• Content count

  • Joined

  • Last visited

Community Reputation

0 Neutral

About Samodelkin

  • Rank
    DDP Fan club member

Contact Methods

  • ICQ
  1. Moderators, please feel free to move this topic if this is the wrong section; I am not sure where to post it so I guess this makes me a n00b, so here I posted. I am also a n00b when it comes to cell phones. I never owned a mobile phone in my life, I never needed one before. ("Why" is not important to the topic, so let's not discuss that please.) I know I may need to get one soon, and I would like to make an informed choice. I did some research and decided that I would prefer an unlocked GSM phone. However, there are hundreds if not thousands of choices, and I am looking for features that aren't easy to search for. Googling this is like searching for a needle in a haystack. Of course, I don't want to do this by trial and error. That's where, I think, is a good idea to ask fellow techies. The features I am looking for, in order from most to least important: It must be able to make telephone calls and fit into my pocket... the latter means, no bigger than a TI-89 calculator. A netbook is too big. No strings attached to the hardware. I want to own the phone in the same sense as I now own the laptop from which I exorcised Windows Vista a while ago, now replaced with Linux. I think this one translates to "unlocked GSM phone," but that isn't absolutely clear to me. The more customizable the functionality, the better. Ideally, I would like to be able to connect it to a computer and load my own programs to it that would be able to access its hardware functionality directly, without risk of destroying it. Hardware functionality to take advantage of. Infra-red, Bluetooth, and USB connectivity is desirable. (Yeah, Bluetooth would probably be turned off most of the time.) SMS, GPS, and zoom camera are desirable, but not particularly important. Price isn't a big issue at all, as long as it isn't something insane. I guess the ideal one would have all the capabilities of a cell phone and a laptop computer, in a chassis small and light like cell phone. I am aware of the alternative option (using a minimalist cell phone and carrying a notebook where I would use the non-standard features) but that plan is only there as a backup in case I never find a good cell phone. So, what kind of cell phone do you have, and would you recommend it? Perhaps you know of something you would recommend? Any functionality that you think is desirable in mobile phones that I forgot to mention? Any advice regarding selecting cell phones, in general?
  2. has set their status

