stderr

Members
  • Content count

    166
  • Joined

  • Last visited

Community Reputation

1 Neutral

About stderr

  • Rank
    SUP3R 31337
  • Birthday 12/23/1987

Contact Methods

  • AIM
    chessmanjoe
  • Website URL
    http://stderr.linuxinit.net
  • ICQ
    0
  • Yahoo
    ksmchess

Profile Information

  • Interests
    Baseball, rock climbing, rappelling, kayaking, computers, hunting, and fishing.
  • Location
    USA
  1. http://www.underground-book.com/ Great book. Might also check out The Cuckoo's Egg
  2. It all depends on the environment you plan to be working in. If your servers are going to be running in Windows, then you may want ASP (although PHP would still be an option.) If you're working in Linux, you generally have the LAMP (Linux, Apache, MySQL, PHP) setup, in which case you'd want PHP. If you're learning C now, then making the transition to PHP will be very simple, as the syntax is much of the same. Personally, I'd go with PHP, but it depends on what you need to do.
  3. http://defacebooked.blogspot.com/feeds/posts/default Will that do?
  4. This is somewhat in response to Professor Bagelwood's post on the Facebook Honesty App. (http://www.binrev.com/forums/index.php?sho...;hl=honesty+app) While playing with this, I found a few flaws in various Facebook applications. Most of the flaws include not verifying if an individual is a friend, and also not verifying if you're sending the correct user id to the third party's application. Input validation people, let's get on the ball. Anyways, a friend and I started a new blog for this topic. Your help in playing with other applications would be appreciated. http://defacebooked.blogspot.com/
  5. When in doubt, just stick it in a blender.
  6. Oh yes, that's amazing! I've had my eyes burned out by the acid of horrible powerpoints way too many times.
  7. You've got to be able to turn your card into monitor mode.
  8. When I developed an app with facebook, the development documentation stated that any images your server serves, facebook caches them and serves them from the facebook servers as to put less load on your servers. Unless they have changed that VERY recently, it hasn't changed and thats how it works. I don't know how superwall works, so you'd have to ask them how they do their stuff. Yeah, I wasn't looking at the return from visiting the profile. It looks like everything's cached into http://upload.facebook.com/application_proxy_image.php My fault guys. I was receiving the request from directly after I posted my image, which is when it cached the image.
  9. I'm guessing facebook doesn't allow direct links, most likely the image is stored on facebook, or facebook has some code that sits between all images and the outside world to deter this sort of thing. It doesn't store them on facebook, it goes directly to the link provided (at least with Super Wall). I didn't check to see what information is sent though.
  10. Then again, the video only discussed OPEN wireless networks, nothing about encryption. In order to just snoop on someone, it'd be just as easy to connect to the router, and then arp spoof and MITM sniff everything... no need for expensive drivers here *cough* cain. They also mentioned that anyone "moderately" informed could pull this off. Maybe they were just trying to give hope to those that only run Windows. All in all, that's still no excuse for a guru.
  11. I love how "IT gurus" use netstumbler instead of kismet. Nice windows boxen Mr. IT Guru with a massive combover.
  12. Possible solution? There are a few applications on facebook that you can add to your profile that allow linking to off-site images (super wall). If you throw an image on your facebook that points to something on a server where you have access to statistics, or the server itself, you could get information about the person that viewed your profile at (or around) the time that someone posted to your honesty box. This is just a theoretical, because I haven't tried it, but there may be something revealing in the referrer sent from facebook? Perhaps the user's ID #? Anyways, this could help narrow down exactly who posted "anonymously."
  13. xterminal and gnome terminal simply provide access to the terminal services in a graphical environment. I'm not very familiar with SUSE, but you may be able to find the pre-compiled drivers in some repository. Most people just compile the drivers from source though. This will be necessary if you want to enable monitor mode on your wireless card, as it's not configured this way by default. The commands in the tutorial should be entered in a command line of some sort, whether it's xterminal or whatever. Commands preceded by '%' can be run as a normal user, and commands preceded by '#' should be run as root.
  14. Not sure if your scanner has CTCSS scanning capabilities or not, but that can be interesting with FRS radios. People think those "privacy codes" help, but the radios simply ignore any transmission on the given frequency that doesn't have the correct CTCSS tone when they key up. If you can scan for these codes, you can easily get the privacy code number that the party is using.
  15. You can find many Internet tutorials on C, but I would recommend visiting the local library, or just go ahead and buy a C book. I personally like Practical C Programming 3rd edition - O'Reilly press. To each his own though... find something and work through it.