• Content count

  • Joined

  • Last visited

Community Reputation

10 Neutral

About jelliott7593

  • Rank
    Hakker addict

Contact Methods

  • AIM
  • Website URL
  • ICQ

Profile Information

  • Gender
  • Country
    United States
  • Location
  1. Never stop reading and keep asking questions. I would use your home pentesting lab to practice securing/exploiting certain devices so you can gain some hands-on experience. Understanding how devices, networks, and applications function gives you a better understanding on how they can be exploited.
  2. If you arent on the same network I would say sending them some type of spyware to monitor their activity.
  3. Ok i did what you said. It worked onces i turned down the render distance to medium. Eventually i did get a crash. Here is what i got $ java -Xmx2048M -Xms500M -jar /home/elliott/minecraft.jar 27 achievements 182 recipes Setting user: pewster31, 5399248750545670793 Loading: Failed to open device (/dev/input/event4): Failed to open device /dev/input/event4 (13) Failed to open device (/dev/input/event3): Failed to open device /dev/input/event3 (13) Failed to open device (/dev/input/event8): Failed to open device /dev/input/event8 (13) Failed to open device (/dev/input/event7): Failed to open device /dev/input/event7 (13) Failed to open device (/dev/input/event6): Failed to open device /dev/input/event6 (13) Failed to open device (/dev/input/event5): Failed to open device /dev/input/event5 (13) Failed to open device (/dev/input/event2): Failed to open device /dev/input/event2 (13) Failed to open device (/dev/input/event1): Failed to open device /dev/input/event1 (13) Failed to open device (/dev/input/event0): Failed to open device /dev/input/event0 (13) Linux plugin claims to have found 0 controllers Starting up SoundSystem... Initializing LWJGL OpenAL (The LWJGL binding of OpenAL. For more information, see OpenAL initialized. Placed stronghold in INVALID biome at (43, 42) ########## GL ERROR ########## @ Post render 1285: Out of memory (((((Right here the above text looped on screen for about 100 loops)))))) # # A fatal error has been detected by the Java Runtime Environment: # # java.lang.OutOfMemoryError: requested 872400 bytes for Chunk::new. Out of swap space? # # Internal Error (allocation.cpp:272), pid=2155, tid=715901808 # Error: Chunk::new # # JRE version: 6.0_20-b20 # Java VM: OpenJDK Server VM (19.0-b09 mixed mode linux-x86 ) # Derivative: IcedTea6 1.9.13 # Distribution: Ubuntu 10.04.1 LTS, package 6b20-1.9.13-0ubuntu1~10.04.1 # An error report file with more information is saved as: # /home/elliott/hs_err_pid2155.log # # If you would like to submit a bug report, please include # instructions how to reproduce the bug and visit: # # Aborted I have a 64 bit processor but i am running 32 bit ubuntu. I guess the only way to install 64 bit java would be in virtual box? Or re installing my os.....? If you don't mind me asking, why do you have x86 bit copy installed on a x64 bit machine? I would just reinstall x64 Ubuntu on the machine and install a x64 bit JVM.
  4. Personally, my first language was Pascal but starting with scripting languages like tekio said is a great way to get into it.
  5. Start mingling with the kids that do the daily announcements and gain intel.
  6. Thank you, I'm gonna look into them right now. Have you ever used them directly by any chance?
  7. Fluxbox with stylish conky designs.
  8. Disable unnecessary services (if you'r not using it then it shouldn't be running), uninstall unnecessary software (same goes), make sure EVERYTHING is up to date, implement HIDS and iptables/firewalls (default rule to deny all traffic then allow as you go), utilize SELinux in Fedora environments and anywhere else you can. Also look into securing the services/daemons running on the box from SSH/FTP to DNS. (Disallowing root and anon login for SSH/FTP etc.)
  9. So, long story short I got a WD 1TB external HDD about 4 months ago. Last night it wasn't being recognized by my box so I tried it on several different computers and had the same results. The HDD lights up and makes a quiet clicking noise (Warranty expired already somehow). My question is does anybody know of a good reliable data recovery company that isn't ridiculously expensive? I've been looking around and there's many places I just want to see if anyone has used one before and had good results. I just got old code and projects on it that I wanna be able to recover. Thanks!
  10. Okay so I'm fixing a friend's laptop, the main problem was a virus. I re-installed Vista 32-bit using his product key also ran Windows Updates/drive updates (the whole 9 yards). The issue I'm having is that his computer will connect to my wireless router but will not access the internet. When I manually assign IP and DNS information it works perfect although when I choose the option to dynamically receive an IP it says "Access: Limited Connectivity". I have researched far and wide, done everything from disabling IPv6 settings to poking around in my router config. There is no Anti-Virus from stopping it nor is their an active firewall present. If anyone knows some type of solution that would be greatly appreciated and feel free to ask if you need more info on the laptop/network setup. Thank you!
  11. Not sure if trolled but, what do you mean "connects to the internet on a given port, and logs in."? Are you talking about connecting to a host that has a port you can log in too?(i.e. FTP, SSH etc.) I'm just trying to better understand what you're trying to do so I can better help. But it sounds to me like your trying to learn more about packet injection.
  12. You could run Win7 smoothly with those specs. I would highly recommend against using Vista though.
  13. In particular you can find it here This method allow you to get some privilegies which you can use to do anything on the remote machine that you want to go in!! But, after all, I think that it's a thing that you just do on yours machines for getting practice and not for doing something bad on some computers like a lamers!! Be careful!! Thanks alot Phasma am checking nessus right now @AlexZ yeah true i just want to learn am not malicious.. ;-).. But guyz any other interesting ways of gaining access..?? There are many different ways of gaining access. You first want to find as much as you can about the target, then you look for a way in. You might want to study up on penetration testing, its a standardized method of testing computer security.
  14. Look for an exploit in one of the running services, or you could totally do it the easier way and run a program like Nessus and find all of the vulnerabilities without doing anything.
  15. Yeah they put way to many security marks on them now to make them hard to forge.