Agents of the Revolution
  • Content count

  • Joined

  • Last visited

  • Days Won


Y0ungBra1n last won the day on July 22 2016

Y0ungBra1n had the most liked content!

Community Reputation

4 Neutral

About Y0ungBra1n

  • Rank
    The floor is made of lava!
  • Birthday 10/24/1989

Profile Information

  • Gender
  • Location
    Sal Tlay Ka Siti
  1. I pop in about every week or so. I'm on IRC practically every day, though
  2. I've also heard that conduits will be compressed with air to detect cuts and breaks so servicemen know exactly on what haul segment the leak is located.
  3. Sure. Try plugging it into your customer access panel on the side of your house. Inside you should find red and green screws used for testing with your buttset. The red connector (ring) goes to the similarly colored connector on your set. The green (tip) connector is connected similarly. Here's a link with more info about the customer access panel. I used to do it on my house. Buttsets are also good for testing unterminated pairs of wire.
  4. I just bought this book a couple weeks ago and have been making my way though the first few chapters. It has been a great read, transporting me back to a technical age for which I was not present, helping me catch a glimpse of the lives of the phreaking forefathers. I'd definitely recommend it, especially for the younger enthusiasts who were not present during the evolution of the telephone inter-network. It motivates me to continue going out and exploring! [edit]Here's a link for anyone looking to buy.[/edit]
  5. That's a really disappointing turn of events from Google. There is a large portion of web users who have servers by their definition. I understand this to mean that technically you couldn't have dropbox or Google Drive since those push and pull files to other computers... shameful.
  6. After my post last year, I have done quite a bit of VoIP work and have found the SPA3102 to be inferior to the OBi110 for FXO to SIP conversion. They are relatively inexpensive at around $50 on Amazon. Check out this link for more tips.
  7. It look like FERMI is just the name of the architecture. So I believe you should be fine to link those cards with SLI, because they are the same card, just labeled differently. Of course, you can never be completely certain that the cards are compatible (manufacturers change chips, firmware changes, etc), but it appears that they are, so proceed at your own risk.
  8. This sounds like a job for Dock N Talk! There are plenty of ebay knock offs (not sure how well they work). Check this out: http://www.ebay.com/itm/200267286988
  9. I wrote this for some students in my CISCO class that were having trouble with subnetting and I figured I may as well post it here. This is a write up of what goes on in my head while I determine subnets. Feel free to expound on any concepts mentioned. Okay, for the question "For the LANs attached to the branch routers, divide the address space into four equal subnets" the answer is,,, and, okay? Now here's a very in depth reason as to why, which I hope will answer some questions: A bit is either a 1, or 0, okay? That's 2 possible combinations for each bit. You've heard that before. Alright, so each number in an IP address can range from 0 to 255. Why? Well that's because a computer represents IP addresses as bits. For the computer to understand an IP address, each number in an IP address is represented by 8 bits and there are 4 total groups of numbers (XXX.XXX.XXX.XXX), for a total of 32 bits. (Remember the total, it will come back in a little while.) Okay so this part is a little complicated but as was mentioned each bit as two possible combinations (0 or 1, off or on) so if we have 2 bits together then there are 4 possible combinations (00, 01, 10, 11) and if we have 3 bits together we have 8 possible combinations (000,001,010,011,100,101,110,111) and so on. Alright, so stay with me here: There is actually a pattern to the possible number of combinations. If you have 2 binary bits then the possible combinations are 2^2, or 4. The pattern could be stated as: two combinations to the power of how many bits there are (2^n), in this case 2. If you have 3 it's 2^3, which is 8. So we said that each group in an IP address has 8 bits, right? Okay so the maximum number of combinations in each IP address group is 2^8 (two combinations times eight total bits) or 256, which is where the limit of 255 comes from. This is because, in computing, 0 is the first digit we count, instead of 1, so instead of being 1-256 it's 0-255. Just a little quirky, but you'll need to remember that. And now we have another tricky part. When we as humans count we go 1,2,3,4,5,6,7,8,9 and then we restart at 0, but add one to the tens position to get 10. Then we go 11,12,13,14,15,16,17,18,19, start back over at 0 and add one more to the tens position to get 20. We work from right to left like this as numbers get larger (1000 = 999 + 1). We do something similar with IP addresses. For example, if we have an IP address of 0 0.0.255 (in bits: 00000000.00000000.00000000.11111111) and we then increase the address by 1, we start back over at 0 and add 1 to the next group to the left, getting (in bits: 00000000.00000000.00000001.00000000), alright? Okay that means that the 1 in the second group represents ALL of the numbers in the first group. So if you follow me then the address would mean we are on address number 3 * 256 + 129, or 897. We multiply 256 by 3 because of the 3 in the second group. The 3 in the second group represents 3 full groups of the first group and the maximum