heisenbug

Members
  • Content count

    86
  • Joined

  • Last visited

  • Days Won

    12

Everything posted by heisenbug

  1. Glad I could help. Most languages are fairly similar if you code cleanly. It's not that hard to learn another once you get the first language down. Some people get lazy with their code and obfuscate it quite a bit, and I could have written the same thing in a perl one liner program, but I specifically made it easy for you to read. Most developers work on a team, and it makes sense to write code in a way that others can understand by a simple glance at it. As long as you code cleanly, you should be able to move through languages with ease. Good luck with your programming.
  2. Sorry I thought the challenge was the number of items entered by the user, not the closest fibonacci number. That's an easy fix, it's a while loop instead of a for loop. #!/usr/bin/perl print "\nHow many numbers of the sequence would you like? "; chomp($n = <STDIN>); &fibonacci($n); sub fibonacci { $a = 0; $b = 1; $n = shift; while ($a <= $n){ printf "%d\n", $a; $sum = $a + $b; $a = $b; $b = $sum; } } You could use the previous code and do-while with two iterations in the do section. However, if you really want to play around and have fun with it, a recursive function could be fun with this. You could play with code similar to this.... sub fibonacci { $num = shift; $calc = 0; if ($num <= 1) $calc = $num; else $calc = fibonacci($num - 1) + fibonacci($num); return $calc; } Sorry about the shorthand, I didn't want to do your homework for you, but still help you. That's why I didn't give it to you in C. Shift just takes the first item off an array. If the array isn't listed, Perl assumes it is @_ and since that is what is passed to the subroutine, that's the passed variable.
  3. This should really go in the programming thread, but since it is a newbie question I'll help. PART 1. You are making it much more difficult than it needs to be. Here is the program in Perl. #!/usr/bin/perl print "\nHow many numbers of the sequence would you like? "; chomp($n = <STDIN>); &fibonacci($n); sub fibonacci { $a = 0; $b = 1; $n = shift; for ($i=0;$i<$n;$i++){ printf "%d\n", $a; $sum = $a + $b; $a = $b; $b = $sum; } } PART 2. To just have it run automatically with only the first two entries, you just hard code it. For example. &fibonacci(2);
  4. I came across this. Some cool decryption that will get your name out there. http://news.yahoo.com/s/yblog_thelookout/20110329/ts_yblog_thelookout/fbi-asks-public-for-help-breaking-encrypted-notes-tied-to-1999-murder
  5. I like this place. I don't want to see it go under. Yup Where do I sign up? DONE!!! ep0653 :: Intro to Black Box Testing Hosted by Heisenbug on 2011-02-02 I have a cool stirplate hack on there. Done. Yup Haven't done that yet, but will. Haven't done that yet, but will.
  6. This statement seems like a combination of arrogance and ignorance. It is something that a recent Computer Science graduate would say. The more we learn, the more that opens up, and the more we know we have so much more to learn. In fact, I don't know a single senior level computer scientist that believes they know everything about computers. It is only the ones that haven't delved deep enough into the machine that feel they know it all.
  7. I wouldn't get into the habit of using software just because it was installed on your computer. I would use the best available software available. Installation isn't that difficult. That said, Ubuntu going forward is not going to use OpenOffice due to the Oracle issues. It will be using LibreOffice in the next release (Ubuntu 11.04 on April 28, 2011), so if that is your operating system and you want to future proof your software I would still go with LibreOffice.
  8. LibraOffice forked off of OpenOffice. The question you should ask is why was this product was needed and created in the first place. It's because Oracle recently acquired OpenOffice. Oracle is not continuing support of the open source projects it took over from Sun in the spirit of open source. The open source community is not too happy with them. Oracle tends to control the code tightly, and prefer their own developers develop the code. Many people in open source are shunning Oracle and will refuse to work further on OpenOffice. It will probably continue to be freeware, but won't get a lot (if any) open source support, especially since Libra Office is out there now. Right now there isn't a lot different with them because the code fork just happened, but over time, LibraOffice will be developed on and embraced by the Open Source community. OpenOffice will not. Can you tell this was written by an open source developer??? Ha, oh well. Honestly all bantering aside, without community support and involvement, features will be added that are unimportant to the end user and that cause bloat and important features that end users really need may not always be added. Libra Office will be a better product in general, both physically and ethically. EDIT: FORGOT TO REPLY TO CYB3R_THR34T http://www.thefreecountry.com/compilers/basic.shtml
  9. LibreOffice is the open source fork off of OpenOffice. I would suggest LibreOffice. Although I would suggest OpenOffice over Microsoft, even on Windows. They will open office documents, and save as them so you should be fine. The display on the "powerpoint" alternative slides are sometimes a little off, but can be fixed easily. Other than that a great alternative. I always though Microsoft Works was the biggest oxymoron in technology.
  10. Not a bad board. Anything that promotes hacking and community is a plus in my book. It looks like they both use IPBoard and the favicon is not either binrev's or leethacker's, but belongs to invisionpower, which created the forum software they both use. http://www.invisionpower.com/products/board/
