clemons

Members
  • Content count

    34
  • Joined

  • Last visited

Community Reputation

0 Neutral

About clemons

  • Rank
    H4x0r
  1. There was a presentation on automated wifi hacking at the 25c3. The topic was "Short Attention Span Security". Basically, the point is to have a small low power box that sits in your car and automatically breaks into wifi networks with aircrack. http://www.awgh.org/?p=76
  2. If you have the windows disk, you can put the disk in and repair the windows installation that you already have. That is, it will restore all the important system files so that way it can start up again. This shouldn't harm your personal files in any way. Also, if you think your hard drive might be having some troubles, you can also run chkdsk from the windows disk to fix up the hard drive.
  3. I don't believe this is legal, because financial transactions require date information. A proper agreement would have a date at which the payment is legally required to be paid, and short of that, they could just keep the money they owe you indefinitely. You are also probably legally required to establish a method of payment before you can expect compliance. Although, I don't doubt that even if you somehow handled these transactions on a personal basis, you WOULD be laughed out of the court room. Oh, and if you charge money the government can probably investigate and spy on your website all it wants. EDIT: You should also realize that most people use the Internet through an IP address leased under someone else's name. You might as well just make the document say NO ONE IS ALLOWED IN THIS WEBSITE. You will definitely need a lawyer to make anything that will hold up in court.
  4. I recall hearing that the interesting part of quantum authentication is that if there is a MITM attack, the eavesdropper ends up changing the quantum behavior of the system in a quantifiable way. That is, the quantum mechanical predictions change if there is no eavesdropper [see Heisenberg Uncertainty Principle]. By using statistical analysis, a quantum encryption tunnel can actually be guaranteed to be free of eavesdropping. At least, that's the theory as far as I understand it.
  5. You clearly know more about fermentation than me, Colonel Panic, however I think that you may have taken my short post a little too seriously. Sorry if I was unclear, I never meant to suggest that CO2 created vinegar. I assumed that everyone knew that if CO2 was left to escape that it would allow air in, which would then create vinegar. Le Chatelier's principle is important because if there is more CO2 in the environment, it is harder for reactions that produce CO2 to reach completion. Although I admit, I don't know why in my chemistry class we used some chemical as opposed to water for our "lock", I think we both agree that it is best if the CO2 is able to leave the fermentation tank by some means. I am sorry, my intention wasn't to be overly descriptive or to pretend to be a seasoned authority. I was just trying to explain where I would go to find the necessary hardware.
  6. Lol, trying to delete my ridiculous post.
  7. I know pressure washing companies use large 200 gallon drums to hold water. These would be ideal for larger scale fermentation. Also, instead of using the balloon, it is possible to run the exhaust into a chemical (I can't remember which) which will neutralize the CO2 and enable the fermentation reaction to proceed at a faster rate (for chemistry see "Le Chatelier's Principle"). Remember you can't release the CO2 directly into the air without creating vinegar. My point was, you could probably get a lot of the equipment you'd need from a pressure washing supplier.
  8. Isn't there an option to configure your partitions manually in Ubuntu, instead of having it set up everything automatically? I haven't installed any of the new ubuntu editions, but you should still have access to more primitive tools. Perhaps you could also consider simply running a virtual machine from windows and installing a more basic linux so that you can run the linux utilities. I'd also recommend trying another kind of linux if the ubuntu installer is giving you trouble. One of the big reasons to use ubuntu, after all, is the easy installer.
  9. To say just a pinch more: If you chose a topic such as that one, you'd want to make it clear in the introduction that the reader should understand what a serialized object and what a self-adjusting binary tree is, and then explain how they work together. To explain all three of these things would be far too much for a small tutorial to be effective. This would much better be three or more tutorials. Sometimes a series of easier to write tutorials is more useful. I hope to see great things out of you.
