• Content count

  • Joined

  • Last visited

Community Reputation

-1 Noobie

About pbx43k

  • Rank
    Mack Daddy 31337

Contact Methods

  • ICQ
  1. I'm looking at getting a new power inverter to put in my car. I'm currently using a small, cigarette-lighter powered inverter, which fulfills my need of power a single device, but simply isn't geeky enough for me. Ideally, I'd like to run the inverter off of a spare battery in the trunk to prevent over-usage of it from preventing the car from starting. I've also read that deep-cycle marine batteries are better for power inverter usage than standard car batteries. It is also my understanding that a car's alternator is not ideal for charging deep-cycle batteries. Does anyone have experience hooking up a deep-cycle battery (or a set in parallel) to a car alternator and having them charge properly? Are there any techniques I can use to ensure that the batteries charge properly?
  2. Partitioning on Linux via command line is much like on Windows. fdisk[1] is used to setup the partitions, and you assign them the appropriate FS-types. For a desktop machine you can get away with a 2 partition setup, 1 for swap an one for the root file system. The root partition would need to be made bootable in this situation. I like to have a separate /boot partition, followed by a swap partition, and finally root. You can also create /usr, /home, /var, /log, or any other partitions that make sense for your needs[2]. The hardest part is figuring out the correct sizes to make these partitions, which can be quite difficult if you are unfamiliar with the distribution you are using or don't have a set plan for exactly what the machine will be used for like you would (should) a server. One thing that can help bypass this difficulty is using LVM[3][4], which will allow you to easily and dynamically resize the partitions after data has already been written to them. [1]http://tldp.org/HOWTO/Partition/fdisk_partitioning.html [2]http://tldp.org/HOWTO/Partition/requirements.html [3]https://help.ubuntu.com/community/Installation/LVMOnRaid [4]http://www.tldp.org/HOWTO/LVM-HOWTO/
  3. That just restarts X, doesn't leave you at a shell. I usually just use Ctrl+Alt+F1 to switch to a terminal. When the nVidia drivers go to run, they'll kill X for you and restart it when done. You could also run a "sudo killall gdm" from the console to kill the Gnome Display Manager, killing X with it.
  4. It is my understanding that the location of the encrypted keys on a pressed DVD is unavailable for burning on recordable DVD media. Because the keys cannot be burned to the proper location on the disc, a standard DVD player will not be able to decrypt the rest of the content. I was able to locate this relevant Google Answers posting. It seems to indicate that DVD+RW drives may be able to burn the appropriate bits with a firmware modification. This info is about 3 years old, so it might not be accurate.
  5. Ruby on Rails is a combination of the Ruby programming language and the Rails web framework. While you could use Ruby to create exploits and worms, you would generally not use the Rails part in such a project. Ruby is actually a pretty good choice for writing exploits. The new version of Metasploit has been completely rewritten in Ruby, which provides an excellent base for generating exploits. One of the reasons given for switching Metasploit to Ruby is the enjoyable nature of its syntax. Ruby also provides easy to implement cross-platform threading which comes in very handy for a tool such as Metasploit. I've been working with Ruby for about the past year or so. I was originally turned on to it by one of the web developers at work and approached it from a web-app perspective. I quickly saw the power of the language and began using it as a primary scripting language in my role as sys admin. I've believed from early on that it would become a premier language for security tools because of its strong use of object oriented programming and high level of introspection. For more info on learning Ruby check out Why’s (Poignant) Guide to Ruby which is a fun, one of a kind introduction to the language and appropriate even for those with no programming experience.
  6. Its not pretty, but I usually use ntpasswd for getting into 2K and XP boxes.
  7. You can setup multiple InputDevices in your X configs, so I don't see any reason why it would be impossible. You might need some customized drivers for the devices to separate their input and probably some custom code in X to handle the multiple pointers. I've never used a graphics tablet with Linux but if that acts separate from the mouse input it might be a good place to start for ideas.
  8. Setting up a serial console is easy as long as you have the equipment and correct info. The first thing you need is a null-modem cable. This is the serial cable version of a Cat5 crossover. The second bit of data you need is the settings of the console - Parity, Baud, Data size, Stop bits, and Flow control. These should all be available in the documentation for your bootloader, you may even set them yourself. You can learn more about these settings from the Serial HOWTO on TLDP. Once you have your null-modem cable connected between machines and the settings entered into PuTTY, turn on the headless machine to access the serial console. In Linux I use minicom as my serial console interface.
