Jump to content


Retired Staff
  • Content Count

  • Donations

  • Joined

  • Last visited

  • Days Won


Everything posted by Saran999

  1. Believe me or not, typing fast is a skill that must be learned... I've found this link http://www.nitrotype.com/ that transform the learning in a funny game, with prizes and car upgrades. Let me know what you think about
  2. Let's see what will come out of this I will start a sentence, then each of you will add a word to it... Example : First Person : I Second person : know Third person : how Let' START! He's
  3. I've seen a request today from someone that was trying to break free from a controlled, locked down network. I've given a short answer, but IMHO the topic must be a explained a bit better. The short answer was: 1. Shell account 2. SSH 3. SOCKS proxy So, you set-up a shell account on your home machine, or wherever online you may feel fit, and then you manage to SSH-Tunnel all your network request through a SOCKS proxy sitting on the remote machine. As the SOCKS will translate the requests from the permitted received socket ports, to the ones you want to reach 'outside' (imagine that you have built a private and closed network between your work machine, and your shell account), you will be able to circumvent any port-blocking mechanism put in place. Very simple to say, but a bit complex to manage, and there are 'side' effects too. Let's talk about it in very simple terms. A locked down network it's something that have a firewall with only few allowed 'ports' on it. Then, as normally the port number 80 (used for HTTP) is left open, there will be something that will filter allowed websites, blocking non-work related websites. "Non-work related" is a definition taken arbitrarily by the NW admin and the CIO (Chief Information Officer, if exist or even CSIO or CSO Chief Security Information Off, Chief Security Off), basing their decisions on company policies. This is valid for private companies, and Campus as well. Before to start this discussion, you at least must understand that any connection you make on the internet, and on any network, is based on 4 factors: Protocol, Port, IP address remote and your own. This is, very basically, the definition of a socket. You need a socket to connect to any server you want to ask services from. So, to lockdown a nw I must block or filter one or two or all of those factors to force you only to activities that I wish you will be focused on. I can block ports, I can block IP addresses but I cannot block TCP or UPD protocols without blocking the entire nw, so we will focus on those protocols and the left open ports. BUT, before proceeding further you MUST understand one little thing. Whatever you do on a network will be monitored and logged. So, even if you are smart enough to set-up a shell account with a SOCKS on it, all your traffic will be seen and you will be prosecuted for this. So, at the end, not complying with company policy in a controlled network is always a bad idea. And even if your traffic is totally compliant (no rule broken and no blocked ports requests) and encrypted, then you may be monitored simply because the 'volume' of your traffic, and with a sniffer, I can see every packet you've send in its details, and you are fired as you cannot justify the volume of encrypted packets sent to your home/external machine (that still have a fixed IP address). At the end, the solution may exists from a technical pov, but rely on a poor controlling nw admin or a friendly one, and always rely on your skill of social engineering That said, let me hear about what you think about this topic. May this interest you if explained down a bit more?
  4. Saran999

