• Content count

  • Joined

  • Last visited

Community Reputation

0 Neutral

About qwertyman66

  • Rank
    mad 1337
  • Birthday 12/26/1987

Contact Methods

  • MSN
  • Website URL
  • ICQ
  1. I suggest you take a look at the difference between compiled and interpreted languages. C++ is a compiled language, so what you write is converted into a machine understandable form. If you are looking to exploit any kind of programmed computing device you need to know much more than just C++. For a computer, it would probably be x86 assembly language. For a portable device it will be another variant of asm dependant on the device. The fact you are asking if you can run windows on a DS suggests you do not understand much about computer architectures. I would recommend a book called structured computer organisation as a good starting point (assuming you have some basic computer knowledge). The rest of your questions kinda lead on from there, so I will leave it here. Hope this helps.
  2. Kismet on Ubuntu keeps it's config files in "/etc/kismet". Hope this helps.
  3. Maker Faire is in Austin tx on October 18-19.
  4. The main thing of any interest on open wifi networks is shared folders. Some machines have things like My Documents open to the world. If this is the case, you can browse them as if they belonged to you. If you happen to have some kind of customer list saved in there then it is open to anyone. This is normally how people get that kind of information. There are other, more involved, ways that may be available, but in 90% of cases it is probably a shared My Documents and an excel spreadsheet of customers. Edit: Shared printers can be...interesting as well
  5. It is definitely possible to copy the magstrip on the card, and getting the pin is quite trivial in comparison. Once you have them, you would need a cash point that won't check the chip on the card. Copying the chip would be more problematic. As I understand it chip and pin uses a challenge along with a link to the bank to check if the card is genuine. Check the below links for details: http://en.wikipedia.org/wiki/Chip_and_PIN http://en.wikipedia.org/wiki/EMV http://www.lightbluetouchpaper.org/2008/02...simple-attacks/ The other thing to consider is that all you need to use the card online or over the phone can be gotten in the space of about 10 seconds using a mobile with a camera by taking photos of both sides. If your friend has ever given the card to a waiter in a restaurant who has taken it out back to get the pin pad then brought it back then that may be where it has been done from.
  6. I'm sure you have thought about it, but you might want to avoid keeping images. I would guess that as tor is almost untraceable people would use it to access illegal content (i.e. child porn). Possibly not the best stuff to have ono your server. Especially if that machine was used to access it.
  7. The current release is supposedly the developer one. There is meant to be a later release around October that will have some more features including wifi. I think they are calling it the GTA02 (the one just out is GTA01).
  8. Is that a static IP? I just tried to get to your site via the IP and had no luck. If it is a static IP then surely you could pay all of about $10 a year or whatever it is to get a proper DNS entry aimed at it. If it is a dynamic one, then what you are trying will not work as the IP will change. If it is dynamic (which I suspect it is) then you will need a service like dyndns to have any kind of accessability to it. This is all assuming that your ISP doesn't block port 80 on your connection.
  9. The easiest way I found to start off with was cluster knoppix. Though as others have said, it is not as simple as just linking them to have a single big machine. For things like computing rainbow tables or ray tracing they can be quite usefull, just purely becuase the calculations can be done independantly and do not rely on the results of anything else.
  10. In about:config, change the value of general.autoscroll to true. This was bugging me for a while so I looked it up a couple of weeks back.
  11. They probably replaced it with a shh client They don't seem to have. The few times I have tried vista I have found the lack of Telnet or SSH a major irritation.
  12. It is quite likely that bit torrent will be blocked completely (It is here, sucks for getting a Linux distro). The best way around that would probably be a ssh tunnel to your home computer or a paid shell account. One thing you might want to keep an eye/ear out for is a campus dc++ network. Our network admins stop it at the firewall, but don't do anything about an internal private network. If your network admins see you constantly ssh tunneling out though, expect an email asking about why you need to do it. If they watch that tightly then you stand very little chance of file sharing.
  13. E-Bay has some, you might need to look a bit, but they are there for about £10. Make sure they will fit your radio though. Most motorolas seem to have a standard size plug, but I don't know if others will fit.
  14. Maybe take a look at digital multiplexers, they might do what you are after.
  15. To add to that, I am quite cynical about the value of any book containing the word hacking in the title. 90% of the ones I have seen are mostly vendor specific junk, with very little general content and a high price tag. If you learn from other sources to do things like program and disassemble and learn to recognise bugs and bad behaviour in apps, then you will have very little use for them. Just my £0.02