• Content count

  • Joined

  • Last visited

  • Days Won


Everything posted by Phail_Saph

  1. Hi Everyone, Cult of the Dead Cow has done it again and so now the hacking community has another wonderful tool. It is called Goolag and it uses Google itself to determine security vulnerabilities on their websites. If you guys had been wondering why for the past two weeks or so you would sometimes have Google asking you to type in some jibberish into a text box that was displayed in Graphical form well now you know why. It looks like Google has had a difficult time zeroing in on the malicious and unmalicious. Be warned however, that Google will pick up on your scans after some time. A simple counter to this is to use ipconfig and then /release followed by a /renew. This works in all public spots like a library or Tmobile. Overtime you will have difficulty keeping yourself undercover if you do this at home since they can easily block your router alone. Anyway have fun....GoolagGoolag.txt As always in order to defeat the trivial .exe file type protector this file was renamed Goolag.txt. Once you download it rename it back to Goolag.exe and the setup program begins immediately. Hopefully the voice on the other end was an actual'll see what I mean when you download it. Have Fun, -----Phail_Saph-----
  2. I'm fuming right now. I'm reading this article about how a former "hacker" rated out the guy who release the video of the that made big news a couple months back. This video alone singlehandedly brought Wikileakssubstantial funding and has made it a source beyond the hacker and underground community into real world respectability. I place Wikileaks along side the Electronic Frontier Foundation as two of the most powerful institutions true hackers and disrupters of society have in this world.See, this article highlights how this shit bag is in no way a hacker and just purely a criminal. There are many "hackers" who have gone the way of the dark side but once they make that choice they are no longer following the real way of hackerdom. I'm going to do more research on this character now...and attack him on twitter where he apparently likes to reside...but he probably was never a true hacker just someone who had great ability and followed his more powerful instinct which was to be a scumbag criminal. You can never be an "ex-hacker." Someone who uses that term was never a hacker to begin with. What do you guys think? And don't let my strong feelings deter you...I really want to know what people think.
  3. is going to continue to follow lattera and recommend that he say YES to drugs

  4. Perhaps you should...your beginning to sound a little toolish..we all are having a conversation here...with a lot of diversity isn't composed of US and YOU... Not really...unless you have some more info here...last night I read the article I linked and the Wired one before I crashed...especially the Wired one indicates that they were friends. So there was already a preexisting relationship, a friendship...this only adds to my initial disdain for him. He could of said..."Hey bud, leave me out of this"...instead he actually recording all their IM's. Did he inform his "friend" that he was essentially recording everything they were saying...that's shady. I think that that point was the emphasis is appreciated... This is where you can really add to the very much seem to imply that you know the guy or have some esoteric information about him that we don't...why don't you contribute that. I just got done reading the link from Mr.Fluffy's (who I'm starting to like more and more...I'm away for a couple months and a new good guy joins...last time this happened nyphonejacks joined) post and my initial impression is even more unimpressed. That wiki article is gigantic for a doubt he uses it to advertise his "legitimate" hacking skills, it is written like an advert...which this whole event in my hacker paranoia seemed to be the real reason from the beginning- an excellent opportunity to advertise himself by rating out a guy who is trying to expose things for people...whether or not you agree with the soldier for doing it. I was a soldier and lose it when you leave...Top Secret clearance at one time and never would I, personally, do what he did unless it was a violation of the constitution which I'm obligated to protect. As to this kindergarten morally of not talking about someone without knowing him...please so toolish...we do this all the time. He is in the news and that is what enlightened citizens should be doing...discussing it and sharing their opinions. I shared an initial feeling...not my "researched" and final opinion. When I or others post something like this, we are talking on a digital street corner fishing for perspective. I shared an opinion that many would feel about someone who rated someone out...he better have a good reason...but the more I actually look into it, it seems not noble at all and harmed someone who did great help by putting Wikileaks in the big leagues. Anyway, if you know about this guy then share it and add to the milieu...thanks.