    A 'Word' Game

    The rules are simple! Just post the first word that comes to mind when thinking of the word in the previous post. Let's see what'll come out... I'll start Ham
  5. Why this topic? Mainly for culture, pushing knowledge through the modal boundaries where most of us resides. What is the Deep Web and why I want to talk about it? Relying only on Google or some other search engines is not useful anymore. Searching the web for education, work, leisure, relying only on some well known search engine means to be completely overwhelmed by the 'sois disant' SEO experts, with their blatant and completely unuseful crap. Some of you are aware of this and dig down Usenet to find some software or information. But the Deep Web is something that is there, not touched by the search engines, and full of info. Full of Gold. Gold that may be just valuable as is, simply publishing it on a personal blog about a definite topic, asking for donations. The only blog with real 'semi' unique information, toward the many millions of others that simply copy their content over and over, even without intelligence, and ask for money - that rightly will never come - and complaining about that. A that's for starter. But there are really tons of ideas on how to employ unknown/not well known information on the web, and that's the side topic for this discussion. Just talking about Usenet between us, IT's old guns that are here since the beginning and where used to connect with analog modems and old stuff like that at 300 Bauds, dreaming of the 'pirate' that had the 1200 Bauds modem and was downloading games for the BBS, may be useful for the youngsters that know only about Bing and Google and Yahooo, don't remember Lycos, or are unaware about Metacrawler. So, this is something that, even if not really "deep web", may be of some usefulness. Talking about Usenet, other search engines and even gopher and veronica, why not? But moving farther, I'll add that, as we are facing an economic crisis worst than the Great Depression and the Big Deal, trying to find useful and unknown information resources may be something worthy to differentiate ourselves and gain incomes. But, and this is the most important point, being able to search for this information is even more valuable. As an old saying recite:'it's better to learn how to fish than to find a single fish'. And I think that we all know how valuable may be another skill under our bellies. So, this is a sort of companion topic to the one on the bot creation and programming, as the searching the Deep Web skill will greatly be enhanced if we own some good bot programming idea that may speed up the process. Better, if this idea is something new and unique. I've dreamed about Matrix and Neo's programming skills that have permitted him to simply sleep in front of his monitor during a custom spider search on Morpheus. Am I alone on that? Why not to learn THAT skill? Obviously, nobody will post the 'one billion dollars' idea 'per se', but I think that discussions, a sort of public/semi public brainstorm on a subject, may improve our possibility to come out with something useful, worthy of our time. So, let's start eliminating all the 'onion' sites and the Dark Net as I do not want to push the discussion on illegality and outlaw content. I like this site as 'a family site', and this is a real insurance that I subscribe, and worthy to defend. So, this topic is absolutely banned since the beginning. I wish only to push an idea based on the percentage of web pages that a great, the most great for someone, search engine like Google has in its database, toward the many times more web content it's present, and waiting for us, out there. I will not search for precise data but the difference is enormous. Tons of resources out there that simply are not visible, or are not, yet, indexed by the 'official' web spiders/crawlers. I'm not an US citizen, but I've been influenced by Your culture and behavior, that I love and respect. And I think that a similar situation is the one very near the first, and the many other, Gold Rush or Oil Rush, or Whatever Rush that have characterized Your economic history and that started just after a huge economic crisis, with the poor, the dead, the hunger and so on. Many enterprises are still beating on primary resources, but i think that the most smart way to proceed for us, that don't have trillions of dollars to spend on R&S, may be to push for hidden, not well known, unknown information. Scarcity makes value, so... the bottom line is very simple. Wanna talk about it? (where is the 'green' smile?)
  6. Saran999

    Would you rather...

