WhatChout

Members
  • Content count

    792
  • Joined

  • Last visited

Everything posted by WhatChout

  1. You lack some understanding of WiFi. Since WiFi is Wireless, you can put your card into promiscuous mode and just see all the traffic, since it's radio waves. Here you seem to have some misconceptions again. If the traffic is unencrypted, then you have just packets. If the traffic is encrypted, then you have to know the key and then you use it as if you were connected to any other network and sniff the traffic in the same way, with the decryption being done on the fly. I really have no idea what you mean by "separate the packets from what specific router they were on", or "pluck the passwords from there"? The router question makes no sense and I don't know what passwords you're talking about. Only by asking for a DHCP lease you do actually leave traces.
  2. DRM does spy on people. Ever heard of WGA? And to do that they need to "call home". My guess is that you didn't even bother reading the article, because they analyze Vista's own EULA. Like, for example... ? The word "document" isn't mentioned anywhere on the site, so you're just imaginating it. Softpedia does not discuss prior to quotation nor after quotation what the key phrases "these features" and "this information" pertain to. Softpedia continues frightening people by providing, in very vague terms, a potentially out-of-context explanation. My suggestion is to take a closer look at articles you read. My intention is not to disprove whether Vista spies on people or not, but is to bring into question the validity of this particular Softpedia article. You can read the EULA yourself and see that the quotes aren't out-of-context. http://download.microsoft.com/documents/us...89cf5105718.pdf And Softpedia isn't the only site criticising Vista's EULA. http://www.theregister.co.uk/2006/10/29/mi..._eula_analysis/ http://blogs.zdnet.com/Bott/?p=158 http://www.linuxcookbook.com/declining_vista_eula.html http://www.securityfocus.com/columnists/423 Or if there's a bug, you're watching a lower quality version or listening to a lower quality audio, but I like how you suggest that everyone having problems with DRM is a pirate.
  3. Hmm... I'm aware of certian features being enabled by default like Vista activation, device manager and hardware wizard, dynamic updates and help and support feature but you make it sound like there is an application that sends mass reports of every user on any vista machine in the world that cannot be disabled. Is there any proof of this or is everybody being paranoid. The "feature" is called DRM, it's built into the Operating System. It cripples the functionality and gives partial control over your computer to people in the entertainment industry. Bruce Schneier wrote about this: http://www.schneier.com/blog/archives/2007..._windows_1.html Other features that sabotage a person's privacy are Windows Update, Web Content, Digital Certificates, Auto Root Update, Windows Media Player and all other sorts of software that send personal data to Microsoft. There's a lengthy article about it and other things hidden in Vista's EULA on Softpedia. http://news.softpedia.com/news/Forget-abou...oft-58752.shtml
  4. You sound like a five-year-old.
  5. Using Google won't hurt you. http://www.google.com/search?q=arp+poisoning
  6. No, ARP Poisoning can be done on any OS that supports TCP/IP and Ethernet.
  7. After noticing being mentioned I made a Massimo D'Alema-like face for a while. Congratulations on having enough patience to write a book.
  8. BBS Documentary: Part 1 - http://video.google.com/videoplay?docid=-1...rFo2grwK67IGECw Part 2 - http://video.google.com/videoplay?docid=-3...ZDKO6qAOh_8j3Aw Part 3 - http://video.google.com/videoplay?docid=-5...ABYP6-QHPw6CRBA Part 4 - http://video.google.com/videoplay?docid=-3...EHpzc-gGIg_H_Aw Part 5 - http://video.google.com/videoplay?docid=-8...SDJK-rwLjpZzlCg Part 6 - http://video.google.com/videoplay?docid=-1...iKZOEqwKh45T2Cg Part 7 - http://video.google.com/videoplay?docid=82...yB5HEqQLVyLX1Cg Part 8 - http://video.google.com/videoplay?docid=43...xD4nK-gHM8Nn_Aw The Machine That Changed The World: Part 1 - http://www.viddler.com/player/daf007a3/ Part 2 - http://www.viddler.com/player/f9134e9b/ Part 3 - http://www.viddler.com/player/42c8494f/ Part 4 - http://www.viddler.com/player/a3994329/ Part 5 - http://www.viddler.com/player/4a54a704/