  5. I have a Curve too. It's funny that you have to reboot a lot. I've had the opposite experience, at least compared to my work phone which is an HTC Windows mobile brick which I have to reboot at least twice a day (but that is mostly because of my company's apps being poorly made) or if I don't use it for a day or so. For some reason Windows Mobile devices seem to not garbage collect as well as they should and just letting it set begins to slow down the device. Anyway, my question is why are you going with another blackberry? Touchscreen is a must. Once you go touchscreen you don't go back, I use my work phone like a "Tricoder" in Star Trek. It is always being accessed (maps, location, pictures, video and audio recording, etc.) and the fastest and most efficient way is through touch. You can go with a Storm but, yeah, there're more expensive and more importantly Blackberry is dead. With the disproportionate uptake of the iPhone and iPad by the upper middle class corporate types, more and more apps are being developed to securely link to one's company's network, especially things like MS Exchange. This is the only reason why RIM was able to be so successful...specializing to the needs of the corporate types. Now that "Mobile" is the new thing, there is sufficient support to satisfy both the consumer and business classes with devices that run alternatives.
  6. lol...Stank have you checked?
  7. I completely agree with that is so self evident that a- duh - is in order. All your real major attacks are now from criminal organizations that are using botnets or intelligence agencies doing the same. These attacks are so severe that the previous modality of attack...a curious they say gaining access to a secure computer of a major asset and either accidentally doing something malicious or intoxicated with the success of the moment and moving into an illegal state is pale in comparison. For a purely malicious type, a single attacker at his computer rarely has the ability to perform catastrophic damage to a major asset anymore. When this stuff was new you could have something like the Morrison worm work, but now this type of attack, though not impossible by a single "curious techie" is exceptionally more difficult. Technology has simply become the center of our world and so all major powers whether legitimate or criminal cannot afford NOT to be involved. Out of all the threats to hacking this is the most severe, even more severe than the battle in the 90's for the heart and soul what it is to be a hacker. This totally makes the discussion moot since we are so overwhelmed by this new modality. In a way though, it can be a good thing. Hacking was always about being underground. If the real "hacker" is pushed out of technology then it means those of us who are true hackers can continue to live in our "secret" world in peace as opposed to it being invaded by popular culture. I can make the other statements in your comment work for me but this one I'm a little uneasy about. "Hackers" discovered technology and not the other way around. If this was the 19th century or earlier I probably would have been a philosopher, poet, or writer. Not that I don't partake in those pursuits now only technology allows me to make my philosophy and creativity come to light and so I don't need fiction or words on a paper to be the only places where my soul can breath.
  8. Nizzle, wo bist du?

  9. This was during the Stoned/Michaelangelo virus days...well before I possessed hair below the center of my being...this virus was a boot sector virus, if anyone remembers. Well, boot sector virii, will infect a seemingly blank disk due to its nature. Using my refurbished Emerson "IBM compatible" computer...yes Emerson the printer manufacturer...and Norton utilities' hex editor I compared the hex values of a blank known good "floppy" (do people even know what a floppy is anymore?) with that of an infected floppy. I knew it was infected because my computer was infected with the virus and I formatted the disk with the infected computer which ensured that this floppy would become infected. My computer was rife with it and I said to myself what can I learn about the virus before I disinfect it. The differences in values became my own personal "signature" for the virus. The blood in my veins was buring...that is when I knew I was someone different than the norm...I was a hacker.
  10. Agreed, but that comes down to the original question: what are model numbers/and brand/types of printers that have these hard drives in them. In the video they were saying some Sharp printers had them.. but which series/model numbers? You are right about the Sharps. Off the top of my head, the 3500N's, MX350/450...But these are big machines. These are not the types of machines you buy at best buy. For the general consumer models I'm not sure, but if you browse amazon, best buy's website this will be indicated as it is a sales point. As to wasting space, yeah it may seem like a waste, especially if they are using FAT16 (only 4Gigs of space can be 'seen'), but they are getting them so cheap it doesn't really matter. It is cheaper and easier to use a hard drive with 40G's they got for 20 bucks or even less at their rates than to use a more advanced motherboard with more RAM slots and do everything in memory.