    I'll ask a question that imply two choices. They may be nice, funny, absurd or anything in between (respecting the forum rules ). The one who answer the question will post another two choices question and so on... WYR drive a Ferrari or date Victoria Justice? OR
  7. Wi-Fi has evolved over the years, and so have the techniques for securing your wireless network. An Internet search could unearth information that’s outdated and no longer secure or relevant, or that’s simply a myth. We’ll separate the signal from the noise and show you the most current and effective means of securing your Wi-Fi network. Myth No. 1: Don’t broadcast your SSID Every wireless router (or wireless access point) has a network name assigned to it. The technical term is a Service Set Identifier (SSID). By default, a router will broadcast its SSID in beacons, so all users within its range can see the network on their PC or other device. An SSID that isn't broadcast will still show up as an 'Other Network' in Windows 7. Preventing your router from broadcasting this information, and thereby rendering it somewhat invisible to people you don’t want on your network, might sound like a good idea. But some devices—including PCs running Windows 7 or later—will still see every network that exists, even if it can’t identify each one by name, and unmasking a hidden SSID is a relatively trivial task. In fact, attempting to hide an SSID in this way might pique the interest of nearby Wi-Fi hackers, by suggesting to them that your network may contain sensitive data. You can prevent your router from including its SSID in its beacon, but you can’t stop it from including that information in its data packets, its association/reassociation requests, and its probe requests/responses. A wireless network analyzer like Kismet or CommView for WiFi, can snatch an SSID out of the airwaves in no time. This wireless network analyzer showed the hidden SSID of 'cottage111' after I connected a device to the network. https://kismetwireless.net/ http://www.tamos.com/products/commview/ The analyzer captured the SSID from the association packets that the device exchanged with the router. Disabling SSID broadcasting will hide your network name from the average Joe, but it’s no roadblock for anyone intent on hacking into your network, be they an experienced blackhat or a neighborhood kid just goofing around. Myth No. 2: Enable MAC address filtering A unique Media Access Control (MAC) address identifies every device on your network. A MAC address is an alphanumeric string separated by colons, like this: 00:02:D1:1A:2D:12. Networked devices use this address as identification when they send and receive data over the network. A tech myth asserts that you can safeguard your network and prevent unwanted devices from joining it by configuring your router to allow only devices that have specific MAC addresses. Setting up such configuration instructions is an easy, though tedious, process: You determine the MAC address of every device you want to allow on your network, and then you fill out a table in the router’s user interface. No device with a MAC address not on that table will be able to join your network, even if it knows your wireless network password. But you needn’t bother with that operation. A hacker using a wireless network analyzer will be able to see the MAC addresses of every computer you’ve allowed on your network, and can change his or her computer’s MAC address to match one that’s in that table you painstakingly created. The only thing you’ll have accomplished by following this procedure is to waste some time—unless you think that having a complete list of the MAC addresses of your network clients would be useful for some other purpose. A wireless network analyzer scans the airwaves and shows the MAC addresses of the wireless routers and access points on your network, as well as all the computers and other devices connected to them. MAC-address filtering might help you block the average Joe from connecting to your router from an unauthorized computer or other device, but it won’t stop a determined hacker. It will render your network more difficult for legitimate users to work with, however, because you’ll have to configure your router every time you add a new device to it or provide a guest with temporary access. Myth No. 3: Limit your router’s IP address pool Every device on your network must also be identified by a unique Internet Protocol (IP) address. A router-assigned IP address will contain a string of digits like this: Unlike a MAC address, which the device sends to the router, your router will use its Dynamic Host Control Protocol (DHCP) server to assign and send a unique IP address to each device joining the network. According to one persistent tech myth, you can control the number of devices that can join your network by limiting the pool of IP addresses your router can draw—a range from to, for instance. That’s baloney, for the same reason that the next claim is. Myth No. 4: Disable your router’s DHCP server The flawed logic behind this myth claims that you can secure your network by disabling your router’s DHCP server and manually assigning IP address to each device. Supposedly, any device that doesn’t have one of the IP addresses you assigned won’t be able to join your network. In this scenario, you would create a table consisting of IP addresses and the devices they’re assigned to, as you would with a MAC addresses. You’d also need to configure each device manually to use its specified IP address. Disabling your router's DHCP server and manually limiting the number of IP addresses it can assign are not effective security procedures. The weakness that negates these procedures is that if a hacker has already penetrated your network, a quick IP scan can determine the IP addresses your network is using. The hacker can then manually assign a compatible address to a device in order to gain full access to your network. As with MAC address filtering, the main effect of limiting IP addresses (or assigning them manually) is to complicate the process of connecting new devices that you approve of to your network. This scanning app reveals all of the IP addresses in use on a wireless network. Myth No. 5: Small networks are hard to penetrate This myth suggests that reducing your wireless router’s transmission power will make it harder for someone outside your home or place of business to sneak onto your network because they won’t be able to detect it. This is the dumbest security idea of them all. Anyone intent on cracking your wireless network will use a large antenna to pick up your router’s signals. Reducing the router’s transmission power will only reduce its range and effectiveness for legitimate users. No myth: Encryption is the best network security Now that we’ve dispensed with five Wi-Fi security myths, let’s discuss the best way to secure your wireless network: encryption. Encrypting—essentially scrambling—the data traveling over your network is powerful way to prevent eavesdroppers from accessing data in a meaningful form. Though they might succeed in intercepting and capturing a copy of the data transmission, they won’t be able to read the information, capture your login passwords, or hijack your accounts unless they have the encryption key. Several types of encryption have emerged over the years. Wired Equivalent Privacy (WEP) provided the best security in the early days of Wi-Fi. But today WEP encryption can be cracked in a matter of minutes. If that’s the only security your router provides, or if some of your networked devices are so old that they can work only with WEP, it’s long past time for you to recycle them and upgrade to a newer standard. Wi-Fi Protected Access (WPA) came next, but that security protocol had security problems, too, and has been superseded by WPA2. WPA2 has been around for nearly 10 years. If your equipment is old enough to be limited to WPA security, you should consider an upgrade. WPA2, with an AES-encrypted preshared key, is an effective security protocol for home networks. Both WPA and WPA2 have two different modes: Personal (aka PSK, an acronym for Pre-Shared Key) and Enterprise (aka RADIUS, an acronym for Remote Authentication Dial In User Server). WPA Personal is designed for home use and is easy to set up. You simply establish a password on your router and then enter that password on each computer and other device that you want to connect to your Wi-Fi network. As long as you use a strong password—I recommend using 13 or more mixed-case characters and symbols—you should be fine. Don’t use words found in the dictionary, proper nouns, personal names, the names of your pets, or anything like that. A strong password might look like this: h&5U2v$(q7F4*. Your router might include a push-button security feature called Wi-Fi Protected Setup (WPS). WPS enables you to join a device to your WPA2-secured wireless network by pushing a button on the router and a button on the client (if the client also supports WPS). A flaw in WPS leaves it vulnerable to brute-force attacks, however. If you’re particularly security-conscious, you might consider turning off WPS in your router. Enterprise-mode WPA2 is designed for networks run by businesses and organizations. It provides a higher level of security than WPA, but it requires a RADIUS server or a hosted RADIUS service. Now that you understand the best way to secure your network, spend a few minutes making sure that your router is configured properly.
  8. Very short thread about some of the best shots ever published, IMO. Have a look and enjoy... http://www.rense.com/general96/shots.html
  9. ...as titles says... Have fun!
  10. I was thinking about the banned link redirectors and the purpose behind them. Particularly about SafeLinking and anonym.to. I do not wish to argue, but I'm interested on the motivations that may push uploaders to mask their links. If I may understand that, for the first one there may be a traffic redirection linked with some kind of money earned with it, I do not understand why the second one is banned. In my mind its purpose was to anonymously redirect links to hosting websites, without compromising the identity of the link sharing provider. So, a good thing to safeguard this website. But seeing this one banned open up questions that need your help to clear up in my mind. May you help me with some insights, please? TIA
  11. Saran999