  11. Ha, now that's social engineering if I ever saw it. You may be a 400lb man in his mother's basement, but I'll give you the benefit of the doubt and assume this is true. If you are really honestly interested in security I would start with the Black Hat presentations. There are a few on rootkits. Black Hat presentations. http://www.blackhat.com/html/bh-media-archives/bh-multimedia-archives-index.html
  12. After reading your comment #4 I also got really annoyed. I agree with Berzerk on this. Correct me if I am wrong, but it seems you don't know the difference between petty theft and hacking. Here is what I consider the difference: HACKING - Taking a computer, and figuring out a way to bypass the password. Disseminating the contents of the drive to find the owner's name, address, and pictures of them to identify them. Being nice and installing programs to help them find their PC if they lose it again. VNC - (to view the system) An SSH server - (to help retrieve their files) An IP beacon - (To say when the PC is online and what the IP address is) [*]Returning the laptop to the owner. [*]Occasionally checking in on the PC to make sure the system is ok, and they didn't lose it again. (What a good citizen!!!) PETTY THEFT - Not using google to find a simple kiddie script. Being an idiot and telling everyone you are committing a crime.
  13. Yes, you can wipe the drive and install a fresh copy of Windows, or Linux (free); however, you will lose all of your data. You can recover that data by booting from a Linux CD. Ubuntu Live CD or knoppix will work well for this. Once you boot up, you will be able to access the NTFS formatted hard drive and copy the files you need to a USB drive. If you bought the PC used, I wouldn't use the same OEM (Microsoft Product ID) or the same MAC Address. You don't know if the guy before you was some kiddie porn collector or something. I would suggest removing the partitions, formatting the drive, encrypting the entire drive, and installing a fresh Operating System after that. If it was always your PC, and you just forgot your 35 digit password with lowercase, uppercase, numbers and special characters. I haven't used it, but I hear Kon-Boot works well to strip the passwords.
  14. If only a few people you know are going to be using this, then create a certificate and require the browser to have it. You might want to protect yourself from SQL injections. Striping out semi-colons is important. Also less than, greater than, equals signs, etc... And if it doesn't need to be in there, INSERT, DELETE, DROP, UPDATE, etc. (No one should have a First Name, Age, Etc of DROP or UPDATE) Use dropdown menus, check-boxes, radio buttons, etc whenever possible. The option they pick better damn well be one of the choices you gave them. If it isn't then I would just log their IP and exit out of the script.
  15. I think that it's interesting when people say, "I use Mac for the hardware", or "I just use Windows because my Dell came with it." Isn't this a hacker forum? I have switched operating system many, many, many times. I find operating systems fascinating, and have delved into the depths of many. Even as far as contributing code to distributions. I use a few different ones, but I have my favorites. I don't think it matters what came on your box, if people like Mac then they can install a Hackintosh, or if they like Windows they can install that too. I don't think people should keep a closed mindset on operating systems. They should use what they like best. If they like what OS came on the hardware in the first place, then awesome...use that; however, most just use it because they can't fathom that an operating system can be changed. Hardware != Software
  16. "Frankenstein never scared me...marsupials do...cuz they're fast." Are you aware that you can put a Linux distro on an Alienware PC? It will run much faster, especially if you build it for that purpose.
  17. Avoiding corporate espionage.
  18. This term is often misused, but I guess technically all files could be considered binary files since changes in the direction of magnetization represent data on the hard disk in patterns of binary data bits. It appears they intend it to mean some sort of executable code. EDIT: Results may vary on an SSD, LOL
  19. I follow the funny quote philosophy: Use the best: Linux for servers, Mac for graphics, and Windows for solitaire.
  20. The network is obviously not yours, and you do not have authorized use over it, so yes it is still illegal. I seriously doubt anyone will give you the response you are looking for. I suggest forgetting about the prank and to make out with as many high school chicks as you can while you are young, and that is still legal.
  21. I think he is referring of your failure to read: Pinned thread: and Announcement: http://www.binrev.com/forums/index.php/forum-4/announcement-4-malicious-questions-will-not-be-answered/ If you had a "home network" in which you wanted to find a way to attach "Two Girls and One Cup" to every outbound email as an attachment called "statistical_survey.mp4" that might have been a different story. That is legal (weird, but legal) and people could reply to that; however, your request is quite illegal, and no hacker in their right mind would feel comfortable in helping you break any law. Hackers are inquisitive folk, not hooligans that are hell bent on going to jail.
