• Content count

  • Joined

  • Last visited

Everything posted by p0d

  1. go here: ANAC numbers list. Thought it may be helpful. --p0d
  2. /* generic update */

  3. From my understanding of IP law (IANAL), there's a point where something has been in the public domain long enough that the idea of turning it back over to corporate holding and alleged patent holders is flat-out ridiculous. The Linux source has been freely available since the early '90s, and if what Ohm says is correct (that the file of contention was errno.h)it should be obvious that there's going to be naming overlap to effectively describe the errors the OS has to handle on a day to day basis... it's like patenting the dictionary and suing authors of books. Am I wrong?
  4. You guys do know that JFalcon and Beave are BinRev members, right? I am sure you could direct questions about their system to them on the forums, heh, ask stank for a an OpenVMS/VAXen section. You usually find them in Old School Phreak, not often though. You could give 'em a ring at the Telephreak BBS, I do not know them personally, but we've talked and they seem like nice guys.
  5. Quick question, and this is more aimed at AT&T Verizown and Comcast, WEP is riddled with security faults, granted I have been out of the scene for like a year or more, but WEP security was an issue in '06. Why on earth are routers still configured to use WEP by default? I really shouldn't talk, our router at home is completely unprotected, but seriously, people are still able to do this? I guess the reason why I am having a hard time believing it is because I ran a kismet session as I drove up the highway from Boston to Amherst and the I only saw maybe 10 or 12 unencrypted networks (one of them was an insurance agency and another was a doctor's office *yikes*) and I only say maybe 9 WEP networks, the rest were WPA or WPA2. (I should mention that I snagged like... over 140 networks in total) I would like to make another observation, most of the WiFi networks you are going to run into in the suburbs are not going to have a "SysAdmin" or "SysOP", or even in the cities for that matter (unless you are in a financial district or at an airport. Basically, I have pretty strong suspicion that your activity will go largely unnoticed until you do something like, turn of WEP or change the name of the network to "network-of-t3h-p\/\/n3d", "lul-usux" etc, etc. Hell, I am not sure if a cop would even know what do with a kid if he caught them running kismet and aircrack-ng; this is assuming that you are not dressed in black crouching in the foliage with a laptop and smelling kind of odd... moving on. I am intrigued though, I was never able to get WiFi cracking quite down, perhaps I was two impatient or my driver didn't support packet injection, it was most likely the latter. Thanks for the link btw I will see about buying the Alfa, hell, looks like I could make my own amplifier for it!
  6. (Glad to see not much has changed) /grumble Heh, funny story about this sort of thing. I know a kid, he pretty much did exactly what you are talking about, installed unapproved software onto a school computer, assisted several other people in doing so and set up an SSH server with tunneling; gave is friends accounts, blah blah blah. The SysAdmin finally looked at the logs one day, noticed over 4gb of traffic going to a residential line. You can pretty much figure out the story from there. I've tinkered around with networking, I am no expert, but I know enough to tell you: a) messing around on other people's networks (especially the school's) is stupid and not worth the risk a computer that sends encrypted data to one IP (and a residential line at that), and only that IP, when it didn't do that before will raise eyebrows c) several computers doing any of the above will prompt immediate action (even one will prolly do that) and probably raise voices Don't get me wrong, I think SSH and Hamachi are really neat tools, and I think that you could definetly do something useful with them. Circumventing a firewall at school or at work is silly, you're there to do a job, and it's not worth the risk of getting caught.
  7. How does I shot web?

    How does I telnet boxen root?