    OS Wars

    In those tense days, where big IT giants are colliding in a just warming up war http://www.cyberphoenix.org/forum/topic/214097-here%E2%80%99s-how-apple-assaulted-microsoft-at-its-ipad-air-event-%E2%80%94-in-3-crushing-quotes/ http://www.cyberphoenix.org/forum/topic/214099-microsoft-fires-back-at-apple-iwork-is-%E2%80%98watered-down%E2%80%99-and-the-ipad-isn%E2%80%99t-a-%E2%80%98work%E2%80%99-machine/ What is your position in all this commotion? And, better, what is your favorite OS choice? Let us know about in our poll...
  12. In today’s solid state drives, the NAND flash memory must be erased before it can store new data. In other words, data cannot be overwritten directly as it is in a hard disk drive. Instead, SSDs use a process called garbage collection (GC) to reclaim the space taken by previously stored data. This means that write demands are heavier on SSDs than HDDs when storing the same information. This is bad because the flash memory in the SSD supports only a limited number of writes before it can no longer be read. We call this undesirable effect write amplification (WA). In a previous article, we explained why write amplification exists, but here I will explain what controls it. It’s all about the free space I often tell people that SSDs work better with more free space, so anything that increases free space will keep WA lower. The two key ways to expand free space (thereby decreasing WA) are to 1) increase over provisioning and 2) keep more storage space free (if you have TRIM support). As I said earlier, there is no WA before GC is active. However, this pristine pre-GC condition has a tiny life span – just one full-capacity write cycle during a “fresh-out-of-box” (FOB) state, which accounts for less than 0.04% of the SSD’s life. Although you can manually recreate this condition with a secure erase, the cost is an additional write cycle, which defeats the purpose. Also keep in mind that the GC efficiency and associated wear leveling algorithms can affect WA (more efficient = lower WA). The other major contributor to WA is the organization of the free space. When data is written randomly, the eventual replacement data will also likely come in randomly, so some pages of a block will be replaced (made invalid) and others will still be good (valid). During GC, valid data in blocks like this needs to be rewritten to new blocks. This produces another write to the flash for each valid page, causing write amplification. With sequential writes, generally all the data in the pages of the block becomes invalid at the same time. As a result, no data needs relocating during GC since there is no valid data remaining in the block before it is erased. In this case, there is no amplification, but other things like wear leveling on blocks that don’t change will still eventually produce some write amplification no matter how data is written. Calculating write amplification Write Amplification is fundamentally the result of data written to the flash memory divided by data written by the host. In 2008, both Intel and SiliconSystems were the first to start talking publicly about WA. At that time, the WA of all SSDs was something greater than 1.0. It was not until SandForce introduced the first SSD controller with DuraWrite technology in 2009 that WA could fall below 1.0. DuraWrite technology increases the free space mentioned above, but in a way that is unique from other SSD controllers. When does an amplifier make things smaller? Data reduction technology can master data entropy The performance of all SSDs is influenced by the same factors – such as the amount of over provisioning and levels of random vs. sequential writing – with one major exception: entropy. Only SSDs with data reduction technology can take advantage of entropy – the degree of randomness of data – to provide significant performance, endurance and power-reduction advantages. Data reduction technology parlays data entropy (not to be confused with how data is written to the storage device – sequential vs. random) into higher performance. How? When data reduction technology sends data to the flash memory, it uses some form of data de-duplication, compression, or data differencing to rearrange the information and use fewer bytes overall. After the data is read from flash memory, data reduction technology, by design, restores 100% of the original content to the host computer. This is known as “loss-less” data reduction and can be contrasted with “lossy” techniques like MPEG, MP3, JPEG, and other common formats used for video, audio, and visual data files. These formats lose information that cannot be restored, though the resolution remains adequate for entertainment purposes. The multi-faceted power of data reduction technology A previous discussion on data reduction (Read: Understanding SSDs: the need for TRIM and overprovisioning) discussed how data reduction technology relates to the SATA TRIM command and increases free space on the SSD, which in turn reduces WA and improves subsequent write performance. With a data-reduction SSD, the lower the entropy of the data coming from the host computer, the less the SSD has to write to the flash memory, leaving more space for over provisioning. This additional space enables write operations to complete faster, which translates not only into a higher write speed at the host computer but also into lower power use because flash memory draws power only while reading or writing. Higher write speeds also mean lower power draw for the flash memory. Because data reduction technology can send less data to the flash than the host originally sent to the SSD, the typical write amplification factor falls below 1.0. It is not uncommon to see a WA of 0.5 on an SSD with this technology. Writing less data to the flash leads directly to: * Faster read and write speed * Increased dynamic over provisioning * Extended flash life Each of these in turn produces other benefits, some of which circle back upon themselves in a recursive manner. This logic diagram highlights those benefits. So this a rare instance when an amplifier – namely, Write Amplification – makes something smaller. At LSI, this unique amplifier comes in the form of the LSI DuraWrite data reduction technology in all SandForce Driven SSDs. How to measure what