used with USB and other buses, not PCI-E. But I've never really tried to do that.
  12. Same here, those schools are expensive. I've heard WASU was one of the best party schools next the ones in Cali, Arizona and Florida though. LoL Went to Pierce College, then a Tech Center. Then got smart and got a job for a place with crappy wages, but on the job experience and free Microsoft Certified Training. They were a consulting, ISP and MCT (Microsoft Certified Training Center).
  13. A few years ago someone in here posted internal documents from a carrier, I think MCI or something. And welcome to the forums.
  14. Was always under the impression Gentoo was supposed compile everything and optimize it for the CPU installed? Anyway, I got tired of Gentoo just because it earned street cred online. Maybe I should just lie and say I use FreeBSD? But since everyone here knows I use OS X a lot - some BSD fanatics would probably own me for being a poser. :-(