fistoffurypowerman

Members
  • Content count

    34
  • Joined

  • Last visited

Community Reputation

0 Neutral

About fistoffurypowerman

  • Rank
    H4x0r
  • Birthday 09/29/1986

Profile Information

  • Location
    india

Recent Profile Visitors

562 profile views
  1. dont you think that we are missing the core point... all the topic was started to ask or take comments about how do we face the sudden situation of destruction of hard disk. or simply wiping out data... guess if they have recovery softwares then ???? or worse they catch u b4 u can do anything !!!!!
  2. dont you think that we are missing the core point... all the topic was started to ask or take comments about how do we face the sudden situation of destruction of hard disk. or simply wiping out data... guess if they have recovery softwares then ???? or worse they catch u b4 u can do anything !!!!!
  3. what i would say is that every modern lap is capable of running distros in good fashion. HCL leaptops are a good choice as they come with 8 gb of ram inbuilt.... i am from India so the price comparision will not be the criteria.... also go for a external GPS device that can be plugged to the computer (u will find that easy and cheap too) i would better say that get a simple laptop and get a best handset that has all the GPS features...
  4. i pretty much can't say... try F-secure if u think that it has been infected by the malware... or best format the computer ! this is a easy way, i wonder what would be the right way to do it !
  5. guess that best point at that time would be to flee and save ur ass !! the brain is the best hard drive that u carry always with u !!!
  6. yea i was having the same convention about ettercap. just that i have personally never tried ettercap...instead used cain and wireshark to sniff packets... but ettercap i know for sure that can be also used for phising attacks too.... i think that cain can't be !! correct me if i am right
  7. no i meant wireshark !! basically etheral was a old name and wireshark is its new name !! ettercap can be uswed for various other purposes too !!
  8. pretty right !
  9. what i think is that generally the attack is detected after it has happened !! and if the hacker is smart, that they are... they will not leave a trace.... still IDS is used at a large scale....
  10. the data corruption i am working on is the basic VB included with the administrator access... i am reading tim pattrick VB 2008 book !! also that i will try some form of encryption in this case to make better and then in this case develop my understanding !!!
  11. i really didnt know abt it !! you seem to be a computer genius !!
  12. You might not have to worry about this, but how will your actions come into play for the future students? Your not fucking yourself over, your fucking them over, and that is not cool... Trust me .. I have learned to think and re think actions... Make sure you know what your doing before you do it ... Would be a tragic thing to have a project cut because of one persons bullshit ... hm i agree with majestic !! seems rite that dont fuck with the computer when you are trying something new !! cos your new batch will suffer
  13. can we have the download link ??? i was looking for this USB version !!
  14. that phone is kinda funny... i am not well aware of the capabilities but i am sure that there are some major modifications in that phone to get it to intercept sms... people out there are freaking good man !!
  15. heard about the astalavista security toolbox DVD 5.0 that is not in the torrents and i am not downloading from the rapidshare because i dont havef good speed here.... here is some info on the kinda tools it has.... if anybody can upload it on the torrents after downloading them... i will be thankful for him !!!! Rls.Date....:June 25th 2008 Total.CD....:1 DVD Files.......:60x50Mb Type........:Video Training Format......:ISO Platform....:WIN/MAC Protection..:None EARL........: astalavista.com Astalavista's Security Toolbox DVD 2008 (v5.0) is considered to be the largest and most comprehensive Information Security archive. As always we are committed to provide you with a resource for all of your security and hacking interests, in an interactive way! The Information found on the Security Toolbox DVD has been carefully selected, so that you will only browse through quality information and tools. No matter if you are a computer enthusiast, a computer geek, a newbie looking for information on "how to hack", or an IT Security professional looking for quality and up to date information for offline use or just for convenience, we are sure that you will be satisfied, even delighted by the DVD! - Extremely comprehensive (about 2'562 Tools!) - Very well sorted archive with detailed descriptions (276 categories!) System requirements * Windows 95/ME/98/2000/NT/XP/Vista * DVD-R Drive or a virtual drive Enj0y