WhatChout

Members
  • Content count

    792
  • Joined

  • Last visited

Everything posted by WhatChout

  1. I guess they have finally put the protection on these songs. (I can't be bothered to check, it's an old thread and all)
  2. You could use the Shell() function in VBA, AFAIK.
  3. "For speed reasons" as in "for shitty speed"?
  4. Linux can run on almost anything. You're talking about desktop environments.
  5. Don't be lazy and read the documentation. http://ext2fsd.sourceforge.net/ http://www.fs-driver.org/ And again... http://en.wikipedia.org/wiki/Journaling_file_system How do you plan on using Linux without installing it? You'll HAVE TO have free space on the drive for it somewhere. None, since best/worst are subjective opinions depending on each person's standards. If you want the lesser speed of a virtualized OS, then sure, go for it.
  6. Depends on what you mean by "lose out on performance".
  7. 1. The first misconception about filesystems people have is that files stored on one of them become unusable when stored on the other. No, you won't have any problems with copying files to a different filesystem. 2. Ext3 because of the Installable File System. And yes, you won't be able to use journalling. I'm not sure if that's supported by ntfs-3g for NTFS either. 3. If you're not sure that those issues even exist, then why are you considering them? Windows will be able to read and write to and from an ext3 partition as if it was an ext2 partition. 4. USB drives present themselves as mass storage devices, and are addressed as such by most OSes.
  8. It couldn't possibly be an ARP Poisoning attack since the IP is out of the local network range.
  9. If you're using an IP address to connect, then it's someone controlling the router at where you work at (since you turned yours off together with your computer) redirecting the traffic to a malicious box. Could also be that someone took control of your company's router, or the company hired a consultant trying to spy on you and let him try to do a MitM attack on you. Is there anyone else besides you (since you said you are in an administrating position) who has access to the router?
  10. Linux is not better than Windows. Also, Windows is certainly NOT better than Linux. Mainly because "better" and "worse" are subjective terms. Also because these systems are totally different. Anyway, a minute of Googling gives you enough reading: http://www.tuxmagazine.com/node/1000117 http://www.oreillynet.com/sysadmin/blog/20...h_to_linux.html http://www.desktoplinux.com/news/NS8692243781.html Yes.
  11. I'd rather say it's note the code that's distorted or misrepresented, it's you trying to study advanced code after finishing a few tutorials, which is absolutely ridiculous. Anyway: http://www.scripts.com/python-scripts/ http://www.codesampler.com/python.htm
  12. -nevermind-
  13. Not really, you just mount them. Also, your kernel has to support NTFS read if you want to "view" an NTFS partition. (I know the Ubuntu one does)
  14. For mobile blogging you could try: http://www.textamerica.com/ Also, you could use one of these WordPress addons: http://wordpress.org/extend/plugins/mobileadmin/ http://wordpress.org/extend/plugins/wordpr...mobile-edition/ Took about 3 minutes of googling.
  15. What's the point of this, again?
  16. Read the linked websites...
  17. Do you know the command to do that by chance? Late answer, but meh. http://linux.about.com/library/cmd/blcmdl_kill.htm
  18. You could have at least bothered to change the text a little instead of copypasting the same thing on every computer forum you can register at.
  19. Yes, that's what you can read on the COMODO website.
  20. For Windows, I use COMODO Firewall Pro.
  21. There are no free NT hashes available as far as I know besides that generator.
  22. https://secure.colobox.com/randpass/
  23. Upload the files?
  24. I guess it's the all-root-no-pass case, in which you could just kill the ssh deamon.
  25. Viewing JPGs remotely won't result in the buffer overflow attack (at least that's what these people - http://www.f-secure.com/v-descs/ms04-028.shtml - claim) so I think he just spoofed a link that made you go to a infecting website, and then redirected you to the image. http://google.com After googling you find out that zapto.org is a dynamic DNS provider, so it's possible that the entire website is malicious.