WhatChout

Members
  • Content count

    792
  • Joined

  • Last visited

Everything posted by WhatChout

  1. Why would you do that?
  2. Assuming that it was based on Linux, you could install MITM attack software (dnsspoof, ettercap) assuming that packages were available for that router distro and there was enough space.
  3. There is no way to achieve total anonymity in an environment like the Internet, because there is always a man in the middle - your ISP. So encryption won't help you much.
  4. Ask your friend for a password.
  5. As far as I know, operating systems will only use swap when necessary, that is, if your RAM space has run out and some program still needs to use it. Assuming your OS uses LRU (most do), then if you haven't been accessing the IRC client memory for some time (highly improbable as the client is communicating with the server all the time), then yes, some of your conversations (assuming they are kept in RAM) will be moved to swap space.
  6. First of all, you don't install BackTrack. Second of all, I'd look into distros such as Slackware or Debian that let you choose whether or not you want to install a window manager. Install XFCE or fluxbox to keep the system lightweight. Alternatively, you could just install Damn Small Linux which has fluxbox as a default window manager.
  7. What about autistic people? But all seriousness aside, "social webpages" aren't really there for people to socialise, they are there to satisfy their egocentric worldviews ("you have 80437 friends") and inflate their little egos. ("Top friends: <insert popular band here>", "Picture comments: OMG u look awesum") It's a one gigantic circlejerk with its circlejerk mentality created by consumptionism.
  8. The Internet didn't create social rejects, social rejects clinged to the Internet after the access to it became widely available.
  9. No Ethernet connection is at 50 kB/s, you're not going to get the same speed since it's the local network. What I think is the case here is that you want a faster internet connection, which simply is not possible, since the speed is divided amongst all the computers connected to the local network.
  10. Have you even bothered to read anything about the exploit, or read the code itself? Because two things that we sure as hell are not going to do is spoonfeed anyone or help script kiddies.
  11. It's impossible to use LAN and at the same time be completely invisible. (which should be quite obvious and I'd like to remind you that you should do your own research first before asking questions) What you can do is install a firewall and set all ports to be filtered and only allow outgoing connections on ports you want to use (like HTTP, SMTP, POP3). (assuming that by "using the internet" you don't mean using file sharing networks)
  12. Circumvent what? What is it exactly that you want to do, because that's what you've forgotten to tell us.
  13. How do you know that?
  14. Need I remind you of the code you posted in the programming section? Then you've wasted your money on a few hundred grams of paper. If your C++ book tells you to put "using namespace std;" inside the main() function, then throw it away and get yourself a better one, because this can only go worse. You'll find plenty of books about C++ on the website linked to in my signature.
  15. Here's a useful tip: read the basic chapters first, then try and write some code. Stop posting every bit of code you manage to type here, that's not how you should learn. You need to learn to debug your code yourself, people won't be able to hold your hand all the time. And yes, "using namespace std;" should be outside of main(), right after the included libraries.
  16. Make sure you put it in a baggie first. You wouldn't want to get moisture on it. It doesn't really matter if you put a baggie on it, since the moisture in the air will cause the cold hard drive to collect microscopic water droplets on its surface, so it's generally a very bad idea and you're risking getting your whole computer fried. If you really care that much about your data, send the disk to OnTrack, they'll probably be able to restore it. In the future remember to make backups.
  17. Not really, hakin9 is also available in Spain, Czech Republic, Poland, Germany, France and Italy.
  18. Download ComboFix and follow the instructions on this page: http://www.bleepingcomputer.com/combofix/how-to-use-combofix You might want to run it in Windows Safe Mode.
  19. I'd like to add that it's a good idea to use two different public/private key pairs - one for encryption and one for signing.
  20. I've been reading it for quite a while. Not bad, articles are sometimes hard to understand, but nothing that would be unbearable. I didn't like it when they started their little love affair with Microsoft, but now that it's over, I think it's a pretty good magazine.
  21. You don't know what you're talking about.
  22. What the OP is talking about are rootkits which use virtualization mechanisms to have Ring -1 (higher than kernel mode) access, which makes them undetectable even when detection software is running in the kernel mode. Such rootkits usually try to change the MBR, so that when the machine is rebooted, it will start the OS up in virtualized mode. Lots of native hardware virtualization techniques introduced in the latest models of processors make this task easier for the malicious software. An example of a virtualized rootkit is Rutkowska's Blue Pill, which you can read about here: http://www.securityfocus.com/columnists/451 and here: http://www.matasano.com/log/680/detecting-...lized-rootkits/
  23. http://freecomputerbooks.com/ http://www.onlinecomputerbooks.com/ http://www.freetechbooks.com/
  24. Blindguard. Sensepass.
  25. A simple Google search returns results such as these: http://nsnam.isi.edu/nsnam/index.php/User_Information http://www.omnetpp.org/ http://www.tetcos.com/ http://opnet.com/solutions/network_rd/modeler.html http://www.scalable-networks.com/products/