Cenzic 232 Patent
Paid Advertising
sla.ckers.org is
ha.ckers sla.cking
Sla.ckers.org
This group should mostly be dealing with how web applications enable networking security issues that are otherwise not there. Everything is being tunneled over port 80 now so what does that enable and how do we fix it? 

Pages: 12Next
Current Page: 1 of 2
Results 1 - 30 of 31
1 year ago
idisappear
I hope to get SSL working for Usenet while using Windows 7, including both traditional newsreading (text posts) and posts where someone uploads NZB files. I'm using Astraweb. The info Astraweb provides for SSL is ssl.astraweb.com on ports 443 or 563. Note that I have no problem downloading nzb files from binsearch.info and downloading their corresponding contents via SSL with sabnzbd or binrea
Forum: Privacy
2 years ago
idisappear
Roughly how much would it cost to hire someone to do this? For someone who knows what they are doing, how long would this task take?
Forum: Privacy
2 years ago
idisappear
I plan to set up a "Contact" page on a website that has an Email form and uses SSL. It will then forward whatever message the person sends to my Email account (my Email account is separate from my website account). However, I do not want the message to only be encrypted between the visitor's web browser and my website. Instead, I want my website to use a PHP script that heavily encry
Forum: Privacy
2 years ago
idisappear
I know I could try opening it with a zip program, but if there is some special program that can tell what type of file something is, that would be cool.
Forum: OMG Ponies
2 years ago
idisappear
If the ignorance is so bad it warrants a face palm, that's all the more reason I should know. Come on. You should at least answer if you're going poke fun.
Forum: OMG Ponies
2 years ago
idisappear
How do I spoof an IMEI on an Android phone? Does the answer vary by device or cell phone provider?
Forum: Mobile Devices
2 years ago
idisappear
How did you know it is a zip file?
Forum: OMG Ponies
2 years ago
idisappear
I uploaded the file here. It is an mp3. http://oron.com/1q9ldecq6xvx Using a hex editor, the song name and album name can be seen without cracking the file. I know the password is something easy that is on popular password lists. What I do not know is how to identify what type of encryption this is or how to apply a dictionary file to it to crack it. Can anyone crack this and explain that?
Forum: OMG Ponies
2 years ago
idisappear
https://www.zdnet.com/blog/btl/646-million-linkedin-passwords-leaked-online/79290
Forum: News and Links
2 years ago
idisappear
http://www.dailymail.co.uk/news/article-2150281/REVEALED-Hundreds-words-avoid-using-online-dont-want-government-spying-you.html
Forum: Privacy
2 years ago
idisappear
Alfa AWUS036H: It was recommended by lifehacker and seemed credible because the author bought a different one, and after researching more, wished he purchased that one instead. The reviews are very favorable all over the net. On Amazon, there were customers who advised buying a 10-foot USB cable and standing away from it because it sends such a strong signal.
Forum: Wireless Security
2 years ago
idisappear
I appreciate the responses, especially your lengthy post, infinity. When you expounded on the problems with privacy, I at least felt like I was sane in the context of messages and archiving. I may be in a minority of people for treating electronic communication entirely different from verbal communication, but I am apparently in the majority with respect to security forum users. When I have th
Forum: Privacy
2 years ago
idisappear
Here is the deal. The network interface name displays in the output when I enter the "airmon-ng" command if I boot BackTrack from a CD. The moral of the story is to simply not use VMware. Even after my wireless network card was detected and working beautifully with BackTrack to go online, it still could not be used to crack WEP. I learned that the majority of wireless network cards c
Forum: Wireless Security
2 years ago
idisappear
Has anyone tried PC-BSD? Any opinions?
