swestres

Members
  • Content count

    164
  • Joined

  • Last visited

Community Reputation

0 Neutral

About swestres

  • Rank
    SUP3R 31337
  1. If I was a gouvernment I would monopolise alcohol distribution too. Think of all the money I would make. Then I'll justify it by saying: "it's what's good for the people" and nobody whould bother me. I would make millions! Muahaha. It's not like it's hard to obtain alcohol in Sweden. Drug stores arn't allowed to sell alcoholic beverages with >3.5% (by volume) alcohol because they might sell it to kids (that's the official reason anyway). As long as you're of right age (20) you can buy it in any Systembolaget-store in the country. It doesn't matter if you're an alcoholic or not as long as you're above 20 years of age and standing. It's pretty expensive though ('cause of the taxes), that's why most people drive to Germany or Poland to buy their alcohol. Also, you can get a permit from the police if you want to use pure ethanol for something, like cleaning PCBs before etching. And denaturated alcohol (works just as good for what you wanna do) is not regulated in the same way, you can probably buy some at your local paint shop. Or, try acetone.
  2. Richard Stallman is not a very good speaker. He's impatient and ignorant of other peoples beliefs. IMHO. Just wanted to say that. I'd love to go though, but it's kinda on the wrong side of the planet for me.
  3. I don't hate windows, I just don't use it
  4. You're still using the same spectrum so there's no way you'll be able to use them simultaneously. Imagine two radio stations broadcasting on the same frequency. You could try to use a broader spectrum, but that's less likely to work over longer distances. Also, the DSLAM would have to be able to handle it. However, if you would use one modem to sync up, disconnect it and then the other one for the rest, I guess that'd be possible, depending on the config.
  5. What a perfect opportunity to try out minix, with jwm as the wm.
  6. The 24'th CCC conference has ended, here are the recordings: http://events.ccc.de/congress/2007/Conference_Recordings
  7. Doesn't really matter, but the .rsrc (resource) or .data sections are the most common places used in PE files. You could make one section for every binded file and have the stub (the main program) look through the section table, with the sections that has files in them named .f000001, .f000002 ... .fN. There's a lot of ways to get things done. It doesn't have to extract them, some binders contain code to load the files themselves, or injecting them into other processes.
  8. If you have a framework providing the library functions needed, you only need to port the libraries. It's a bit more work of course, I just wanted to point out that it isn't "100000x harder". Regarding winsock, you can alway go with: #ifdef WIN32 #include <windows.h> // a lotta other elsifs here #endif and write a set of low level access functions for networking that provides a common interface so the only things needed to port whould be those libraries. Secondly, I stand corrected then I can't see why there whould be portability issues if they designed the interaces good, but it's not my project. However, the dev-time whould increase, I agree with that. I had a hard time taking you seriously and I was kinda in a hurry when I answered. I know just how portable C is, so I figured every one else (e.g. the guys at metasploit) knew that too. Now you're making assumptions. I've tried Ruby. Let me put it this way then: what does STL means to you? And like the other guys said, dynamic typing is not what you think it is. EDIT: sp
  9. Right... C is very portable, just look at NetBSD. It's only a matter of writing portable code. If the framework provides interfaces for this, there should be no problems. I don't think they didn't choose C 'cause of portability issues.
  10. Or even better: while [ 1 ]; do sync sh $0 done; But let's face it, it's about as useful and fun as an appendix.
  11. It depends. It might have a file somewhere in the file system, or a registry key you don't know about. Some check the time using the network, some just calling ctime(). The best way to know is to fire up a debugger like OllyDbg and set preakpoints at calls like ctime, GetSystemTime, CreateFile or similar. Or backtrace it from the message box/dialog that tells you taht your trial time is over. Then fill the tests out with nops or w/e.
  12. There's a small (611 B when assembled, inc. ELF header) SOCKS4 implementation for Linux here. It's PIC, so you can patch an existing binary with it, thus hiding it in the fs. Works nice, I've used it for my http traffic since yesterday. No problems at all so far.
  13. Dont encourage users to leech using tor as it extremely bad for the network and ruins it for everyone else as it will utilise alot of bandiwdth. You just have to get the .torrent through TOR.
  14. It depends, usually unique strings, like "This 1337 ├╝ber RAT was coded by h4xm4n". The signature is just a check sum, it doesn't matter how you represent it. Internally, it's like everything else, ones and zeroes. They don't have to. They hook API calls, and if they see any strange behavior they warn about it. They run it in a sand box, and if they see that it's injecting code into another process that's connecting to an IRC server, they warn. It works good, I guess.
  15. Same guy changing tracks on a railway station and opening a bridge: http://www.tastelikepizza.com/index.php?itemid=6104