Agents of the Revolution
  • Content count

  • Joined

  • Last visited

  • Days Won


Everything posted by mungewell

  1. If you want some background information, there was a DefCon16 presentation 'Toying with Barcodes' by FX (alias Felix Lindner). There are videos of this is you go looking. Mungewell.
  2. It depends what OS you're on.... Mungewell.
  3. Yes. You can move onto talking about the benefits of Bio-Diesel :-)
  4. ... but the college _requires_ Word! Unfortunately the problem lies with the 'how to use a specific application' rather than 'how to use a word processor' attitude. That said she's foolish for purchasing the wrong thing, but someone should have suggested WINE or Crossover Office. Mungewell.
  5. There are a specific set of commands for bridging ethernet/wireless interfaces. Install the 'bridge-utils' package. There is a 'howto' here: Cheers, Mungewell.
  6. So there are a couple of articles on M$ new barcode technology: They say it can be read with a mobile phone app, but don't give many details. --- "It's more of a 'partner' barcode," he said. "The UPC barcodes will always be there. Ours is more of a niche barcode where you want to put a lot of information in a small space." Up to 3,500 alphabetical characters of data can be embedded into each square inch of the barcode. --- My question is.... what's the point in creating a new barcode tech for this? What's wrong with QR-code or DataMatrix? Munge. PS
  7. Because there's money in them there hills...... Should have seen this coming, just another get rich scheme. Mungewell
  8. "Everything is just a few hundred clicks away....." :-)
  9. Yes the conference was excellent, I only manage to listen live to the Closing Ceromony but am working through the recordings. My favourite(s) so far are: Hacking the MPS430 Fun with Garage door openers. Mungewell.
  10. Hi, According to the Thinkwiki pages this machine/wifi card is supported by Linux. You could try a LiveCD (such as Ubuntu) to see if the issue still occurs under Linux, or whether it is directly related to your OS install (I am assuming that you use Windows). It is probably worth ensuring that both the antenna connectors are properly seated in their connectors on the Wifi card. The above page contains a link to the Maintance manual. It could be that one or both have been unseated.... Mungewell.
  11. It is possible that your OS is locating problem areas in your RAM and is marking them 'do not use'. Easiest check is to download a memory tester (UBCD for example), one can also be found on the Ubuntu LiveCDs - select 'test memory' at boot time. Mungewell.
  12. Hi, VMServer is available at zero cost, you just have to request a number of license keys from VMWare. They are more interested in people buying there fancier software and I guess they see VMServer/Workstation as an intro to that. You still need to have a license for your Windows software, not sure whether an OEM version is OK to move from real to virtual on the same hardware. Actually doing the install is pretty easy. Once VMServer is installed configure a machine with a virtual harddisk and tell it to use a real CD, once the virtual machine is powered on you will be presented with the normal XP install process...... several virtual reboots later you should have a working virtual machine. You can also use other Virtualisation/Emulation software as QEMU and VirtualBox under Linux. Cheers, Mungewell. PS. If you're getting excited about 'nerding out', then you're definately in the right place ;-)
  13. Some of the VNC servers can serve just one window, the window is still visible on the host machine (where it is running) but the client's view is limited to just seeing that window from the host. From your description it sounds like MS has extended RDP to perform a similar function. Again playing catch up rather than innovating.... I guess they speed too much of their time counting their money ;-) Well I'm sure it won't be long before someone hacks that then.... Did you try connecting from Linux to Windows Remote-App with 'rdesktop'? Mungewell.
  14. Hi, It looks like you're running on Windows, but for anyone else who wants to perform this sort of thing on Linux (and possibly cygwin). Multimon can decode DTMF files from wav file or audio input Sox can also be used to filter (band pass) to clean up the audio. Have fun, Mungewell.
  15. What is the memory situation on this machine, how much have you got and do you have a swapfile created/active? It could be that you are running out of memory and causing a problem this way.... There are also 'magic sys keys' which will give you an idea of what has happened after the machine is dead, see: Another thing that you could try is to perform a memory test and/or some processor burn test, to see if it is a problem with the hardware rather than Debian. The UBCD contains a whole load of tests. Personally I have not experienced this type of a problem with Linux. Munge
  16. A task close to my heart, but a clue to what it is (or maybe a link to a picture) would be a good start. Does it run an embedded OS (windows CE/Mobile/etc, linux)? What hardware does it have contained in it? ..... If it is Wince there are a few tricks to upload your own code, or to break out of the OS. Mungewell.
  17. Agahster is correct regarding Keyloggers running on the host machine, you might be able to get around this possiblity by allowing the guest OS to directly connect to a USB keyboard but that would be a pain and any screen caps would show data anyways. I've heard of one VM approach to improve security; where a Linux Guest OS is used as a firewall. The Windows host machine only knows to use the guest OS as it's default route out onto the network. The reason for doing this is that any spyware (etc) could punch as many holes in the firewall as it liked to no avale. Cheers, Mungewell.