Forum: OMG Ponies
2 years ago
idisappear
http://www.alternet.org/rights/155084/whistleblower%3A_the_nsa_is_lying_--_the_u.s._government_has_copies_of_most_of_your_emails/
Forum: News and Links
2 years ago
idisappear
Suppose that my aunt is running Windows 7 and with permission, she wants me to access her hard drive through the internet and copy a file on her desktop. In this theoretical example, she is not a host or running server software of any kind. She is not running a browser, IM client, IRC client, or anything like that, but she is definitely connected to the internet. This example assumes I am not in a
Forum: Networking
2 years ago
idisappear
Suppose a person wants to anonymously order an NIC via postal mail. That way the MAC address is not tied to their name. I understand that alternatives exists, like Walking into a store and buying an NIC with cash, but I am still wondering if it's possible for other reasons. Maybe a physical book on security exploits is unavailable at a local bookstore or electronic format. The security professiona
Forum: Privacy
2 years ago
idisappear
This is about a week late, but I noticed that nobody brought it up on this forum yet. Electronic Frontier Foundation on CISPA: "a company like Google, Facebook or Twitter could intercept your emails and text messages, send copies to one another and to the government, and modify those communications or prevent them from reaching their destination if it fits into their plan to stop cyberse
Forum: News and Links
2 years ago
idisappear
This is what I see when I run the ifconfig command (with asteriks in place of the addresses for anonymity/security). eth0 Link encap:Ethernet HWaddr **:**:**:**:**:** inet addr:***.***.***.*** Bcast:***.***.***.*** Mask:***.***.***.** inet6 addr: ***::***:***:***:***/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX pack
Forum: Wireless Security
2 years ago
idisappear
I just downloaded and virtualized Backtrack 5 R2 in VMware. I deliberately configured my wireless router to use WEP so I can crack it with aircrack-ng. Every tutorial I can find starts with the same instruction. They say to open the terminal (BASH) and type: airmon-ng That is supposed to list interface names such as wlan0, eth0, and lo0. It does not work for me. When I enter the command, it
Forum: Wireless Security
2 years ago
idisappear
How can I truly know that a provider does or doesn't have "delete-is-delete" functionality? Do you know of any providers that grant enough control to actually wipe the Emails or access them with a command prompt? There have to be website hosts that also offer Email that can be accessed via FTP/SFTP, right?
Forum: Privacy
2 years ago
idisappear
Using free web Email, everything is stored on servers of the company providing the service and that company (inferring from the ToS agreements I read) can read all of my messages. Archiving everything with a company who has every right to access my inbox also increases risk of government obtaining messages. According to the EFF, subpoenas to Email providers are more likely than wiretapping and sea
Forum: Privacy
2 years ago
idisappear
I've been researching for days and I'm getting ready to buy. I have been thinking about Lenovo. If anyone has a suggestion in $400 to $540 range, I will be most appreciated.
Forum: OMG Ponies
2 years ago
idisappear
Headed for management? lol that sounds awful. I like codes, math, and the eurphoria of gaining unintended privileges. I think you painted a false dichotomy. A degree and a "way of life" are not mutually exclusive. I did not mean to imply XSS and db injection are the only domains of security, nor that completion of academic courses is my only objective. I can not agree with the me
Forum: OMG Ponies
2 years ago
idisappear
I recall reading (in the introductions) that id and rsnake prefer OpenBSD. I am looking to learn programming and it seems I might be best served if I get comfortable with an open source, non-UNIX-based operating system. In the past, I have installed and used Ubuntu and messed around with it for about a month, but never did anything heavy with it. Is OpenBSD a bad idea for someone who is not pr
Forum: OMG Ponies
2 years ago
idisappear
Edit: Nevermind. I do not even think my assumption about the number of cores for the i7 was correct. You can ignore this post. Suppose these are the options. Core i5 2.53 Ghz (2 cores) Core i7 1.46 Ghz (4 cores) http://ark.intel.com/products/43544/Intel-Core-i5-540M-Processor-(3M-Cache-2_53-GHz) http://ark.intel.com/products/49664/Intel-Core-i7-680UM-Processor-(4M-Cache-1_46-GHz)
Forum: OMG Ponies
2 years ago
idisappear
Thanks. I'll use this information to start my laptop search.
Forum: OMG Ponies
2 years ago
idisappear
Security and finding ways to breach it interests me. I do not have much knowledge about it at all, but dabbled in rudimentary XSS enough to know how to get into some stuff. One college major that has loads of scholarships everywhere is Cybersecurity. Upon first glance, the label sounds exciting and I could use scholarships. When I looked at some of the required courses for the major, it looked
Forum: OMG Ponies
2 years ago
idisappear
lul I dig the crackhead idea. Do you think cameras are mostly inside the building and aimed at drive-through service areas? What about parking lots? I think McDonald's, Home Depot, Starbucks, Barnes & Noble, libraries, motels, and businesses increasingly offer Wi-Fi. Think parking a car in the parking lot less risky? If using a laptop in a parked car is suspicious, maybe a cell phone with
Forum: Privacy
2 years ago
idisappear
Assume the goal is to be anonymous. Suppose a person goes far away from their home to use public Wi-Fi with a portable device. It seems that without any attempt to spoof the MAC address, the manufacturer and NIC information makes it possible to identify a user. Proxies might have tracers jumping through a few extra hoops, but how can the MAC address be safely spoofed? Spoofing the MAC on Linux
Forum: Privacy
Pages: 12Next
Current Page: 1 of 2