  8. Huh? There's got to be something you are not telling us here, you need to use a proxy to read Manga online? What kind of Manga is thi-... nevermind, I really do not want to know. Understandably so, as most schools do not take kindly to kids using proxies... especially to look at "Manga". So, you bypassed the login screen... and then found "your sisters" account and password, this has got me tripped up a bit. What do you mean by bypassing the login screen... what log on screen, the NetWare log on or the Windows log on? If you bypassed the logon screen... well damn I am confused; at anyrate, you have an account (albeit a hijacked account) why not just use that one? Also, if it really was your sybling's account, couldn't you have just asked to use her account every now and then, you know... rather than breaking into it? Bottom line, I would like more information.
  9. Not exactly sure where to put this, but I thought it would be fun to share what we have done to keep old PC/Laptop systems "running." My Dell Inspiron 1405 is a franken-box with a screen from another model dell laptop, most of the screws where replaced with stuff I bought at home depot, my CD drive is held in place by duct tape and a paper clip, the keyboards arrow keys are broken and the case is held together with electrical tape. How about you guys?
  10. Why do we even go here? Windows is not a Unix system. Why do you people keep comparing it to Unix or any Unix-like operating system? There have been only 2 valid arguments here (and I am to lazy to dig through the fire and flames to recall them), but even then, most of you seem to miss a really key part of the discussion: Q.E.D. WINDOWS IS NOT A UNIX OS, STOP COMPARING IT TO CERTIFIED UNIX'S OR UNIX DERIVATIVES. (caps-lock is cruise control for cool) I know me saying that won't change a damn thing and we will still see all the unwholesome carnage that seems to be key with these debates, but could we at least acknowledge that they are different beasts? Granted you could feasibly ridicule MS for essentially wanting to be a Unix system but quite simply being to damn lazy to go all the way with it. Hell, ridicule Vista for ripping off Mac with their GUI design, but stop going on and on and on about how dreadful each and every version is. For Christ sake, it's just a bloody Operating System. Point out something new, stop rehashing what was most likely posted in 1995.
  11. Have you ever lost something and never recovered it? Something such as a CD or... /allot/ of CD/LP material? Like let's say that you have and that it was around 4 thousand+ dollars in software, hardware and music; well that is what happened to me and being strapped for cash I have tried to legitimately recover the really really expensive stuff (props to propellerhead). Yet there's allot of stuff that I really do not know either A) how to recover or where I can get it again legitimately, and since much of the actual paperwork was reduced to soot and embers (fire from a lightning strike) I really have no proof of purchase. So all the samples and loops that I had are fucking gone and I do not want to shellout all the dough for legitimate ones... but here's where it gets tricky; Is is really Stealing/Pirating if I am merely replacing something that I already purchased (only a few months ago)?
  12. I am just getting into solid state electronics, and I would have to say that not much beats the 555 IC timer chip... I mean, it seems like you could use it for everything.
  13. Well, to be a pendant, it's not that ironic as he/she is a juvenile. Therefore, it's to be expected and is not counter intuitive. Other than that, I completely agree with your point. School's are not "Gibsons" and are not hard to "hack" or compromise. They are actually (well, public schools anyway) government funded entities, but unlike most government related institutions, they really could care less about their security. It's getting better, but only because making things more secure (against basic attacks) has become more automated and easier to maintain. However, because they are government funded and they, obviously, maintain goverment property (your grades and such) and by modifying said property, you can (and will mind you) be charged with vandalizing government property.
  14. This seems like a neat little project that I thought up. A small solid state Tesla Coil hooked up to the Ring and Tip: when a phone rings 80v of AC at 20hz shoots down the line, now what if the AC tripped a small IC that in turn governed the primary; you could even make it an audio modulated speaker for your speaker phone! I am totally working on this (in tandem with another audio modulated TC).
  15. They would be electrically isolated... more details on that as this comes along.
  16. Not true in every case, but it can still be presented and it usually sways the jury.
  17. Wow, they give you laptops, That's absolutely braindead. I just hope that they don't let you take them home. I think'll take a look at this in a way nobody else has seemed to. Not to rip on the OP, well not /to/ hard, but isn't this kind of ungrateful on your part? I mean, you literally just began your school year and the school's nice/niave enough to give a laptop, and all you want to do is break into it? Just so you can get on myspace or some other shit, or maybe install Cain & Abel and then go parading about the network with adolescent bravado, you know, deleting directories with impunity, screwing with teachers worksheets and grades (depending on the system you use). Then when thats all done, you go and brag about it to your freinds as your sorry ass gets hauled into the vice principle's office and he tries to explain to your hohlraum of a head that because you decided to go on your little victory dance through the servers, you charged hours of work to an underpaid woefully understaffed IT Department. But wait, it won't stop there. After you get suspended (or expelled, depending on what you would decide to do) you come back (maybe) to find that every computer is gutted, they all have been electrically eviscerated and even though you know physically CAN'T do anything with the computer, they still put massive restrictions on everything. Now when you want to go do research for project, you need to have the URL apporved by a teacher, and you need to be monitored constantly. Sorry for the two paragraphs of smoke and fire, but in the end, trying to get Admin privs on a school machine is just a waste of time. There's nothing really interesting (other than grades, and more often than not, those are stored in a seperate location) on their network and if you wanted to get admin privs in order install some game or whatever, those computers are usually so cheap that they will have trouble running M$ Word. It's easy to reak havoc, I mean it is really easy but it is also incredibly immature (but fun...o_0) and it ends up being way more trouble than it's worth. In short, even if you do get in, you will be caught, punished and the entire community will suffer. Just be a good little techy and experiment on your own machine.