  10. Please: * Don't write another language tutorial ("C++ for noobs and boobs", "Python for the Non-Programmer", etc) unless you have been using that language for a long long time and have seen a definite way your tutorial will be an improvement over all others. * If you have very bad grammar, you shouldn't write a tutorial until you improve your grammar. * Don't write in pompous language or write beyond your means, it decreases readability and increases frustration. Write in a clear general way, the same way a newspaper journalist writes. People want to be entranced by ideas, not confused by literary fluff. * Make the prerequisites for reading the document and the goals of the document clear in the introduction. If one says ASM isn't essential, but then uses ASM core dumps to explain a program's behavior, not only is he being disingenuous, but he's losing touch with his envisioned audience. You need to know who you're writing for and what they should know, otherwise your tutorial, be it full of great information, will only appeal to people who don't need it. * Write multiple drafts. If you're going to go through the trouble of writing a tutorial, why not do your best, the same way you would if you were in a class? * Cite your information / give people places to go to review the concepts an ideas talked about in your document. * Use CLEAR examples. Don't talk about example A next to the picture of example B, its the most confusing ridiculous shit ever. * Recognize that most 'hacking' tutorials are horribly written. In fact, some documents, such as "malloc maleficarum" contain errors which make actual exploitation impossible without some expert knowledge. * In most cases, a disclaimer is probably legally useless. Instead, use the less-lame introductory section to explain the equipment being used in the demonstration (and how you have legal right to do what you're doing). A poorly written tutorial is of little use and it is because of the ubiquity of shitty writing that hackers more often turn to editor reviewed books than to tutorials anyway.
  11. Don't worry about titles (whether other people think you're good enough to be a hacker). It's not about how much you hack, its about enjoying the hacking you do, even if there is only a smidgin of hacking on odd occasions. Just do what you like, and like Aghaster said, don't waste your time so much. I like to take advantage of the audibooks and visual audio lectures on the Internet to make the most of my non-computer time, which allows me to do more learning during times when I'd usually just be spacing out and thinking about how bored I am. Just try to keep things fun, and don't compare yourself to other people, and don't limit yourself because other people have limits.
  12. Simply change 'user agents' with an add-on such as: https://addons.mozilla.org/en-US/firefox/addon/59. You can probably find better add ons. Good luck. [Oh and down with Microsoft!]
  13. We should just ban marriage altogether, then everyone wins.
  14. 1. As far as I know, the security of quantum entanglement isn't that no one can disrupt your communication, its that if someone DOES observe your communication, the superposition collapses, and the eaves dropping _is detectable_. So, you keep transmitting until the laws of physics guarantee you weren't watched, and that is the best part of it, as far as I understand. 2. Quantum cryptanalysis DOES check many keys at the same time (using superposition). The rules say that if you look at a system in superposition, you destroy it, but if you don't look until the cipher has been cracked, then you harness the power of superposition to execute a search that no classical computer can compete with. 3. Quantum computers AREN'T faster than silicon computers. Classical processors aren't going to be replaced, because what quantum computers don't do exceedingly well, they do at horrible cost. I would guess that a much more likely outcome will be that silicon-based processors will eventually contain 8 quantum-bit cores for performing certain computations.
  15. Stealing is wrong because something is lost, not because something is not created. There is no ethical problem with pirating something you've already spent money on. Furthermore, there is no ethical problem in pirating something you are certain you would have never bought anyway, because you're closer to buying it after downloading it. The only ethical problem is when you do not pay for something you would have otherwise, because you pirated it. Then, maybe there is a good reason to feel guilty. As an example, when I was younger I downloaded some songs from a band called Sonata Arctica. As I acquired more of their songs, they quickly became a favorite of mine. Slowly, over time, I bought their CDs, and now I own them all. Of course, there are some bands i've listened to or do listen to, whose CDs I don't own, but that's because I have only so much money to spend on music. When I have money to spend on music, I will spend it on music, and until that time i'll just have to listen for free, because I am not hurting anyone. And even after I own a CD, I usually still use the mp3s, because they are easier to access. Of course, on the flipside, one of the computer games I intended to buy came out early on a torrent tracker, so I downloaded it. By the time the game was released I had already beaten it, and though I intend to play it again, I still have not purchased it. I still feel guilty for not buying it, because i took the money that was supposed to go that game, and kept it for myself, and played for free, only because it was cheap and easy. (Keep in mind I still intend to buy the game and play it again, after i've had time to forget the storyline, and the next time i'll have mods and expansion packs). There is a huge difference between these two examples morally, even though there is little difference legally. In short, do your best for yourself without hurting anyone else. Good luck