can’t be seen Why is it important to know your SSD write amplification? Well, it’s not really necessary to know the write amplification of your SSD at any particular point in time, but you do want an SSD with the lowest WA available. The reason is that the limited number of program/erase cycles that NAND flash can support keeps dropping with each generation of flash developed. A low WA will ensure the flash memory lasts longer than flash on an SSD with a higher WA. A direct benefit of a WA below one is that the amount of dynamic over provisioning is higher, which generally provides higher performance. In the case of over provisioning, more is better, since a key attribute of SSD is performance. Keep in mind that, beyond selecting the best controller, you cannot control the WA of an SSD. Just how smart are the SSD SMART attributes? The monitoring system SMART (Self-Monitoring, Analysis and Reporting Technology) tracks various indicators of hard disk solid state drive reliability – including the number of errors corrected, bytes written, and power-on hours – to help anticipate failures, enabling users to replace storage before a failure causes data loss or system outages. Some of these indicators, or attributes, point to the status of the drive health and others provide statistical information. While all manufacturers use many of these attributes in the same or a similar way, there is no standard definition for each attribute, so the meaning of any attribute can vary from one manufacturer to another. What’s more, there’s no requirement for drive manufacturers to list their SMART attributes. How to measure missing attributes by extrapolation Most SSDs provide some list of SMART attributes, but WA typically is excluded. However, with the right tests, you can sometimes extrapolate, with some accuracy, the WA value. We know that under normal conditions, an SSD will have a WA very close to 1:1 when writing data sequentially. For an SSD with data reduction technology, you must write data with 100% entropy to ensure you identify the correct attributes, then rerun the tests with an entropy that matches your typical data workload to get a true WA calculation. SSDs without data reduction technology do not benefit from entropy, so the level of entropy used on them does not matter. IOMeter provides multiple entropy types, but only IOMeter 2010 permits user selectable entropy for simulating real-world data environments. To measure missing attributes by extrapolation, start by performing a secure erase of the SSD, and then use a program to read all the current SMART attribute values. Some programs do not accurately display the true meaning of an attribute simply because the attribute itself contains no description. For you to know what each attribute represents, the program reading the attribute has to be pre-programmed by the manufacturer. The problem is that some programs mislabel some attributes. Therefore, you need to perform tests to confirm the attributes’ true meaning. Start writing sequential data to the SSD, noting how much data is being written. Some programs will indicate exactly how much data the SSD has written, while others will reveal only the average data per second over a given period. Either way, the number of bytes written to the SSD will be clear. You want to write about 10 or more times the physical capacity of the SSD. This step is often completed with IOMeter, VDbench, or other programs that can send large measurable quantities of data. At the end of the test period, print out the SMART attributes again and look for all attributes that have a different value than at the start of the test. Record the attribute number and the difference between the two test runs. You are trying to find one that represents a change of about 10, or the number of times you wrote to the entire capacity of the SSD. The attribute you are trying to find may represent the number of complete program/erase cycles, which would match your count almost exactly. You might also find an attribute that is counting the number of gigabytes (GBs) of data written from the host. To match that attribute, take the number of times you wrote to the entire SSD and multiply by the physical capacity of the flash. Technically, you already know how much you wrote from the host, but it is good to have the drive confirm that value. Doing the math When you find candidates that might be a match (you might have multiple attributes), secure erase the drive again, this time writing randomly with 4K transfers. Again, write about 10 times the physical capacity of the drive, then record the SMART attributes and calculate the difference from the last recording of the same attributes that changed between the first two recordings. This time, the change you see in the data written from the host should be nearly the same as with the sequential run. However, the attribute that represents the program/erase cycles (if present) will be many times higher than during the sequential run. To calculate write amplification, use this equation: ( Number of erase cycles x Physical capacity in GB ) / Amount of data written from the host in GB With sequential transfers, this number should be very close to 1. With random transfers, the number will be much higher depending on the SSD controller. Different SSDs will have different random WA values. If you have an SSD with the type of data reduction technology used in the LSI SandForce controller, you will see lower and lower write amplification as you approach your lowest data entropy when you test with any entropy lower than 100%. With this method, you should be able to measure the write amplification of any SSD as long as it has erase cycles and host data-written attributes or something that closely represents them. Protect your SSD against degraded performance The key point to remember is that write amplification is the enemy of flash memory performance and endurance, and therefore the users of SSDs. In this article we examined all the elements that affect WA, including the implications and advantages of a data reduction technology like LSI SandForce's DuraWrite technology. Once you understand how WA works and how to measure it, you will be better armed to defend yourself against this beastly cause of degraded SSD performance.
  13. Saran999