  11. Any consumer model will be fine. Get one figure out how to open it up. When you work with printers there is always the "secret" way to get the covers off...its like a frickin puzzle. lol. But it really isn't that hard but taking the covers off just takes more time than it seems that it should. On most consumer models the main board and hard drive are usually next to each other...makes sense right as it connects right to the board. The trick to figuring out which side, left or right, that it is on is to find the fan. That is usually where it will be for obvious reasons. The hard drives are usually PATA...not the SATA that you are used too. However, more advanced machines are actually starting to use 3.5 laptop SATA's but these are on the larger machines I was talking about earlier. Because they are PATA, that old computer that is running a nice striped down version of Linux you save for such projects will come in handy. Since at this point all you need to do is connect the hard drive to that old machine which is using PATA, mount it, and since it is a FAT drive you will be able to see what's on there. Be advised many of the models you will experiment on the files will be RAW. The driver and software that connects to your computer usually will do the conversion to PDF, RTF, DOC, etc. That is the images you see, may just be RAW data images. You might have to research how the data is formated as RAW is just a generic moniker for data images that aren't using a well known format. Each manufacturer uses a different method. Keep us filled in on your successes!
  12. Stank...I sense old is this "nice young lady?" I know it's the South here that we're talking about. Remember this is the 21st can't do that stuff anymore.
  13. Dude you need to cut out that "Yes sir, Yes ma'am" shit. You sound like a total tool doing that. I hate when I see people on T.V. doing that, say, during an interview. They sound like such servile white trash. I went through a short phase of that when I was in the military to civilians. Looking back I can't believe how much of a tool I sounded like. There is nothing noble about that. Knowing San Franciscans they probably were making fun of some wildebeest in the Serengeti..."lookie here...what do we have of them Southerners. Ah, is it just a male or does he have his mate with him? I would enjoy watching the mating practices of these creatures. Did you notice the double chin? I hear they eat a lot of fried food in their natural habitat." lol lol
  14. I'm glad you enjoyed your trip out to my domain. Did you have the puggy, Bear look going. It is pretty popular especially during the colder months. But seriously why did you tell dinscruge our secret, you know he can't keep his mouth shut...he loves to keep that mouth wide open...wonder why?hmmm. But really seriously now, yeah, SF is pretty magical. However, that is everyone's first impression. I actually don't think that you would enjoy it after a while. It's really living off its past reputation as a mecca for the open minded, open hearted. Most people living in the city who own a home make more than you and I combined. The rest are young upper middle class kids who have moved out here since it is "trendy." These types only suck the culture away like parasites. Even places like Berkley are pretty closed. What has happened is now that all these places have become dominant centers competition rules rather than the culture that enticed people to flock out here in the first place. It's kind of hard to explain. But I think you get me. So people like yourself that purport to have things like values and principles would probably find people out here to be hypocrites, phonies, and, even, racists all under the guise of being open minded...gosh darn good people. See they drive a Prius and use Apple...oh boy they must be good people alright. The only true mecca for the open minded is in the mind of a hacker...
  15. I'm alive...are you?

  16. I've worked on a lot of these machines. Especially, the larger ones that you see at a Staples or FedexKinkos or Office Depot copy and print centers. There are a ton of uses for these drives as have been delineated. On the larger machines for instance they are often networked into the office so that users can not just print to them but also use them almost like industrial scanners. Therefore their primary use is just as a relatively massive memory dump. The firmware/OS for these machines are usually in EPROMs so they don't use them like you might think as in a PC. The file systems on the machines I've worked with are FAT16 with many of them using FAT12 for external memory devices such as a thumb drive. Often time when you upgrade the firmware you'll do it through a thumbdrive but you have to format it as FAT12...I know it wastes a ton...but the the firmware is usually only in the few megabyte range...far lower than you would think especially for the larger machines. When you port jobs over it is generally done through the network so it doesn't become a user issue. As to the security, believe it or not, for the big machines the manufactures are keen on it. It is typically an "up sell" to a customer and I've had to install a lot of those packages. What will happen is that, say you scan in a job, after it is complete it will "securely" erase the data, meaning that they not only "erase" the data, which we know is not really erased, but will write over it. It will do it automatically and you have to wait until it is complete to use the machine. They've also thought about hardware hacks. For instance, on some models if you remove the secure EPROMs and just put they back- the machine won't work! You have to BUY a new security package...I had that experience on one machine I was working on. Nobody told me!! Doah! They had to order a new set of security EPROMs...took a couple days. Customer was not happy. Some include working memory or RAM rewrites too so that an attacker cannot pull the chips out and try to read the state as well as security communication between itself- image say from a programming perspective the output of a function sent to another function is encrypted and then decrypted when it arrives as data for another function. So believe it or not some of those big all in one machines are very secure and meet DOD and other government standards for data security. Obviously, the consumer models you buy at Staples are far more vulnerable as some of these "security packages" cost 5-10 grand.
