Agents of the Revolution
  • Content count

  • Joined

  • Last visited

Community Reputation

0 Neutral

About rax

  • Rank
    Hacker Nation Radio Host

Profile Information

  • Gender
  1. They look like the output of a "hashing" algorithm, like MD5. If that's the case, they can't be "decrypted." Hashing algorithms are one-way. The best you could do would be to try to find a collision (i.e. another input that resulted in the same output hash). More info on MD5 here: http://en.wikipedia.org/wiki/MD5
  2. There a couple of limitations you'd have to address. A serial port can go at a maximum of 115,200 bps. USB 2.0 has a max of 480 Mbps. I would imagine this is why the USB to Serial converters are relatively easy to come by: stepping speeds down is much easier than stepping speeds up. I don't know if there's a minimum speed for USB. That having been said, go for it! The best way to learn is to just dive in and try it!
  3. If you ever found yourself wondering what the pinouts for a specific device were, well, wonder no more! pinouts.ru is a "Handbook of pinouts for computer hardware components, cables, adapters, slots, mobile phones and some other devices" Rax
  4. Whoops, make that 02/08 Rax
  5. It's care-A-mel LMAO Rax
  6. Tonight's show will focus on the so called "patriots" that are hacking on behalf of Uncle Sam. These self-appointed people are taking matters into their own hands and "hacking" terrorist web sites. I encourage you to listen at 5:00 PM Mountain Standard Time (-7 GMT), and call in at 1-888-825-5254 Rax
  7. Actually, Donny was from Mesa.
  8. Nah The advertisers don't pay to be on the net. I've never edited them out before just becaues of the time it takes. Besides, we had a good discussion about the OnStar commercials before.
  9. The 02/01/03 show is posted. I even edited the commercials out this time, for your listening pleasure. Rax
  10. Hey Nick Thanks for the comments. Gigabyte did what Microsoft thought "no one" could do when she made the Sharpei virus. (Side note here the original macro virus was done as a proof of concept too -- no one thought it could be done, so someone did it. The source code of the macro said "there, that ought to be enough to prove my point.") Gigabyte, in my opinion, was overly ambitious in implementing YahaSux. "Patching" (infecting) every EXE in the Windows directory? Come on, don't you think that that’s a bit much? How can she (or anyone) be sure of what the ramifications of doing that are? Stick with what you know -- it's easier to "break" things than it is to fix things. I can take a car engine apart, but if I try to put it back together again, I'm almost guaranteed that it won't work (of course, there are people who can and do do this every day -- analogues aren't 100% perfect so you'll have to cut me some slack on this one). I don't fault Gigabyte for trying to learn new things at all. Having the "balls" to think that you can write something that will fix a program that it took so many programmers so many hours to screw things up in the first place is being awfully sure of yourself. Regarding viruses, you hit it on the head when you said "I guess less experienced people would find it useful as they would get taken in by skillfully worded emails." Most people are plain gullible enough to get sucked in. And most people don't bother to update their virus signatures nearly often enough. It's not just e-mail borne viruses that are the problem, as you know. The rate of new viruses (virii?) discovered is such that it really does need to have the "average Joe" check things a couple of times a week. If there's no new definitions, you've wasted 10 seconds or so. Thanks again for checking out the show. You ought to try calling in sometime. I'd have loved to have this conversation on the air. Late Rax
  11. DoS'ing the Root servers was, in my opinion, unintentional. I think the perpetrator was attempting to exploit MS SQL servers. The fact that they wrote such a crappy worm that filled the pipes of the net with its vomit was largely unintentional. Look at the worm that Robert Morris Jr. wrote in the late 80's - early 90's. The only reason it DoS'ed anything is because he had a typo in the algorithmthat he wrote for replication. Rax
  12. The root servers weren't down. The effect of the SQL Slammer/ Sapphire worm was an unintentional DoS. The pipes were filled up with crap. Subtle distinction I know, but hey, we're all techies here, right? Rax
  13. The big topic for tonight is about Verizon loosing the case to the RIAA and having to discolse the information about their customer. The streaming issues appear to be resolved, so you ought to be able to hear the show Net-wide (providing there are no recurrances of the Sapphire/SQL worm again smilie The number to call in is 1-888-825-5254 I'd love to hear from some of the DDP! Rax
  14. They got the streaming working! YEAH!! The 01/18 show is online at raymoore.com/radio
  15. I saw that one too. Isn't it cool? That article gave me an idea for something comng up on tonight's show. Check it out online (I hope!)