  19. By pure chance I notice that by setting the mic source on my softphone (Ekiga) to 'silence' seems to confuse my VoIP provider's billing system. The call still connectes, and I can use DTMF (out-of-band) to control an IVR, but the call is free. I wonder whether this is a wide spread 'feature'.... Munge.
  20. My money would be on the display cable not being seated properly, opening the laptop up may be able to confirm this. But it you are not experienced/happy opening it up it will probably be too expensive to get a repair shop to look at it. There is also a possibility that the column drivers for this section of screen have died, this would require a new screen. My suggestion, spend your money on a external LCD screen and use it in preference/conjunction with the laptop's screen. If the machine is 'old' (in business terms) you may be able to write it off and get a replacement. Cheers, Mungewell.
  21. JTAG is an asynchronous state machine which enables your to 'peek' and 'poke' data into 'chains' of a system, normally used in boundary scan (to read/set output pins on a device), but can do so much more. For example the ARM9 and ARM7 CPUs actually have chains where you can force code into the processor pipeline.... Pictorial representation here: Basically you wiggle two pins (TMS and CLK) to clock your position around the state machine, whilst setting TDI and reading TDO. Ask away if you have more questions, I'll try to answer them, Mungewell.
  22. Only on Binrev would you get a Ninja anology :-) On the assumption that you just want to try some clustering stuff out for the hell of it. Check out DeepGeek's HPR episode: The clustering element (as I understand it) is really about partitioning a comlex problem/application, rather than the OS. In the end it is unlikely that you'll be doing anything sustaintial but learning is a good cause. One thing to think of is that more computers running = more electricity bill, since we're heading into winter if you normally heat with electricity you have nothing to loose appart from the increase in fan noise. Cheers. Mungewell.
  23. Wow 'Rubberhose is currently available for Linux 2.2'.... must get some of that new tech ;-) I thought a little further on this topic, it depends on what you are doing with the data. In a situation where you are trying to distribute information you can generate a 'write once, read many' container with many decrypt options. This would not be subject to the problem of knowing where the 'real' data is, only (as Colonel Panic mentions) that you have a sufficiently large container that a large portion of it were random to conceal the size/nature of the true data. For example a memory stick containing 1) session containing super-secret meeting plans 2) session containing naked pictures of somebody's wife 3) session containing slight illegal material 4) session containing more porn 5) ... and the rest/majority of disk containing random data. If you do get detained which session password are you going to give up, or (if you are just a delivery agent) which password are you actually going to know? In fact thinking further.... If the application/file system used to generate a container is told all valid password for sessions it can 'mount' all sessions at once and prevent overwriting desired data. Where it did not know the password, a session could/might be overwritten (which might be seen as an advantage). As 'mounting' a overwritten session might result in a partial file, the container could be deliberately pre-loaded with partial files in sessions with obvious passwords which would make finding the 'needle in the haystack' even more difficult as ever password you tried would give some form of 'valid' output. Think of adding a different picture/file as a new session (and then closing that session so that it could be overwritten) with every password in a dictionary table..... now where's the real data? Every block of the container would contain data which could be decoded into a plausible file, although large files covering multiple blocks may have been corrupted. Regarding the kernel patch/application, you put it in plain sight on the USB key. After all you're just protecting those pictures of your wife you like to take with you..... For Linux you could use FuSE, which doesn't require a kernel patch. Munge.
  24. Just some thinking about the concept of 'Plausible Deniability'. If the container which holds the data has the ability to have multiple sessions (with different keys), there must be some method to prevent one session overwriting the data in another. Therefore it _must_ be possible to detect the presence of the other session, even if it can not be decrypted. If someone was sufficiently determined they could detect the presence of the other session and thus (for 'Plausible Deniability') it won't work for extreme cases. For simple cases it might just slip through unoticed, but so would not mounting a datastore/partition. Munge.
  25. Sounds like a nice set up. I got my license last year, but haven't had the time to do anything with it as yet. I wanted to explore APRS and Weather/APRS, setting up remote solar powered weather stations. Got as far a buying a 1-wire weather station and a OpenTracker board. Also have access to cheap GPS boards, which could be coupled to the 'dumb' 1 PIC APRS encoders. Cheers, Munge.