  9. Radio synchronized atomic clocks are used for NTP servers. A device that is capable of spoofing or jamming these signals could cause all sorts of havoc for time-sensitive operations.
  10. You want a crash course on electrical engineering?
  11. I'm going to get basic here, please don't assume I'm being condescending. Just trying to make sure you understand all the way along. Partitions are ways to slice you hard drive into smaller portions that act as separate devices. These partitions are formatted as particular file systems. File systems define how files are stored on the disk and how the operating system should access them. There are a ton of different types of file systems and not all operating systems can work with all file systems. In order for you to share files between Windows and Linux, the files must be placed on a partition with a file system accessible to both operating systems. VFAT, FAT32, and NTFS are all examples of file systems created by Microsoft. VFAT and FAT32 have been around since 1998 and earlier and are well documented. NTFS was developed for Windows NT and has been continued in 2000, XP and Vista. NTFS is not so well documented as Microsoft has limited the information available on how it works. The FATs have been successfully implemented on Linux and can be safely accessed for read and write operations. NTFS has also been implemented on Linux but until recently it has been recommended that you not write to NTFS partitions from Linux because of flaws in the drivers. NTFS-3G is a set of drivers for Linux that is supposed to be stable enough to perform both read and write operations on NTFS, though it is still rather new and should be used with some level of caution. ext2 and ext3 (sometimes e2fs and e3fs, respectively) are examples of common Linux file systems. Like the FATs, these are well documented and free for any one to implement. There are drivers available for Windows that will allow you to access ext2/3 partitions from within that operating system. These drivers allow both read and write operations to the file systems, allowing you to read existing files, modify them, and create new files. When your computer just contained Windows XP, the hard drive probably contained a single partition formated with as NTFS. When you installed Fedora, you created a new partition or two or more. These partitions are likely formatted as ext2 or ext3 file systems. You have a few choices in ways to proceed to share files between the operating systems. Your first choice is to use the existing partitions to share files. This will require installing the appropriate tools on your operating systems to access the file systems. If you want to access files located on the partition where Windows is installed from within Fedora you will need NTFS-3G. This will give Fedora the ability to read and write files on the C: drive in Windows. If you want to access the Linux file systems in Windows you need to install a driver such as the one at http://www.fs-driver.org/ as recommended by dalejrrocks. This will allow you to browse the Linux filesystem from Windows Explorer. You may choose to install both tools in their respective operating systems in order to access all your partitions no matter which OS you have booted. The second choice is to create a new partition and formatting it as a file system that both operating systems can natively work with. If you were to create a new partition formatted as FAT32 both Windows and Linux could read and write to it without installing any additional drivers. The downside to this method is that you have to allocate space to your new partition, which may be at a premium depending on the size of your hard drive. I hope that helps. Follow up with any questions you may have.
  12. http://www.rfc-editor.org/ http://wikipedia.org/ http://howstuffworks.com/ Some of your questions, like how ports carry packets actually represent a misunderstanding of TCP/IP. Ports don't carry packets, packets contain data indicating what port they are intended for. The ports in TCP and UDP are not physical things, its just a way to easily identify and standardize what application or type of application should be getting the data.
  13. Assuming this is the Blackwidow software you're talking about, I don't see any mentioned feature of locating files that are not linked to. In Linux, wget can recursively spider a site and tell you all the files that are linked to. As far as finding unlinked files, I would think you'd need to find a directory that had indexing turned on which would create a page of links to all of its files. How is accessing these files helpful in breaking htaccess? Are you finding sites that keep their htpasswd files in web accessible directories without blocking requests to them?
  14. One common method to check if a file is already infected it to include a known bit sequence at a predetermined location in infected files. By checking for this fingerprint, you can determine if a file is infected. It is also dead giveaway to antivirus that a file is infected.
  15. Authentication cookies do not normally store the password in any form. Cookies usually hold a session id that the webserver can use as a key to a hash or database table. That is likely what you are seeing above. It used to be not too uncommon to find personally identifiable information in cookies, including usernames and passwords, but any web programmer with a lick of knowledge about securing their app wlll not put that in a cookie.