addresses we can have in group one is 256, remember? We then add 129 (because we started at 0, not 1) for our total of 897. So just remember that every increase by 1 in group two represents a full group one ( = + 1, in bits 00000000.00000000.00000001.00000000 = 00000000.00000000.00000000.11111111 + 1), and an increase by 1 in group three represents a full group two ( = + 1, in bits 00000000.00000001.00000000.00000000 = 00000000.00000000.11111111.11111111 + 1), and an increase by 1 in group four represents a full group three ( = + 1, in bits 00000001.00000000.00000000.00000000 = 00000000.11111111.11111111.11111111 + 1). I really hope that makes sense... OKAY, SO! If you haven't fallen asleep yet or are still understanding me, this is where subnets come in. Subnets help us summarize and route addresses. In order to understand how this works we need to look at this on the bit level. Okay, say we have the address With this information we can determine three things: one, the address of the host; two, the lowest address in the subnetted network; and three, the highest address in the subnetted network. Let's represent this as bits to understand why this works: 11000000.10101000.00000000.00001001 = 11111111.11111111.11000000.00000000 = 18 bit mask (there are eighteen 1s) The way subnets function at the binary (bit) level is that wherever there is a 1, we can't touch, and wherever there is a 0, we have free reign. SO to determine the lowest possible address, we change the binary IP address to a 0 wherever there is a 0 in the binary subnet mask, 11000000.10101000.00000000.00001001 = is the host 11111111.11111111.11000000.00000000 11000000.10101000.00000000.00000000 = is the lowest address in this subnet, also known as the network address. To find the highest possible address, we change the binary IP address to a 1 wherever there is a 0 in the binary subnet mask. 11000000.10101000.00000000.00001001 = is the host 11111111.11111111.11000000.00000000 11000000.10101000.00111111.11111111 = is the highest address in this subnet, also known as the broadcast address. Remember: Both the network and broadcast addresses are unassignable. This reduces the total number of usable host IP addresses by two. To determine the number of usable hosts in a subnet we take the total number of bits in an IP address (32, as we mentioned before) and subtract the number of subnet bits (in this case, 18). So 32 - 18 is 14. Then we take 2 combinations per bit to the power of how many bits we have (2^n), just as we have done previously. So we have 2^14, which is 16384 addresses, but we have to subtract 2 for the network (lowest) and broadcast (highest) addresses in the subnet. We have a total of 16382 usable addresses. Okay, so how do we translate subnet bits into a subnet mask address? Well we actually have to do some addition here because subnet masks work from left to right, instead of right to left as IP addresses do. So follow this sequence: 2^7 + 2^6 + 2^5 + 2^4 + 2^3 +2^2 + 2^1 + 2^0 for each of the subnet bits. Once we end the sequence we put a period and start over. Once we're out of bits we put 0s for the remaining groups. Let's try and find the mask of our 18 bits. 2^7 + 2^6 + 2^5 + 2^4 + 2^3 +2^2 + 2^1 + 2^0 = 255 . 2^7 + 2^6 + 2^5 + 2^4 + 2^3 +2^2 + 2^1 + 2^0 = 255 . 2^7 + 2^6 = 192 . 0 So our subnet mask is Here's a picture that summarizes what I just attempted to explain. I hope it doesn't confuse you more: Okay so back to the original question, if we are given and told to split it into equal quarters then we need 4 subnets. So how many more subnet bits do we need to make 4 (remember 2^n)? Well we only need two more. That's a total of 18 subnet bits and our subnet mask is Our usable networks are,,, and, which each have 16384 hosts. That's probably a lot more than you need, but hopefully that explains a few things...?
  10. $50,000 offered to inventor of RoboCall blocker. The race is on! Link
  11. I didn't know, so I googled the Bell part number and came up with this (Spoiler)
  12. This is kind of sketchy. I would encourage you to confront this 'her' in person before breaking boundaries. Spying on someone and then showing them the illicitly obtained incriminating evidence will not end well for you. This really is a question of prevention vs. correction. Think of a similar situation/personal experience: a parent doesn't trust their child's internet viewing habits and puts up an invisible keylogger or internet proxy to spy on their surfing history instead of confronting them directly. The child is later presented with the incriminating evidence and then punished. Is the child more or less likely to understand their parent's point of view by coercion or by persuasion? It's easier to ask forgiveness than permission, but the extra effort is always more rewarding. I'd recommend you talk with her first, or just break up with her, or whatever! This most likely won't end well for you either way. Anyway, that's the end of my persuasive rant. If you personally want track an android phone or get remote access, then there is a great, free piece of software called androidlost that let's a user remotely request the current gps coordinates of the phone via sms or the web at any time. The software also has many other features and may include a sms backup to email feature, not certain. I've used it to find my phone in the past, but the site seems to be currently down for maintenance... [edit]Another piece of software you could use is Where's My Droid. It's $4 though...[/edit]
  13. School is back in session! Load up on the CISCO and electronics classes!