    Breathalyzer test

    Story reported by a British guy who was stopped and asked to give a breathalyzer test. The British guy lives near Le Bugue in the Dordogne and at the time he was stopped he was as pis*ed as a fart... The gendarme signals to him to wind down the window then asks him if he has been drinking, and with a slurring speech the British guy replies: Getting impatient the gendarme warns him: The Brit, with a grin on his face, replies:
  14. A sponge is a sponge because its porous material is able to absorb liquid of any kind. But what about liquid metal? Can a sponge actually absorb the heavy quicksilver material known as mercury? Not at all. At best, a little bit of mercury goop gets caught on top of the sponge and slides away like its T-1000 shaping itself back together. https://www.youtube.com/watch?feature=player_embedded&v=PWCx3faQSfQ
  15. We all know the internet is a dangerous place, where many things can (and will) go wrong if you visit the wrong sites with the wrong browser. But it doesn't end there.. So I downloaded a program called "Cube Desktop Pro 1.31" and after unpacking the archive, I had 2 files; a key.txt file with a serial number inside (no group release nfo), and a executable file: See the exe icon? Thats the icon microsoft uses for its cabinet (.cab) format. So it's a self-extracting archive (which can automatically execute files after extracting). Weird, since this should be a normal installer, not another archive. So after opening the archive, I saw this: To me the crack.exe looks very suspicious and its also kinda big for a crack. Why would a crack be needed anyway since a serial was provided? Something is wrong here, so time to check it out! A peek inside shows us this: I dont think I have to explain what is going on in here. And indeed, upon running the main exe file, it immediatly started the crack.exe which grabbed all my logins and passwords, saved it to a temp file in the default temp folder and then tried to send the the file somewhere, which -obviously- my firewall prevented. lol! If I just ignore the crappy coding (they're surely not pro's), I must say this is kinda creative, since no anti-virus/spyware/malware/whatever will detect this. Technically its not a virus or trojan, and your anti-whatever will not see this as a potentional problem. I haven't done a detailed analysis, but the info in here already gives you an idea about the damage that can be done. Also please note that the above is just one of many. There's lotsa crap like this floating around on the internets. Often with attractive words like *NEWEST*, *LATEST* or *FULLY WORKING* etc etc in the title to get you to download it. So always be careful with what you download and from who! Even if it looks safe! (tip: download from respected posters ;-)) Also if you don't trust your download, you can upload the file to a service like http://virusscan.jotti.org/
  16. Saran999

