Search:
Type: Posts; User: i2c; Keyword(s):
Search:
Search took 0.03 seconds.
-
How in gods name do you use wordpad as a messenging client to?
i2c
edit: I suppose can save to it and then open it? is that what he means by chatting over wordpad?
-
Ebay will most likely use systems to detect suspicious actions, likely using neural networks, banks use similar for finding odd transactions and detecting debt risk assessment, among many other...
-
April 30th, 2006, 09:47 AM
Use Tor, it encrypts traffic before your first hop to your first onion router, so that way the traffic won't be easily readable at the cache.
i2c
-
April 23rd, 2006, 09:16 PM
The worst ones are soldered to the motherboard or built inside the connector bodies, or placed under discrete components.
It really wouldnt be beyond the realms of possibility to modify the bios...
-
April 16th, 2006, 10:56 AM
Surely you only need to know how threads work then and then thread the application so that you have x number of threads scanning x number of ports at anyone time so if some take longer than others...
-
March 31st, 2006, 06:13 PM
Use FPGAs so you can do it all in parralel, although a nice Xilinx Virtex-4 will set you back a couple of grand...
i2c
-
March 13th, 2006, 09:19 AM
Im glad I don't have an inbox :)
This project is effectivly like saying, "I don't want a virus on the laptop". Your trying to guard agaisnt a constantly changing market with new games released...
-
March 12th, 2006, 02:31 PM
Simplest method I can think of is to monitor key stroke frequency. For instance in action shooters we know that the main keys that are used are (w,a,s,d) and the arrow keys. For given that you could...
-
March 11th, 2006, 10:21 AM
It was actaully proved recently that games can increase intellegence.
http://news.bbc.co.uk/1/hi/education/1879019.stm
http://news.bbc.co.uk/1/hi/education/730440.stm...
-
March 4th, 2006, 01:57 PM
My thinking was that you might be able to get a shell account that will allow you to use SSH tunnelling, im unsure whether shell accounts allow in and outbound sockets? i dont know.
All about the...
-
March 4th, 2006, 09:45 AM
Encrpyt your traffic with SSH a tunnel thats out of your ISP's reach, check this link - http://neworder.box.sk/newsread.php?newsid=12498
You could also try Tor from EFF, that encrypts traffic...
-
February 23rd, 2006, 02:40 PM
check out this page, http://tor.eff.org/overview.html.en
basically your connection hops through a series of computers and then becuase the last computer on that series of computers is one to...
-
February 23rd, 2006, 11:03 AM
nuthin: check out Tor, from EFF, it uses a trick called onion routing - the new installer makes it easier than ever before to set it up
Im in a good mode today so spare google just this once -...
-
February 22nd, 2006, 11:52 PM
Are you talking about somewhere like Neworder?? where they display part of the address, which is usually the name of the DSL provider?? Cos its possible then that you and someone else are posting...
-
February 20th, 2006, 11:22 AM
ASDL uses frequencys higher (why you dont hear it, check out the ear frequency response, google) than that of the standard method of communication on a PSTN, your modem connects to a DSLAM (go google...
-
February 15th, 2006, 04:33 PM
Heh, that was the first question I ever asked on a usenet security board when I got interested in the internet to a more technical level. (and damn what a flaming I got, im still putting honey on the...
-
February 14th, 2006, 11:50 PM
Hi,
I've been reading with interest information about hijacking fuctions with LD_PRELOAD on the Linux operating system.
As such I am interested to find out (i've searched google) whether this...
-
February 12th, 2006, 12:56 PM
Interesting tutorial!
With regards to the strings program, theres plenty of windows ports so theres no need to arse about with cygwin. If you grab the bloodshed c++ IDE (based on GCC) you'll find...
-
February 11th, 2006, 07:55 PM
nihil i think there is information that the creative could use, for instance i could plan an attack bassed on the typical policy thats discussed widely here, the addicts forum even had a subject in...
-
February 11th, 2006, 12:31 PM
Its a shame that the ethics of people must nannyied with the use of AP's.
Surely information the majority of the information on this site could be used for misdoings, however it is the...
-
February 1st, 2006, 11:40 AM
Buy a webcam, use Motion (motion.sf.net, if your on linux, otherwise bit of python and the video capture module) and have the images shipped to a server so that you can see if he's been on your...
-
January 31st, 2006, 09:45 AM
Ping can be used to guess a footprint, look it up
i2c
-
January 31st, 2006, 09:43 AM
Learning to search is all the information you need regarding partitioning, the ability to find out information for yourself is going to be the key to your success in using projects such as linux.
...
-
January 25th, 2006, 10:07 AM
I got so annoyed with trying to find an effective spider that did what I wanted that I gave up and wrote my own in Python, I would recommend it as it does provide you a useful insight.
I have...
-
December 30th, 2005, 11:02 PM
Hiya,
Thought i would share with you an amazing piece of software I found, when my harddisk was properly f**ked and "cat /dev/hdd" wouldnt show anything that looked like data at all, i was in...
|
|