• Content count

  • Joined

  • Last visited

Community Reputation

0 Neutral

About Chrono

  • Rank
  • Birthday 06/22/1984

Contact Methods

  • AIM
  • Website URL
  • ICQ

Profile Information

  • Interests
    computers, programming, martial arts
  • Location
    Edgefield, South Carolina
  1. I still remember my typing class in 6th grade. We used old Apple II computers, if I recall. They may have been the IBM computers Lunarsphere was talking about. All I remember was that the text on the screen was green and it used the original floppy disks. Also, that I was always the first one done with my required typing. Man, I was fast back in the day!
  2. Yeah, but the fact that she still complained is probably what got most people about it.
  3. Well, since you mentioned email, I guess I'll tell mine that just recently happend. I was using telnet and sent someone a fake email. Well, it turned out that they complained about me doing it and they traced it back to my login. Now I got to meet with the housing and residence life office.
  4. I bet you got upset when you realized what got you caught.
  5. USB drives are awesome to use in such situations. Our school has a program called Deep Freeze which, every time you reboot, it uninstalls all the programs that have been installed. I'm thinking that it just reloads a hard disk image or something. It gets a bit annoying installing the same stuff over and over again, but, you get used to it.
  6. I was just wondering if any of y'all have gotten caught while doing something. Jjust getting caught while snooping around or anything, and left off with a warning. Did you learn anything from it? Did it stop you from learning more or did you keep on going just making sure you cover your tracks better?
  7. I've never heard of that one.
  8. You're right. Hacking your own machine or doing wargames is the safest thing.
  9. That kind of depends on the person who's property you're on, doesn't it?
  10. I was under the impression that, according to current US law, people were able to enter machines, but can't alter or damage anything without it being illegal. Am I right?
  11. I believe it uses Divx. You may want to install the codec for that.
  12. By that kind of ridiculous logic, we're all guilty.
  13. Here is a list of presentations from Defcon 13. They are all PDFs and the like, however.
  14. i dont know about that.. K.H.O. ← Yeah, I'm sure there's something else you can do with that.
  15. I think I typed it in right.