pixelFiend

Members
  • Content count

    659
  • Joined

  • Last visited

Community Reputation

0 Neutral

About pixelFiend

  • Rank
    Hakker addict
  • Birthday 08/31/1968

Contact Methods

  • Website URL
    http://
  • ICQ
    0
  1. Happy Birthday

  2. Even the best of us just have to settle at times. PF
  3. I came into work today and had a nice surprise waiting for me! I'm really friendly with the UPS guy who delivers for work and also deals in antiques, and he dropped by with a Stromberg Carlson 1243 in pretty decent condition! It's looking like a metal base and bakelite handset, since there are some places where the paint has rubbed off the base and the handset has a small chip out of it and the outer resin is definitely wearing in a couple places. The cords are in great shape, and though I'm not sure if they're original, it has the cloth handset cord and a straight black wall cord. I'd take a picture but I don't have my camera. I'd like to see if I can get this working. I haven't had any chance to research it much since the boss is on the warpath (it is Monday after all). Does anyone have any sites for refurbishing these, especially doing a wall cord conversion? Thanks! PF
  4. Oh brother...
  5. I found an interesting way around Deep Freeze for my wife, who is an elementary school teacher, a few years ago. You see, when she left school for summer vacation one year she had a computer sitting on her desk that did everything she needed. When she came back in mid-August to set up her classroom she found a new Dell with DeepFreeze installed, and not much else. I took a half day off work and helped her set up her printer, and a few programs that she came to rely on. A couple weeks later I did it again. When she told me that the box would reboot once every half hour and reset I started looking into Deep Freeze. When I found out what it was (I never worked anywhere that restricted a computer's usefulness like that), I told her to unplug it and put a sign on it that read "Useless Machine" and sit it on a chair in the corner. To make a long story shorter, after several teachers did the same thing a meeting was held, and a list of apps were made that were to be installed either on the network or on the client machines. It's a good app, but I couldn't believe that when it was installed they hadn't even set up the printers that were included with the workstations! While not exactly a hack, it was an interesting piece of civil disobedience in an environment where these kinds of changes normally take an act of Congress to get done. PF
  6. Every once in awhile I'll check out lynucs.org and their screenshots. It's been a while, but they used to have some interesting stuff. Lots of the backgrounds used come from deviantart. PF
  7. Several apple consultants and service techs I know have iPods with stripped down installs of OS X on them that they use for troubleshooting, almost like a diagnostic liveCD kind of thing. Very useful... PF
  8. This all sounds vaguely familiar. PF
  9. Sorry for the old info. Haven't been around for a while. The posting to the Asterisk group was made 4 hours ago, so I thought this was relatively new. And I did typo Chap 8 instead of 9... /me slaps his hand. PF
  10. Those of you who are Asterisk gurus may not be as interested, but I'm sure many others will get a lot out of this. Here's a posting recently made to the Asterisk-Users lists: I've been skimming it and it seems like a pretty good beginner's read. There's some more advanced stuff in there as well, like chapter 8 on the AGI. PF
  11. Um, or you could keep it at home and join the BinRev Distributed.net team... http://www.binrev.com/forums/index.php?showtopic=8 PF
  12. <letter to your teacher> We have kids in this class who are training to be hackers. *she types on an imaginable keyboard* DESTROY DESTROY DESTROY!!!" I'm sorry, but this is not quite accurate. You have hackers in this class who are training to be adults. A hacker is not something you become, it is something you are or are not. Hacking is a mindset in which you are hungry for knowledge and eager to learn everything there is to know about a subject, either by reading, through trial and error, or exploring and learning firsthand. Some misguided people have carried this exploration too far in the past and trespassed where they were not allowed. These incidents have given rise to the belief that all people interested in computer hacking are criminal trespassers with low morals and high IQs. The mass media, in their efforts to make current events into entertainment, have propagated these beliefs and fanned the flames for the past ten years. Real hackers create. They create an answer to a problem. Create a computer program from alphanumeric characters. Create a computer from electronic parts soldered together in someone's garage. Create the world wide web from an idea about sharing information. Just as there are good people and bad people, good police and bad police, good firemen and bad firemen, good politicians and bad politicians (OK, it's a stretch), good teachers and bad teachers, there are good hackers and bad hackers. Please don't confuse the two, and please don't lump us all together into one group. </letter> PF
  13. This has always been my point. Since everyone always cries that Macs cost more, why would you want to put a Linux on one? OS X's terminal shell has been Bash natively for a few years now, so you don't have to go through the headache of changing your default shell like you used to (it used to be TCSH). You can just about do everything in OS X that you can in Linux, out of the box. With a couple tweaks and downloads you can even update apps APT-style. The only thing I really haven't been able to do is spoof my MAC address, and I understand that there are ways to do that, though it's really difficult. All that being said, I'm curious as to how well, or if it will be possible, to run Knoppix remasters or other LiveCDs on the forthcoming Intel-based Macs. PF
  14. I know, I used to watch every night. And from checking out that page I can see two reasons that Rocketboom is most popular. /me is a horny old man. PF
  15. Well, if you're looking for something to follow "Art of Exploitation" You could consider The Shellcoder's Handbook. It's pretty advanced, and it'd help if you have a C and/or Assembly background. Otherwise, I have a friende that swears by Code Reading: The Open Source Perspective. I haven't looked at it too closely yet, but it claims to help you understand how to read good code, which is one of the ways to learn better coding. PF