WhatChout

Members
  • Content count

    792
  • Joined

  • Last visited

Posts posted by WhatChout


  1. I get a feeling that she's faking this excited attitude just to bring attention. She doesn't look like she knows what to say.

    Noone on YouTube who makes webcam videos knows what to say, they just like the idea that potentially millions of people might look at their ugly dumb head. It's a self-sustaining system of delusional idiots, believing that just because some n number of people saw you, you matter or are popular. I am not a psychologist, but twitter, YouTube and all the other websites dedicated to the fact that most people get a headache after they read more than two sentences leech off of peoples' desire to be socially accepted, and the Internet circlejerk communities fill that niche surprisingly well. I can't blame the thirteen-year-olds for hoping that if they show some kind of affection towards a camwhore, she'll show them her tits, but it's frustrating to see most of people thinking that way.

    Either way, what is the error your sister gets when she tries to log in?

    1

  2. I don't think you understand basic concepts of cryptography and security. I think Google could help you out.

    Basic concepts. As a matter of fact, I just read a pdf on this topic and it didn't answer my question. All I understand now is why a new key needs to be used everytime a message is sent and received since using the same keys will make it much easier to hack. Other than this, I understand nada on the answer to my question.

    That's because you don't understand the topic. Stop, turn around and go back to learn the basics that you missed.

    0

  3. The argument of "the OS is designed for the hardware" doesn't stand when you realize that Apple started using Intel chips quite a while ago.

    Even with Intel Tiger, there was an Intel and Power PC version. There was a lot more than just recompiling chunks of the OS considering the old CPU was Power PC. It had to be optimized for Intel... Leopard even offers further optimization... Just because it is deigned for Intel doesn't mean it will perform good on all Intel machines. Though I've never bench marked it, I've read posts from others in this forum who have stated OSX runs better on Macs than a PC with superior hardware.

    Do these people supply this with any reliable benchmarks? If the processor is the same in architecture and clock speed on both machines, there is no chance that the CPU execution time differs. What can differ is the memory-access time, but that's not a Mac/PC problem, it's the buss clock speed/hardware bandwidth problem.

    Mac vs HackintoshIt would have been nice if the tester would've disables one CPU on the Mac Pro (I think that is possible) and taken 2GB RAM out of the Hackintosh... Depending on how well the specific apps use two CPU's the results can mean nothing favoring the Pro. Also, the Macs were running Leopard vs Tiger on the Hackintosh.

    I still think that having an Leopard running on a Mac is far more reliable than x86 Hackintosh and the O/S designed for specific hardware is still an advantage..

    Exactly what were you referring to in your first post? Not trying to start a war over it, just curious about what you mean..

    EDIT: posted wrong url

    A "Hackintosh" shouldn't really count, since it's a Mac vs. Mac benchmark, not including the price difference, but even then, the hack is overall better than the original.

    0

  4. The argument of "the OS is designed for the hardware" doesn't stand when you realize that Apple started using Intel chips quite a while ago.

    Even with Intel Tiger, there was an Intel and Power PC version. There was a lot more than just recompiling chunks of the OS considering the old CPU was Power PC. It had to be optimized for Intel... Leopard even offers further optimization... Just because it is deigned for Intel doesn't mean it will perform good on all Intel machines. Though I've never bench marked it, I've read posts from others in this forum who have stated OSX runs better on Macs than a PC with superior hardware.

    Do these people supply this with any reliable benchmarks? If the processor is the same in architecture and clock speed on both machines, there is no chance that the CPU execution time differs. What can differ is the memory-access time, but that's not a Mac/PC problem, it's the buss clock speed/hardware bandwidth problem.

    0

  5. The argument of "the OS is designed for the hardware" doesn't stand when you realize that Apple started using Intel chips quite a while ago.

    Also, there is nothing you can do on a Mac that you can't do on a PC, and you'll pay less for it. If you like spending money for the sake of spending it to feel better, then go on.

    0

  6. All roads leed to thermite. Attatch an ignitioun switch to some place it over HDD and there you go. It doesnt matter how good they are there never gonna get your data off it once its molten gloop.

    And so you'll spend the next few months/years under arrest without access to anything for destruction of evidence before they go through all of your personal belongings.

    0

  7. o What are the latest IT vulnerabilities for companies

    There is no such thing. A vulnerability is a potential of a piece of code to be exploited, that is, used in other (most often malicious) way than its original purpose. If that's what you're looking for, try checking out:

    http://www.securityfocus.com/vulnerabilities

    http://www.packetstormsecurity.org/

    http://www.milw0rm.com/

    o What are the latest "weapons" to ensure system security

    Aside from Intrusion Detection Systems, there aren't many new pieces of software to ensure security. (new, as in, new capabilities. Most security products have yearly releases and daily updates) As always, the easiest way to ensure security isn't the fanciest software, it's user education and sane security policies. Proper network design can't hurt you either.

    0

  8. If it's really an issue of certain ports being blocked, you could set up your own proxy or use an existing proxy server.