  9. Most school systems keep their grades on paper as well and they usually crosscheck if they think something unusual is going on. Other than that, you haven't given us nearly any information about the software and design of your school network, and so we can't help. That doesn't really mean anything. Having antivirus software installed on computers doesn't mean that the network or the computers themselves are unsecure. There are hundreds of such vulnerabilities and we're not going to list them all here because that's not hacking and also most of them won't work. If you want some definite answers you have to give us more detailed information than just "my school has computers, how do I get admin access?".
  10. GNU/Linux can look pretty too.
  11. No amount of software you install will protect you from this, since the spyware behavior is part of the OS itself. If you don't like the loss of privacy you feel you're experiencing, install a different system.
  12. This statement is unclear. A MITM attack generally involves simulating the other side of the conversation without revealing the attacking side, it doesn't need to take place on a LAN. More than that, most MITM attacks in LANs are ARP poisoning or ARP spoofing attacks, and so they also "take place" in the second OSI layer.
  13. Wouldn't it be more trivial to just use dd?
  14. That's not how cryptanalysis works. Even for a statistical analysis (assuming this is some simple shift/substitute cypher) we would need a page of encrypted text at least.
  15. PR stunts are always good after you've ended your career. Bill Gates is no idiot.
  16. Just like viewing a string of modulated signals is impossible (unless you have a modem). I don't really see what you're getting at here. That's not what I'm talking about, read my post again.
  17. Smack them in the head with a blunt object?
  18. [ ] Little and lightweight. [ ] Gaming/multimedia PC. Choose one. You can't build a multimedia PC to be little, lightweight, and have a small footprint for the same reason you can't build a Monster Truck that burns one gallon per a hundred miles and drives well on highways.
  19. Sorry, I just noticed that it's the default behavior for SeaMonkey.
  20. Are you sure you changed all the file permissions, not only the directory permissions?
  21. Normally you can download anything and save it under any extension you want in Firefox, just choose "All Files" when saving and specify a file extension. Also, when you want to download something in Firefox without visiting the URL and activating the default browser plugin, you can just hold Shift while pressing Enter after typing the URL in the address bar.
  22. Computers just confuse people and people don't like things that confuse them. More or less, the only people interested in computers are the ones who already know what they are and have the know-how or curiosity to go about them themselves. (sorry for ripping you off Ohm) It's not even that Windows is easier to use. It's just that ubiquitous, and that's what makes it seem easier to use. People can't really differ between what's easy and what's something that they already know, so they feel uncomfortable even with something that would over time become more comfortable.
  23. The point about agreements is they have to be lawful to be legal. For example, I don't think this: would stand in any court, mainly because it's just too invasive into personal freedoms.
  24. I am not a physicist, so this idea might be very stupid, but from what I understand, the data is in the quantum states of the photons, right? If so, then the quantum states must be set when the photons are being emitted down the fiber optics cable. Now, what would stop someone from performing a MITM attack by having a device somewhere along the cable that would just observe the quantum states of the incoming photons, effectively eavesdropping the information, and then reemit photons with the exact same quantum states on the other end?
  25. I like how they make Michael look like some supergenius while all that he did was download a bot controller. Actually, while I'm at it, let's make a list of what this film does: [✓] Start with a scary sentence. [✓] Throw hackers, script kiddies, crackers, and scammers in the same back. [✓] Lots of CGI effects. [✓] Telling the dumbest things (specialistic hardware systems connected to the Internet are running Windows) to uneducated public [✓] Silly explanations. [✓] The Matrix symbols. (look close enough, they're in some CGIs and shown as a screensaver once)