  14. I think I'll be the first one to step up to the plate on this one... I've been on this board since I was 13 years old, just starting out on this technology trek. I was originally interested in the telephone network more than computers and was always asking silly, simple questions for many of the seasoned veterans that frequented these boards. It was an honor to have them around. Their examples of tenacious, but respectful curiosity made a huge impact on me through out my teenage years and now deeper into adulthood. Though not all my posts have always been relevant, and I'm definitely nothing close to an expert, the sharing of ideas encouraged me and many other members of the community to grow. Binrev took beginners from the center of the platter and sent them spinning far past the outer rim and into new realms of knowledge they could not have achieved alone. I remember one time in specific when I toasted my dad's 12 drive SCSI machine from work while he was out of town, just playing around, and Stank sent me a copy of a Windows NT4 Install CD all the way from the Southern US so I could get the machine back up and running before my pops skinned me alive! (I still owe you big time for that, man) Plus Binrev and RFA were doing podcasts way before podcasts were cool. I looked forward to the latest radio episodes and listened to them religiously. It was about as close as you could get to your online mentors and friends, except for the rare and well anticipated midnight conference call. It's examples like those that keep people around to form life long bonds in a community like this. Of course, over time we have, one by one, been assaulted by projects, goals, jobs, and life in general even now to the point where the old stomping grounds don't see much action anymore. This place was my adolescence. I believe it is still a great gathering place for like-minded and inquisitive individuals. It's not a community without contribution. I believe this is still the final refuge for the Gentleman Hacker and Eccentric Explorer. Thank you, Binrev. Thank you Stankdawg, ic0n, Dual, Droops, Natas, Ntheory, Ohm, jedibebop, and a cast of many, many others. A special thanks and shout out to Phreakblaze, Coder 365, Cr45 Du57, and anyone who took the time to listen to us toddlers trying out our own imitation internet talkshow back when we did Nynex Radio.
  15. So windows autorun is dead, which is probably for the best security-wise. I've heard autorun scripts have been a security threat on Linux machines as well. However, there are still some legitimate reasons to want a USB stick to autorun. Here are some examples: You have a USB drive you want to sync with local files (eg. Dropbox folder) for offline mobility. The portable device has an encrypted partition you want to automount on certain machines. Instant deployment of anti-malware software After a little bit of google-fu, I found USBDLM which can set custom autorun drive settings on specific computers, but I was wondering if the community had any experience with other autorun hacks (registry edits, handshakes, etc) or auto-syncing a USB drive on insertion.