Search:
Type: Posts; User: Wintermut3; Keyword(s):
Search:
Search took 0.01 seconds.
-
January 13th, 2002, 10:14 PM
I'm still in high school (I'm a junior) but I'm going to have an Advanced certificate in Programming (From a tech college) in a few months. I will be in computer engineering when I graduate
-
January 13th, 2002, 10:11 PM
I wouldn't worry all that much. If he is on an AOL account, he can't touch you. Their propraitary TCP/IP means he can't even ping you, tracert you, telnet, anything. Even if he does have a real...
-
January 13th, 2002, 10:06 PM
I agree that we need more info. Almost by definiton a really good hacker is somewhat specialized. What I mean is that a *really* good windoze server hacker might not be the best in the world at...
-
January 9th, 2002, 10:21 PM
<<Troll alert>>
<<Troll Alert>>
-
January 3rd, 2002, 10:44 PM
nope, all the non-shadowed file has is token pointing to the shadowed file...
-
January 2nd, 2002, 10:41 PM
All good ideas...
I can't remember how many times I've been mapping the web (i'm trying to map my whole area of the web, or at least part of it) I've found a box running a couple dozen ports. Even...
-
January 2nd, 2002, 10:34 PM
and who would we all have to beat up on? No Microsoft and we have no target for all of our pent up rage...
-
January 2nd, 2002, 10:30 PM
I was using PC-cillin (I thinkl that's spellt right)
-
January 2nd, 2002, 03:47 AM
You deserve it! DOS attacks are clumsy, uncontrollable and hit innocent people as often as the target. Not to mension that most ISPs will kick you if not cal the FBI over any serious DOS attempt. ...
-
January 2nd, 2002, 03:38 AM
-
January 2nd, 2002, 03:33 AM
I'm white hat, most of the time... I'm also not sure if I'm quite a hacker yet, but I try
-
January 2nd, 2002, 03:00 AM
it's hard to hack wintel and linux boxes from a mac, but a mac is IMPOSSIBLE to hack using anything other than a mac
-
January 2nd, 2002, 02:56 AM
T-sight, all you need to know... It logs what happens, all keystrokes that are entered in any shell or account. at realtime speed to. Playbacks of hack attempts are great for playing back at your...
-
January 2nd, 2002, 02:50 AM
I got an interesting little trojan from an MP3
It changed it's extension to .VBS (Visual Basic Script) as soon as Media Player tried to open it and executed of course
I'm not sure exactly what...
-
January 2nd, 2002, 02:23 AM
Maybe the problem is kids like me can't afford $300+ software but still need to use the tools
I'll be damned if I spend $1000 on Visual Studio Professional just 'cause I need to use Visual C++ and...
-
January 1st, 2002, 07:13 AM
I know a *Lot* of Linux users, I myself have a Linux box...
but Linux isn't exactly a 'computer for the masses' you have to be pretty good with computers to set it up and run it the way you want,...
-
December 31st, 2001, 06:26 PM
Screw your ISP...
If you're going to do anything suspicious anyway you shouldn't be doing it from an account that could be traced to your RL name after all.
Do what I do, if you are doing...
-
December 31st, 2001, 06:21 PM
All corporations, given the chance, will be anticompetitive. They're in it for profit after all. Microsoft has done somethings that I haven't agreed with, but you have to give them credit for...
-
December 29th, 2001, 10:02 PM
I loved Snow Crash, but it seemed to me that that book (and most Cyberpunk type lit.) implies a post-intilectual property world.
Just look at the way Bruce Sterling put 'Hacker Crackdown' free on...
-
December 29th, 2001, 09:04 PM
This an extension of the threads that I keep reading about P2P file sharing...
What do you guys think is the future of intilectual property?
Is it dead, is it even important in this day and...
-
December 28th, 2001, 02:54 AM
They forgot Console Cowboy...
-
December 28th, 2001, 02:52 AM
|
|