  17. What? That's not a good deal. Quality 21.5's go for a $120 on a good sale and $130-160 for a moderate sale. I got this one for $120 a few months back. And a picked up three of these 21.5 inchers on sale for $80 bucks during black friday. Yeah, that's because it is!! It uses the bullshat ASCR or Asus Smart Contrast Ratio for the contrast measure instead of the standard static/dynamic...and what is the brand of the monitor, let me done see here...Asus. Always be suspicious of a vendor using their own metrics to quantify themselves, especially when there are standard measures out there.
  18. Just did my customary check-up and noticed that they are putting out another issue this summer.
  19. Wonderful Stank, that's all I wanted to hear. I can now wipe the cold sweat off of my eyebrows...I had thought due to the timing and all that you had succumbed to the Dark Side. I was in Nevada recently and had an opportunity to confront a few "staunch" Tea Party types. As you can imagine the Bay Area doesn't have too many although there are some pockets of right wing extremism here that you wouldn't expect. Apparently, Nevada is a hotbed for this stuff and I was shocked by the utterly demented views they held. It was the closest I've come to blows with someone in a long while. These people and their views are extinct and they DO know it that is why they are so bitter and hate filled. Anyway, congrats on your election as the local Orlando (or wherever you are) Tea Party Chief (or whatever it is called; perhaps Stirrer)...
  20. You and this concept of 'buy'... I'm not kidding, I actually have a paper copy! I hate reading ebooks, especially when the book is that thick I believe's a good book, worth actually purchasing. I hate to admit it too but I dislike ebooks as well. I even read my comics that way. I force myself to do it telling myself that this is the future and I need to get used to it but my preference is changing slower than anticipated. I really think that the future for e-reading will be one of those Kindle type devices. After trying to force myself for years, I've come to the conclusion that traditional reading wasn't an "acquired taste" but inline with out natural preferences for reading- the texture, ink, etc. If it didn't matter than all the years I've been forcing myself to accept reading off of a computer monitor would have been more fruitful.
  21. I think that device looks absolutely amazing on paper, but if I were you I would wait until the general public has had a month or two to kick it around a bit in the real world. Another good reason to be prudent: I don't know how much you're factoring that big, fat 4G datapipe into your decision, but Sprint seems very slow about rolling out their WiMAX network. Up to this point, only a few small areas of major markets reportedly are covered. How long will it take a company like Sprint to implement this new technology on a nationwide scale? Another question is how much they're going to charge for this new broadband service. Of course the phone will work on 3G just like any other (and will certainly drop back to 3G during gaps in the 4G coverage), but they might make you pay out the ass to take advantage of all those sweet high-bandwidth features. If they're letting you upgrade early, I'd say hold out as long as you can while keeping a critical eye on all the tech blogs. Once you're sure it's the right decision, jump on it. Great advice! Sprint when I moved to the Bay area a few years back had some terrible reception in what is called the "East Bay." They've improved substantially, but if they follow the same game plan with 4G it could be many years before I reap the full benefit. I wasn't able to find a preliminary map but before launch I'm sure they'll have some brochure that will show coverage. But the overriding pull for me is that I'll be able to get an Android phone without spending more than I'm comfortable spending without the upgrade deal.