  3. That seems unnecessary, not to mention lacking discreteness. The situation can be easily played better without any hacking on your part. Just discretely provide him with a tutorial on changing grades through hacking, then you can smile and walk away. He will make front page news! Extra credit, since it's human to take things too far every once in a while: Since you can edit the tutorial (or you wrote it yourself) before providing it to him, and you know he is a script kiddie, then you know he will follow the script you write. Use imagination. Your preparation time is virtually infinite.
  4. Yeah... Hacking is a modern buzz-word, so it seems to be popular with the media right now. The media seems to like portraying stereotypes, maybe to make people feel smarter so they feel better about whatever they are watching. I wonder how much that can be stretched, though. I wonder, how non-hacking-related a crime/misdemeanor can one commit, while obeying every media-portrayed stereotype of hacking, such that whatever one does will still be labeled hacking? "A 30-year-old guy wearing sunglasses, black hoodie labeled "HACKER", and a wide grin as seen on camera, was arrested yesterday for hacking 4 automatic teller machines (ATMs) in a subway station when no one was looking. Fortunately, he was caught in the act by the security cameras installed in the ATMs, and the noisy manner in which he was hacking them caused the guard who was watching the security camera monitors to wake up and sound the alarm. The police arrived in minutes and confiscated the cash canisters he extracted from the ATMs, as well as the tool with which he hacked them - a medieval battleaxe. 'You have to watch out for these hacker types,' comments the security guard. 'They can be real sneaky sometimes.' He jocularly added, 'The only reason we were able to identify this one as a hacker was because he chose to wear the wrong thing to work today!' The medieval battleaxe was later identified as one stolen from a nearby museum minutes prior to this crime. The suspect hacked the display case with a cinder block. 'It was scary,' said the museum manager. 'We never saw it coming, and before we knew it, our museum got hacked!'"
  5. Pardon my skepticism, but I try not to consider anything un-something-able. Ruling things out is a sure way to error. Surely, there must be a way to work the system, even if it's so crazy or impractical or otherwise uninviting that nobody in their right mind would try it. (That is, something besides the scripts you just linked to.) Seriously, how many things are mistakenly said to be unhackable, unbypassable, or something-proof, only to be debunked later? (Well, not many, but some; so you get the idea.)
  6. Thanks, that worked for some reason!
  7. I think I have a similar problem. To be specific, I am equally newbish at Linux, my laptop, HP Compaq Presario C500, has a "Broadcom Corporation Dell Wireless 1390 WLAN Mini-PCI Card", and the card always shows up as disabled. When I try to enable it, it is disabled immediately after. Looking through a small lid on the back of my laptop, I see a small card with a square chip that says "Broadcom" on it, so I assume that is the wireless card; there are two wires connected to discrete terminals on the card, one white and one black, I assume those go to the little light behind the "wireless" button that's on the other side of the power button from the mute button. I was trying to fix this problem for a while now. I tried some different Linux distros, (Ubuntu, Kubuntu, Knoppix, Debian, Mandriva, and I failed at installing Vector.) neither worked with this WLAN card. According to Mandriva, the problem is with the firmware or drivers. From what I remember from the Broadcom site, they don't have linux drivers for that card. I currently have Kubuntu and I plan on keeping it. Now, I know that soon I'm going to need wireless networking one way or another. If I am unable to fix the problem on the software scale, I will just have to try the hardware scale; I may go as far as buying a USB wifi adapter or replacing the wlan card with a more compatible one. (As long as it does not involve a PC-Card, my laptop doesn't have a slot for that.) I would appreciate information on any setup that may involve Mini-PCI cards, USB adapters, and any free software that may make it work. However, I would especially appreciate a solution that doesn't cost anything.
  8. I havent got a list, or seen a list for that, but here are some that come to mind: 1324, 1357, 2468, 9999, 8888, 7777, 6666, 5555, 4444, 3333, 2222, 1111, 2345, 3456, 4567, 5678, 6789, 7890, 0000, 1470, 3579, 4680, 1212, 0101......and thats all the ones that i can think off that are really easy to guess. You forgot 1337 and 7331. I apologize in advance to all those for whom this holds true.
  9. Of course it wasn't the government behind the attacks. I wonder why those silly politicians are always the last to figure out the most obvious things. What is more important to the Russian government: the honor of its fallen war heroes and those who protested to protect their honor, or relations with Estonia? Looks like we're about to find out.
  10. Не безпокойтесь, всё пока нормально. Although there are still people who don't speak English, at least correctly.
  11. I seriously doubt that the government would do something like that. I know that almost all Russians are very patriotic when it comes to issues of World War II. Perhaps even more so than the current Russian government. My best guess is that (like s25 just said) it was the people with skills, not the government, electronically protesting the removal of the honored monument. It was the oppression by the totalitarian Soviet government that the monument symbolized to the Estonians. However, it were the countless sacrifices of the brave Soviet soldiers; Russian, Estonian, and otherwise; that made the monument so important to the people. For thousands of years, the few politically-powerful leaders near the top of the power structure waged their war for their agendas, while the masses of their politically-powerless subjects were forced to kill for them and die for them; no doubt these leaders will want to keep it that way. This year, the tragic pattern appears to have been broken - it was the civilians, the ordinary people, who protested. Their actions may have caused an "unclear amount of damage," but not a drop of blood was spilled. The Estonian government actually did more damage maintaining order (100 injured, 1 killed) than did the DDoS attacks, (possibly the most peaceful "war" in history; all the damage is digital, not a drop of blood spilled) yet the protesters are being accused of "cyber-attacks" and a "cyber-war." These people spoke out for their collective beliefs in a (relatively) peaceful way, yet these people have been labeled the "cyber-terrorists." Swerve is right, this may very well be the future.
  12. I have an idea for a prank: 1) Disable your computer's CD/DVD drive auto-run 2) Burn a program that ejects all the CD drives as an auto-run program, onto a CD. 3) Mark the CD with something mysterious and put it somewhere so someone would want to find out what's on it. One of three things will happen now: either the victim gets bored and throws the CD away, either he or she figures out to disable the auto-run and finds out that it's a prank, or he or she will continue shoving the CD into the CD-ROM tray for some time. 4) Enable your computer's CD/DVD drive auto-run now, if you want
  13. Hmmm... My Windows Vista laptop, I never did the activation on it. So far, the Vista operating system on it offered less functionality, a lot less less compatibility, and a bit more bugs than XP on my desktop. Can I still somehow get the refund for the Vista if I never activated it?
  14. Just curious, does anyone know what the Windows Genuine Advantage thing will do if it finds an illegitimate copy of Windows XP? I mean, the description says it helps the user acquire a genuine copy of Windows XP, but how? How exactly does it convince the user to get a genuine copy of Windows XP if the user is satisfied with the illegitimate copy? Does it become malicious or hold the computer hostage or what? :grr:
  15. I have been using Windows since 95, and I did not have much problems with it. And I did do some testing on the Vista, found a sidebar feature and a new voice for the voice synthesizer. As for hardcore testing, you have a good point; I will try running a high-graphics game on it. My desktop (Windows XP, built some years ago) has approximately the same (just slightly lower) hardware power, so I could test the two systems against each other. Also, when I first turned on the notebook, I read the license agreement all the way. :jawa: I definitely did not comprehend it all the way, but I read it all the way. (if staring at text and sort of hearing it in your head counts as reading) I found some parts... unsettling. I think it says Microsoft can intentionally delete or confiscate all the files it doesn't like or likes too much, respectively. (And since this is a hacking forum, I wonder, can only Microsoft can do that to Vista users?) Thanks for the help everyone, this makes much confusing stuff more clear. (not that I am implying that I don't want any more input on this )