    Though, for your needs, using mibbit (mibbit.com) would be a more elegant solution.

    0

  9. sori about dat bro,,,hehehe,, so wats the answer to the question? wats the 1st step to exploit the site? god speed guys... :D

    The first step is to actually learn how a forum you're exploiting works, how the vulnerability works, and then learn how the exploit you want to use works.

    0

  10. Intel Atom is a whole line of processors, not a single CPU. It can have either one or two cores depending on the model, so what you think is wrong. Second of all, processors don't have RAM. (I mean, they do have RAM, but it's called cache) RAM is another PC component.

    i'm guessing its dual p3 mobiles or regular p3's not xeon as it has half the ram of a xeon

    and how is the atom a single core?

    Write that sentence again, this time with punctuation.

    or is it just mine that has dual core's.

    No.

    Also, there are at least four types of Pentium III Xeons if I remember correctly, they differ in cache size and bus characteristics and you're not giving us nearly enough information to help you. That and your posts are barely intelligible.

    0

  11. Well, in that case I think I will try... C++.

    Why? Do you plan on developing some low-level software? If not, C++ is one of the worst options.

    0

  12. http://windowshelp.microsoft.com/Windows/e...b2ebd91033.mspx

    Which drivers get loaded in safe mode?

    Applies to all editions of Windows Vista.

    Which edition of Windows Vista am I using?

    Safe mode starts Windows with only the basic drivers and services listed here.

    For more information about these items, go to the Microsoft website for IT professionals.

    Show all

    Show allHide all

    Devices and drivers that start in safe mode

    Floppy disk drives (internal and USB)

    Internal CD-ROM drives (ATA, SCSI)

    External CD-ROM drives (USB)

    Internal DVD-ROM drives (ATA, SCSI)

    External DVD-ROM drives (USB)

    Internal hard disk drives (ATA, SATA, SCSI)

    External hard disk drives (USB)

    Keyboards (USB, PS/2, serial)

    Mice (USB, PS/2, serial)

    VGA display cards (PCI, AGP)

    Windows services that start in safe mode

    Windows Event Log

    Plug and Play

    Remote Procedure Call

    Cryptographic Services

    Windows Defender

    WMI (Windows Management Instrumentation)

    Network-related devices and services that start in Safe Mode with Networking

    Network Adapters (wired Ethernet and wireless 802.11x)

    Dynamic Host Configuration Protocol (DHCP)

    DNS

    Network Connections

    TCP/IP-NetBIOS Helper

    Windows Firewall

    The safe mode functionality is built into Windows, the safe mode switches can be triggered in the boot.ini file.

    0

  13. google confiker virus... there are all kinds of instructions on how to remove it... the confiker does not allow you to visit any anti virus site...

    So does a multitude of other malware. Unless we have more information, we can't say it's Conficker.

    0

  14. The window size is the size of the data transmitted in the given segment. It isn't randomly generated, it's negotiated upon the three-way hanshake, and then (usually) dynamically changed to account for the reliability (or lack thereof) of the link.

    I'm starting to get what you're saying here, but I'm wondering how is it generated? does it start randomly then dynamically changes or is there somekinda function that generates the window size according to some header data?

    Depends on the implementation of the TCP/IP stack. For the Windows family (or at least 2000 and 2003 server) it is first set to 16K bytes and then it is rounded up to an even increment of the Maximum Segment Size, which is negotiated upon the beginning of the session.

    0

  15. Looks like it does an exec("/bin/sh")

    How can you tell?

    http://www.dolcevie.com/js/converter.html

    Hex:

    eb:1a:5e:31:c0:88:46:07:8d:1e:89:5e:08:89:46:0c:b0:0b:89:f3:8d:4e:08:8d:56:0c:cd:80:e8:e1:ff:ff:ff:2

    f:62:69:6e:2f:73:68

    ASCII:

    ??^1??F????^??F??????N??V????????/bin/sh

    It's not hard to predict that since it's named "shellcode", it's probably supposed to start a shell. I can safely bet that the rest of it is a compiled call to some system exec function, and /bin/sh is the argument.

    Also, it's worth mentioning that the quoted piece of code won't do anything besides maybe informing the person who runs it that it couldn't allocate memory.

    0

  16. Damn, does this mean any Windows computer is potentially going to be infected on April 1st?

    Yes, potentially it could infect your PC.

    No, it couldn't. Conficker requires the MS08-067 not to be installed. Stop spreading misinformation.

    Why would anyone give a shit about this if a patch from October is sufficient protection?

    Because 30% of Windows out there don't have it installed.

    That's fucking crazy. So 30% of Windows users haven't updated for at least 5 months? Where did you get that 30% number?

    http://www.infoworld.com/article/09/01/16/...m_attack_1.html

    Based on scans of several hundred thousand customer-owned Windows PCs, Qualys concluded that about 30 percent of the machines have not yet been patched with the "out of cycle" fix Microsoft provided Oct. 23 as security update MS08-067.

    Mind you that was in January, so I suspect it might be around 20% or so by now. (but I wouldn't count on it)

    0