  18. Agreed, while you're at it you could also start using 64bit. In my experiance though, you should never even attempt to "upgrade" an OEM machine, because (if your objective is a better system) you will end up replacing pretty much everything that came with it, monitor, keyboard, mouse, PSU, CPU MB, your GPU and then you realize 'Hey, this case really sucks...' and you go out and buy that too, then Presto Chango, lo' and behold, you have a box with only about 2 or 3 of the original components. All in all, you could've just made a new box from scratch and been happier with it. Bottom line, you can make a better machine for about $700 (not including the monitor and such) than most of the OEMs crank out and sell for around $1500. Also, it's always good to have a "beater" lying around for things like firewalls or DMZs and just experimentation in general. Oh yeah... and the wiring schemes of EVERY OEM suck.
  19. Yeah, to bad I am having a hard time understanding it... >_> I need to make a driver circuit for a project I am doing, using the TLC555 as it can reach frequencies up to about 2.4Mhz... but I want to understand it first. Any one here pretty good with 555s? Anyway, yeah the 555 IC is pretty damn flexible chip. EDIT: Also, is there anyway I could design an accurate and cheap circuit that produces freqs around or above 24Ghz? Sorry, this wasn't a post asking for help, but I am trying to get into HAM radio and, well, HVHF electronics in general. My guess is I would have to make my own capacitors for a job like that. Basically, I want to be able to hear what is going on at 175Ghz and above... not that you can do that with a 555 timer IC... Anyway, I have a feeling that either 1) Nobody cells equipment like this to civillians 2) this equipment is expensive to buy, ship and maintain 3) phucking around at such high freqs will get the attention of certain govenrment agencies (not that I care) 4) this is just not attainable with the current technology that is available to the public or even most private organizations. I think it would be pretty sweet for an amature to get up and above 500Ghz or even 1Thz (wait a second that's just infrared light... oops lol).
  20. Hahaha. I like that. Your laptop should have a fingerprint scanner, retinal scanner and voice authentication. But all that shit wouldn't matter if I have a copy of EnCase v.6. Muahahahhahaha How can EnCase stand up to a Blowfish encrypted Stenographic file system? LOL, stego FS.
  21. Where the hell can I get some good docs? Simple as that, I don't want to be spoon-fed, I just need a compass (so to speak) that points in the right direction. It's all so clandestine (or at least to me it is), a million different acronyms and colloquialisms, and no reliable text or dox, I mean damn... I'm getting the to think that pretty much everything that is known/learned in this area is from perilous experimentation. Not that I have a problem with that, but as a total and complete noob, it is a little overwhelming, and at times, downright frightening. I have been on a tyraid looking for info for about a year now... and I am not much farther than where I was 12 months ago. (Well, I know a shit ton about electronics now but I have not applied it). Bottom line I am not making much headway and I would really like some insider tips. Basically, here's what I would like to know: Interesting places to look How to NOT get busted Some docs, fairly recent, on 5ESS and DMS-100 or DMS-10 How to tell what kind of switch I am on when dialing a # (that's porlly more to do with experiance) How calls are handled and processed and how to manipulate that (to some extent) What NOT to do, what NOT to ask for I'm sorry if that is a tall order. Maybe it should go into newbie HQ but what'evs... I do not want the key to the kingdom... I do not even want the map, just some paper and pencil would be nice. ;-)
  22. Dude you got me all wrong... phones have fascinated me for a long time now; I am finally getting into it and understanding it. I have an unshakable creed: I cannot use that which I do not understand to its fullest capacity. I have to bend the rules quite a bit, but I still believe in it. PS: HOW DOES A HACK GIBSON?
  23. Dude, they should just go the whole nine fucking yards and have webcams with retinal scanners....;P
  24. C'mon guys... what do you really think, albeit I could've lied my ass of for some of the shit but, when you forget what's called... well that's just makes things more difficult You know, perhaps the fire was a good thing, I mean I did have way to much shit and it saved me from cleaning it all up... well on my HD that is. *Note to self: Arson is an effective cleaning mechanism*
  25. There's a difference between "threatening" and "are going to." They put you on an Ubuntu box? Why on earth would they do that... clearly you're not telling us something. We need more detail if you want help, be rather indiscreet about it though; after all this is a public forum. EDIT: IANAL Also, if they DO sue you, their case would not be very compelling if they didn't provide things like "time stamps" and logs, pretty much everything about their network topology; further, why don't they press charges and have you arrested? I call this one a bluff, but if they want to accuse you, you have the right to ask why (just keep asking it) and genuinely bug the hell out of them, call up all the relevant people and record the conversations (disclose this of course) while you ask questions, if they ask why say that you would like to know on what grounds you are being sued for and, if it is what they say it is, why you have not been arrested. Ask if they have a lawyer, dig up some info on the company; basically arm yourself to the teeth with information and ammo against them, then if they keep at it get a lawyer... Also, depending on how often they are doing this you can threaten to sue vexatious litigation (I would just throw this right at them). I tend to ramble and I AM NOT A LAWYER, but I hope that helps! EDIT (again): Sorry, you wouldn't be able to sue for vexatious litigation unless they actually sued you, then you would have to prove that their suit was done with intent to "vex" or harass you but you could still say "well if you sue me than..."