WhatChout

Members
  • Content count

    792
  • Joined

  • Last visited

Community Reputation

1 Neutral

About WhatChout

  • Rank
    Dangerous free thinker

Contact Methods

  • ICQ
    0
  1. Noone on YouTube who makes webcam videos knows what to say, they just like the idea that potentially millions of people might look at their ugly dumb head. It's a self-sustaining system of delusional idiots, believing that just because some n number of people saw you, you matter or are popular. I am not a psychologist, but twitter, YouTube and all the other websites dedicated to the fact that most people get a headache after they read more than two sentences leech off of peoples' desire to be socially accepted, and the Internet circlejerk communities fill that niche surprisingly well. I can't blame the thirteen-year-olds for hoping that if they show some kind of affection towards a camwhore, she'll show them her tits, but it's frustrating to see most of people thinking that way. Either way, what is the error your sister gets when she tries to log in?
  2. Basic concepts. As a matter of fact, I just read a pdf on this topic and it didn't answer my question. All I understand now is why a new key needs to be used everytime a message is sent and received since using the same keys will make it much easier to hack. Other than this, I understand nada on the answer to my question. That's because you don't understand the topic. Stop, turn around and go back to learn the basics that you missed.
  3. Even with Intel Tiger, there was an Intel and Power PC version. There was a lot more than just recompiling chunks of the OS considering the old CPU was Power PC. It had to be optimized for Intel... Leopard even offers further optimization... Just because it is deigned for Intel doesn't mean it will perform good on all Intel machines. Though I've never bench marked it, I've read posts from others in this forum who have stated OSX runs better on Macs than a PC with superior hardware. Do these people supply this with any reliable benchmarks? If the processor is the same in architecture and clock speed on both machines, there is no chance that the CPU execution time differs. What can differ is the memory-access time, but that's not a Mac/PC problem, it's the buss clock speed/hardware bandwidth problem. Mac vs HackintoshIt would have been nice if the tester would've disables one CPU on the Mac Pro (I think that is possible) and taken 2GB RAM out of the Hackintosh... Depending on how well the specific apps use two CPU's the results can mean nothing favoring the Pro. Also, the Macs were running Leopard vs Tiger on the Hackintosh. I still think that having an Leopard running on a Mac is far more reliable than x86 Hackintosh and the O/S designed for specific hardware is still an advantage.. Exactly what were you referring to in your first post? Not trying to start a war over it, just curious about what you mean.. EDIT: posted wrong url A "Hackintosh" shouldn't really count, since it's a Mac vs. Mac benchmark, not including the price difference, but even then, the hack is overall better than the original.
  4. Even with Intel Tiger, there was an Intel and Power PC version. There was a lot more than just recompiling chunks of the OS considering the old CPU was Power PC. It had to be optimized for Intel... Leopard even offers further optimization... Just because it is deigned for Intel doesn't mean it will perform good on all Intel machines. Though I've never bench marked it, I've read posts from others in this forum who have stated OSX runs better on Macs than a PC with superior hardware. Do these people supply this with any reliable benchmarks? If the processor is the same in architecture and clock speed on both machines, there is no chance that the CPU execution time differs. What can differ is the memory-access time, but that's not a Mac/PC problem, it's the buss clock speed/hardware bandwidth problem.
  5. The argument of "the OS is designed for the hardware" doesn't stand when you realize that Apple started using Intel chips quite a while ago. Also, there is nothing you can do on a Mac that you can't do on a PC, and you'll pay less for it. If you like spending money for the sake of spending it to feel better, then go on.
  6. What do you mean by "patch the connection through"? You can't just throw HTTP traffic at a web interface and expect anything meaningful to happen.
  7. And so you'll spend the next few months/years under arrest without access to anything for destruction of evidence before they go through all of your personal belongings.
  8. There is no such thing. A vulnerability is a potential of a piece of code to be exploited, that is, used in other (most often malicious) way than its original purpose. If that's what you're looking for, try checking out: http://www.securityfocus.com/vulnerabilities http://www.packetstormsecurity.org/ http://www.milw0rm.com/ Aside from Intrusion Detection Systems, there aren't many new pieces of software to ensure security. (new, as in, new capabilities. Most security products have yearly releases and daily updates) As always, the easiest way to ensure security isn't the fanciest software, it's user education and sane security policies. Proper network design can't hurt you either.
  9. Here's something about shells: Korn - http://erwied.dns2go.com/oreilly_unix30/korn/index.htm Bash - http://www.tldp.org/LDP/Bash-Beginners-Guide/html/index.html SSH usage is pretty straightforward, and there's always man.
  10. There is no software capable of adding cycles to your CPU.
  11. If it's really an issue of certain ports being blocked, you could set up your own proxy or use an existing proxy server. Though, for your needs, using mibbit (mibbit.com) would be a more elegant solution.
  12. There is no such thing as a tutorial that will guide you "start to finish". You seem not to know at all what hacking is about, so before you do anything, read this: http://www.catb.org/~esr/faqs/hacker-howto.html
  13. The first step is to actually learn how a forum you're exploiting works, how the vulnerability works, and then learn how the exploit you want to use works.
  14. Nikto can do some of that (i.e. check for default files and so on).
  15. http://www.binrev.com/forums/index.php?showtopic=37282 Also, you don't seem to know what you're doing, judging by you posting a traceroute and DNS lookup.