  22. WTF! Where did this come from Stank? Please don't tell me this is because of health care reform...Supreme court ruled recently(DC handgun case) along the interpretation that you have on gun rights so there is no jeopardy whatsoever that someone will take your gun from you. I consider myself a progressive but in contrast to most progressives I support gun rights as has been interpreted. In small to moderate homogeneous populations gun control can work but in a large multi-cultural civilization that stresses individual rights, gun ownership works to help sustain as fundamental those rights. What I'm more worried about is the timing here. Ever since Obama was elected the Republican right has been going crazy...birthers...and since then whole movements have developed...Tea Party...and now since Universal Health Care has been passed the vehement hatred of what he represents is overflowing in certain quarters. So the worry here with you is that this is tied into those current movements. Generally, white males of the Glen Beck type or O'reily type are going ape shit and "discovering" ideologies as a form of resistance to the changing world they live in. Usually this is some cover for more malevolent thoughts and feelings on how the world should be ran. For instance, the constitution was always meant to be an evolving document..."constitutionalists" generally (not saying that is your case) look to the constitution and read into it reactivity rather than proactively. I am suspicious of all reactive movements as they are usually forebringers of fascist ideologies. The only way to embrace the world is by moving forward...looking back to some "bygone era" is at best fallacious and at worst delusional. Some constitutionalists types I know almost read into the Constitution like it is the Bible or something...unfortunately the constitution is limited in what it can answer as it is written. It isn't a panacea of all possible solutions to the country's and world's problems now and in the future. This proves to me that people like this are viewing the document improperly, almost mystically and running away from actually solving the problem. That is, when you make something nearly magical or supernatural you are also taking it out of this world and also its problems meaning that you don't have to deal with the burden of the world it created. Instead, you can preach about a "lost age" (that never really existed) that we all need to get back to even though it is an impossible task. This is very harmful as this energy could be used to solve the current problems or if impossible to solve minimize their impact. I'm not a democrat...I don't really subscribe to any core best I'm a combination of Green/Libertarian if you can imagine. No ideology has the answer hence the success of capitalism it blends the best of all ideas and quantizes their value. Essentially, any system that upholds human dignity and value as prime is worth my support. But Bush destroyed this country which is another reason why I'm suspicious of all these generally middle class, rural or suburban white people "discovering" politics (BTW, I'm white but from the inner city). If they truly cared about this country they would have worked as hard as possible to get rid of Bush who single-handedly destroyed this country like he destroyed the companies he ran before. He created the deficits that we now have to deal with and allowed China to rise in a manner detrimental to the world economy, among a whole host of other things. And so back to my original worry, why weren't you going "crazy" over the course of the country back then? Your other blog posts indicate some very xenophobic "good old boy" views such as the one on Canada and the other one regarding how you can't stand how people hate the US. Please Stank, tell me you aren't considering running your local Tea Party chapter. (or that I'm reading too much into what you are doing )
  23. That's a good follows too with general Comp Sci stuff too. If you are in college or have access to college resources or you have a good local library and have access to Journal articles it makes for fun reading. The early computer science stuff wasn't too heavy at all in math just heavy in if you are smart you can pick up on a lot of what they are saying. Only later did heavy math come into play.
  24. That would be because I was talking about encryption, not hashes. The man asked why WPA, an encryption system, could not be simply reversed. The answer is that it can, but only if you have at least two of the three pieces of the puzzle (plaintext, key, cyphertext). The hash thing was a side argument that I have no idea how we actually got to. We're not arguing. I was only pointing out that the concept of reversibility is subtle. Naturally, anything you encrypt will be reversible. He's just wondering why you can't 'unwind' it if you know the algorithm or even independently. The answer to this is that the full implementations are designed to add an unpredictable element, such as random or pseudo-randomness, per session to make the encrypted element one-way. There is more to it but that is the general outline. What I believe you are talking about is the simple decrypting process...but all I was saying is that we know that that part reverses it or else you would never use encryption. He wants to know why you can't just run things backwards and get legitimate information from it, at least if I understood the question correctly. Anyway, I still appreciate your contribution so don't think that we were arguing. You are pretty much there just when you read up on it focus on the concept of "one way." This is at the core of what makes an algorithm non-reversible in the manner that you mean. The randomness that you are talking about is on a per session basis and each algorithm has it's own way of setting this up, generally during authentication. The term "authentication" is a very specific word...don't throw it around as a general term...that is you authenticate before you begin the secure communication. During the secure communication both sides have transmitted everything that they need to encrypt/decrypt, including how they are 'randomizing' themselves vis a vis another session. Think of how they are "randomizing themselves' as another key of sorts, a dynamically generated key per session. You and this concept of 'buy'...
  25. Unfortunately, your system is clearly not one way and so is subjected to be reversed in the manner of that sojourner was alluding too. You will always produce the same output for the same input (assuming same key) and your system is open to statistical attack. I know you are using this as a simple example but your thought process here is thinking about the decrypting process. There is more to reversing a given encrypted piece than simple decryption. The hard part is to make it one-way with low or no collisions.