    My Halloween Costume: Peter Pan

    Is he truly the winner? Where the human mind has gone? Horrible, at least.... Thanks for sharing this obscenity @freak it's always good to know where human evolution is guiding us all. I only hope that this will be a dead-end though... Cheers
  17. Seems a poor remake of the movie Escape Plan! Thanks for sharing this, Cheers
  18. There’s a new player in the bustling world of “commercial space,” although the “space” part is a matter of definition. A Tucson, Arizona-based start-up plans to use a helium balloon to lift big-ticket customers in a pressurized capsule to around 98,000 feet. That’s a journey to the edge of space, if not into space as traditionally defined. This artist's rendering shows the tourist capsule (inset) planned by World View Enterprises that would be carried by balloon to an altitude of 98,000 feet, from where passengers, paying $75,000, could see the Earth's curvature below and the black of space above. The passengers would ascend for 1½ hours before spending two hours admiring the world from on high. Then the capsule would be disconnected from the balloon and begin a free fall, but a parafoil above the capsule would become increasingly effective in the thickening air and the capsule would glide to the surface, landing on skids. Price point: $75,000. The eight passengers on board would presumably come from the same customer pool that feeds high-end luxury vacations, such as round the world golf tours. said Jane Poynter, co-founder of Paragon Space Development Corp., which has lined up investors for the new venture, World View Enterprises. More than just hot air: This artist's rendering released Tuesday by World View Enterprises shows its capsule to be lifted by a high-altitude balloon to around 98,000 feet It hopes to begin the balloon flights in three years. The U.S. Federal Aviation Administration announced Tuesday that, for purposes of regulation, the capsule will be treated as a space vehicle because it will be built to operate in outer space. it stated. The venture’s website promises a “truly transformative human experience.” The company said Tuesday it will offer There’s no distinct boundary between the atmosphere and space. Rather, the atmosphere steadily thins with altitude. On tourism trips, the World View balloon would rise to about 98,000 feet. One commonly referenced boundary of space is the Karman Line. That’s at 100 km (328,000 feet) and is roughly the altitude above which aerodynamic flight is impossible, even in theory. But in the minds of the people behind World View, they’re getting into space tourism. said Paragon co-founder Taber MacCallum. Poynter and MacCallum are well known in the entrepreneurial space community. In the early 1990s they spent two years as “bionauts,” sealed inside Biosphere II, a massive, greenhouselike structure in the Arizona desert. Their company, Paragon, has had contracts with NASA for life-support technology. https://www.youtube.com/watch?feature=player_detailpage&v=ZCAnLxRvNNc Toy Robot in Space! - HD balloon flight to 95,000ft. The highlights of the entire space flight from the music video for 'Edgar' by Lucky Elephant, this was published in 2010, but you can have a look at what you will experience with the ticket you may buy for your own space flight. The field of commercial space has been growing in recent years. Virgin Galactic, backed by billionaire businessman and adventurer Richard Branson, hopes to carry passengers on suborbital flights in 2014. It will use a rocket-powered vehicle called SpaceShipTwo, still in testing, that is designed to reach altitudes above the Karman Line. The company has sold nearly 650 tickets in advance. The ticket price recently jumped to $250,000 a seat, up from $200,000. World View’s MacCallum said. https://www.youtube.com/watch?feature=player_detailpage&v=9VXUTXroxIM A clip from You Have Been Warned/Outrageous Acts Of Science 'Homemade Heroes' episode on Discovery Channel (UK+International) and Science Channel (US), explaining the science behind filming in near-space using a helium filled weather balloon. Paragon also is working with billionaire Dennis Tito on his Inspiration Mars plan — a 500-day mission that, if technically feasible, would send two astronauts on a flyby of Mars during a rare alignment of the planets five years from now.
  19. They are called in jargon script-kiddies and they really don't know the implications and consequences of what they do. There is an automated exploit maker, they download it, they use it... and they go to jail. This is the actual situation. The pity is that there is no added knowledge on what they are doing, nor added studies or research from their part. And this was an 11 year old boy. I've seen a documentary on Anonymous non-organization that shows how a 30 something person goes to jail with the same DDOS automated exploit tool, used against Scientology. About the defacing part of the accuse... well, I wish really to know more...
  20. That's really interesting mate! Self healing coat... I suppose nano tech something is there... I remember some article in the past about this possibility and here's a video that show something interesting about it https://www.youtube.com/watch?feature=player_detailpage&v=YQBfhmg7dyQ and then, there is a video about a discovery made by a scientific team in US on the same subject but with applications more oriented to electronic circuits and devices, and you can watch it here https://www.youtube.com/watch?feature=player_detailpage&v=wgLd8kWmPMI Thanks for sharing this HM, this is a most interesting subject and I really wish to have the possibility to play with those new materials. Cheers
  21. How I hate this! And it's so true... I've seen it so many time in my life... but let's not get too personal AbA garment of camel or goat hair; camel or goat-hair fabric
  22. Saran999

