-
April 14th, 2002, 03:33 AM
#11
Tedob1 brings up a good point its hard to be a white hat hacker and not have people assume that your a evil black hat or script kid. After all the best way to learn about how to secure your system is to know how to hack into it. I guess its all about how the question is phrased.
Its not software piracy. I’m just making multiple off site backups.
-
April 15th, 2002, 07:24 PM
#12
Originally posted here by cwk9
Tedob1 brings up a good point its hard to be a white hat hacker and not have people assume that your a evil black hat or script kid. After all the best way to learn about how to secure your system is to know how to hack into it. I guess its all about how the question is phrased.
Yeah i was a bit cautious about that (My motives being called into question)
A big Thankyou to those of you that offered constructive advice. i'm going to use both methods suggested. The 2nd (00[sub]7) to get the information, and the 1st to broaden my mind.
I'll let you know the outcome.
Once again
Thankyou
-
April 15th, 2002, 08:14 PM
#13
try this :
http://www.google.ca/search?q=sub7+f...er&hl=en&meta=
found something that might do the trick with this search (i just checked the first two pages!!!)
http://www.winsite.com/bin/Info?500000019947
-
April 15th, 2002, 08:25 PM
#14
Doh!
and yet again it takes 15 seconds for someone to make me look like a complete idiot lol
Thanks mate
Regards
-
April 15th, 2002, 11:24 PM
#15
See? Conflict resolution What could have become a horrible flame fest was settled peacefully. Thanks to all that contributed positively... gave me a new opinion on the people here at AO.
God bless, and good luck, bofhandpfy,
--PhirePhreak
I know you\'re out there. I can feel you now. I know that you\'re afraid. You\'re afraid of us. You\'re afraid of change. I don\'t know the future. I didn\'t come here to tell you how this is going to end. I came here to tell you how it\'s going to begin. I\'m going to hang up this phone, and then I\'m going to show these people what you don\'t want them to see. I\'m going to show them a world without you, a world without rules and controls, without borders or boundaries. A world where anything is possible. Where we go from there is a choice I leave to you.
-
April 16th, 2002, 12:22 AM
#16
Ok,
First of all...hopefully the user has a firewall that detects outgoing connection requests...
Second...if you don't, find one that does it numerically..
Third...cut and paste...(after steps one and two are satisfied)
Fourth...use a tool that resolves IPs...(CyberKit does fine)
Fifth...paste the IP from step 2 into step 4, and resolve...
Sixth...PING.
Seventh...telnet(23)
Eighth...i'm tired...
ninth...zzzzzzzzzz....
Ouroboros
O
"entia non sunt multiplicanda praeter necessitatem"
"entities should not be multiplied beyond necessity."
-Occam's Razor
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|