  22. I completely agree, with everything here. Outsourced programming is not the superior method of programming. I wasn't really saying what I thought the Walden Pond-ish utopia of development was, I merely said what is practical and what development seems to be migrating to. It's not as black-and-white as agile is always best. Unfortunately, quality is not always as important as the bottom line. I have read the books like "Quality is Free" by Phillip Crosby, but I do not think all of it holds true in software development, especially in our current economy. If the software is core to your business needs then coding it in-house is probably needed, but if it is not core to your business then a software engineer may need to yield to an economic investigation committee. For example, industries like energy, telecommunications, agriculture, and manufacturing may have supplemental software development needs. If the cost of product failure is lower than the increased cost of in-house development, offshoring may become a necessity. I agree that you do need to be very explicit in your requirements, both functional and design. In this case, a good set of UML documents should lay out subroutines, functions, objects, databases, etc before a single line of code is written. The program for all intents and purposes should basically be written, (except for the writing it part). I hate to admit my ethnocentrism, but I also agree with the lack of creativity in foreign programmers. I used to believe that this was confined to India because programmers were often of a lower caste than their management and as a result rarely questioned them. However, I have found this lack of creativity in all of the BRIC nations I have dealt with, and also surprisingly even in Japan. I now think this is due to our own culture and our history of "cowboy" coding. I also agree that you will see agile more in smaller shops. Especially in the software industry where it may be part of your business model. Development should really be done on a case by case basis. Before you determine methodology you really need to ask questions like: What is the release cycle? How many layers are there? When do you need to involve your users? What are the risks of fixed staffing on this project? What is the development structure? Is this a newer technology? Staffing is the largest part of the decision. If you have a fixed number of software engineers you really need to make the best use of their time. Is coding user interfaces, formatting text colors in CSS, or writing foreach statements really the best use of the time of a software engineer with years of development experience? These are entry level coding practices that can be easily offshored. Experienced developers should be normalizing databases, defining software structure, reducing process time, defining efficient SQL queries, developing complex mathematical functions, etc.
  23. Extreme programming explained, goes through a really high level approach. It is an easy read but if you are familiar with software methodologies it might be a little basic for you. Software development tends to be moving away from these more agile methods and back to prototyping and waterfall approaches (at least in my industry). This is due to the fact that we have been doing more planning, analysis, and design; and offshoring implementation and support to India. I have noticed this trend with other companies in my industry too. The waterfall model is coming back into trend because it is costly to apply changes with the human communication gap and server load across sites. User feedback is still important, but increasingly less so. We have been doing all the UML here in the states, but leave a lot of the basic coding to India. After all, coding really is the easiest part of software development and requires the least training. (I sometimes long for the days when that was all I did all day)
  24. I'm sorry. I explained it as if I was explaining to a programmer, but it appears from your response that you don't know much about software development techniques. I apologize for the miscommunication. I will explain this a little less technical. There are two major types of reverse engineering, and I am referring to something called Black Box Testing. A second Reference that isn't wikipedia. "In "black box" reverse engineering, systems are observed without examining internal structure, while in "white box" reverse engineering the inner workings of the system are inspected." Functional testing is common practice in software reverse engineering. The scenario I gave earlier was an example of functional black box reverse engineering.
  25. I still don't think you understand my point. I blame my horrible explaination skills. Let me take you through the process of a simple reverse engineering without looking at the code. I will use a programmer's favorite to explain, the Hello, world script. For this scenario, let's assume we have the following program, hello.pl, that you have execute permissions to but not read permissions. #!/usr/local/bin/perl my $a = "Hello, world!\n"; print $a; Now this program is fairly straightforward, and it looks like reverse engineering it would be easier than gaining root access. (However probably less fun) What do you know? Well, you know that the file name is hello.pl and you know that files that end in .pl are commonly perl scripts. 1) The script must be in Perl. What else do you know? 2) You know that Perl scripts commonly have a shebang line, similar to #!/usr/local/bin/perl or #!/usr/bin/perl What else do you know? Well, you know that when you run the script it prints to the screen Hello, world and a new line. 3) There must be a print statement in there. You also know that since it has a new line it is probably in double quotes and not single quotes. Well, you check a few arguments and the output doesn't change. 4) You assume there are no arguments. So you write your code, never looking at the original source code and you come up with something similar that does the same function and viola you have reversed engineered the software without ever looking at a single line of code. #!/usr/local/bin/perl print "Hello, world!\n";