    Poo~Pourri Toilet Deodorizers

    Yes, this is a REAL commercial and product! Hat's off to the ad campaign! and the girl that's just fantastic! Poo~Pourri Toilet Deodorizers Some say the secret to a happy relationship is separate bathrooms, but those people have never tried Poo~Pourri, the classy, sassy, ultra effective way to leave the bathroom smelling better than you found it. Our award winning before-you-go toilet sprays come in several different sizes and scents. Go ahead...join thousands of happy customers who've tried Poo~Pourri for fun and keep using it because it really works! How it Works When you spray Poo~Pourri into the bowl before-you-go, our proprietary formula creates a protective barrier on the water's surface. This barrier is designed to trap unpleasant bathroom odors beneath the surface and keep them out of the air. All you'll smell is a refreshing bouquet of essential oils! https://www.youtube.com/watch?feature=player_detailpage&v=ZKLnhuzh9uY
  23. The allure of Pop Rocks is undeniable. Sure, the whole "fireworks in your mouth" thing is a gimmick, but it's an awesome one. You know what else is an awesome gimmick? Everybody's favorite Red Hot Nickel Ball. The results aren't especially explosive, but those rocks still pop. Except instead of saliva, they're popping in a molten lava flow of liquid sugar fueled by red hot metal. And there's only one of those that you want in your mouth. https://www.youtube.com/watch?feature=player_embedded&v=xQUaUW10M0Q
  24. When everybody on earth was dead and waiting to enter Heaven, God appeared and said, "I want the men to make two lines: One line for the men who were true heads of their household, and the other line for the men who were dominated by their women. I want all the women to report to St. Peter." Soon, the women were gone, and there were two lines of men. The line of the men who were dominated by their wives was 100 miles long, and in the line of men who truly were heads of their household, there was only one man. God said to the long line, "You men should be ashamed of yourselves; I created you to be the head of your household! You have been disobedient and have not fulfilled your purpose! Of all of you, only one obeyed. Learn from him." God turned to the one man, "How did you manage to be the only one in this line?" The man replied, "My wife told me to stand here."
  25. Let's see what you have got! Some time ago, a really dear friend of mine in this community asked me to share my animated gif collection... Duh! I don't have much, I replied... in fact, internet it's my hard drive... But then I was thinking, and (for the Diablo III fans) even if this hurts me a lot, I've kept thinking... and I've thought... what about our own animated gif repository, where each member may come in, take what he wants, and post his own animated gif's? So, just like the thread Motivational Posters thread, let's start our own repository where all the funny, and less funny but interesting, or just lame or... you choose (but don't post obscenities as it's against our rules) will be posted and treasured forever and ever and ever and ever and ever... this is a borderline to me... toward obscenities... ...have I already said that I love cats? and the little thing that is flying among my signature... it's a cat, not a bear! now it's cuddling... but may become like those...