Jump to content

Googlebot

Member
  • Posts

    7
  • Joined

  • Last visited

  • Donations

    0.00 USD 
  • Country

    Serbia

About Googlebot

  • Birthday 10/21/1998

Contact Methods

  • Website URL
    http://www.audioforum.rs/

Googlebot's Achievements

0

Reputation

  1. Hi, I do whois, I see this: Domain : bold-fortune.com Expired : 25 Jul 2008 07:09:38
  2. Though we often associate Hacking with criminal activities... Hacking does not always mean breaking into computers.... To add to the confusion, the noun "hack" also has two senses. It can be either a compliment or an insult. It's called a hack when you do something in an ugly way. But when you do something so clever that you somehow beat the system, that's also called a hack. The word is used more often in the former than the latter sense, probably because ugly solutions are more common than brilliant ones... Hacker is for me<---->highly skilled (software/hardware) engineer.... From Wikipedia: "A hacker is often someone who likes to create and modify computer software or computer hardware, including computer programming, administration, and security-related items. A hacker is also someone who modifies electronics, for example, ham radio transceivers, printers or even home sprinkler systems to get extra functionality or performance. The term usually bears strong connotations, but may be either favorable or denigrating depending on cultural context" See the hacker definition controversy: http://en.wikipedia.org/wiki/Hacker_definition_controversy Googlebot
  3. What is the best way to remove files from a hdd? FORMAT.COM is an external MS-DOS command, located by default in C:\Windows\Command Hidden Parameter : Hidden parameter are not documented by Microsoft and is find by users threw experiments. 1) FORMAT /AUTOTEST : FORMAT /AUTOTEST checks for the existing format of your disk, unless the /U (UNCONDITIONAL) parameter is also used, and then proceeds with an UNATTENDED DISK(ETTE) FORMAT: DOES NOT prompt for a volume label! DOES NOT prompt to format another disk(ette)! NO delay: NO user intervention! Ends WITHOUT pausing! After completion, it DOES display disk space statistics. 2)FORMAT drive: /U : FORMAT drive: /U performs an UNCONDITIONAL format, which DESTROYS every byte of data on ANY hard disk/floppy by overwriting it with zeroes (hex F6h). 3) FORMAT drive: /SELECT /U : FORMAT drive: /SELECT /U makes a disk(ette) UNREADABLE by filling the system area (sector 0) with zeroes (hex F6h), due to using these two incompatible options together. All other sectors are left intact What Googlebot find about this... From: http://antionline.com/archive/index.php/t-235813.html Interesting is that evry link from this page is dead I put in this 1`st QUOTE 2 true links..... -------------------------------------------------------------------------------------------------------------------- There are "de-magnetisers" machines (degausser) that are used for disabling drives that have contained top-secret data, and these cost a bundle. However, only using software, you can only have the drive read or write data. The drive heads cannot just "scatter magnetic charges"... how would a head that is designed to read and write individual bits (in block), ie precisely, be able to do that?. Besides, if it were the case, the drive would either need a low level format after that or be filled with bad clusters, ie: be just plain dead. Here's an extract of DoD 5220.22-M shredding guidlines: http://www.killdisk.com/dod.htm chapter8 a. Degauss with a Type I degausser b. Degauss with a Type II degausser. c. Overwrite all addressable locations with a single character. d. Overwrite all addressable locations with a character, its complement, then a random character and verify. THIS METHOD IS NOT APPROVED FOR SANITIZING MEDIA THAT CONTAINS TOP SECRET INFORMATION. Also, a comparaison of software "shredders" can be found here: http://www.sdean12.org/Comparison_Shredders.htm (Check the "Overwrite algorithm" row for wiping technique) -------------------------------------------------------------------------------------------------------------------- Well, no, IT IS possible: Overwriting data on disk isn't like filling a closet, it's like writing over used paper... What happens is that when the disk heads write on the platter, it re-aligns magnetite (or whatever magnetic compound they use) in a diffrent direction. However, a single write doesn't manage to get all magnetite (or whatever) particuls re-alligned. So while the majority of particuls will have change directions, there will be a few residual ones that will still be oriented in the previous direction. So finding out what data was there before means using a more sensible device that can distinguish or detect variations in the magnetic field or such... (That's why whiping software will make multiple writing passes, sometimes with randomized caracter, in order to try and re-allign all particuls). Of course this is hard to do and pretty expensive, but people with enough money and resources (think FBI, CIA, NSA...) could and do have the means to do it. In fact, I remember reading somewhere that it was rumored the NSA (I think) was able to recover data after 27 passes! -------------------------------------------------------------------------------------------------------------------- When data is written to magnetic media it is written to a magnetic domain. This domain consists of a number of magnetic bits (not to be confused with a data bit 0 or 1) which receive the magnetic charge. Not all of the bits in the magnetic domain will change when the head passes over during the write operation and will retain the magnetic properties from a previous operation. Does this mean that a magnetic domain can contain magnetic bits that are set to a zero and magnetic bits that are set to a one? It certainly does, but if the write operation was setting the bit to a one then the majority are set to a one, strongest at the center of the domain weaker at the edges. Remember in grade school when you put metal filings on a piece of paper and ran a magnet underneath. Most of the filings lined up and pointed in the same direction, but the ones at the edges didn't all point with the others. The same thing is happening when you write to the hard disk. Is it easy to peel back these layers to determine what was overwritten? With modern hard disks this is a difficult, costly, and time consuming process but portions of overwritten data can be recovered if it was overwritten or wiped with a single pass process. The minimum process that should be involved in a wipe would be a three pass write. A three pass will make one pass writing 00 followed by it's complement which is an FF and a final pass of random data. It is still possible to recover some data after a 3 pass wipe, but whoever does will want that data very badly and have the $$ to attempt the recovery. Generally a 7 pass wipe will make it near impossible to recover the data and I have never heard of any data being recovered after a Guttman 35 pass wipe. (Disclaimer.. Doesn't mean that those agencies with 3 letter names can't do it but they would really want you bad to go to the expense involved) -------------------------------------------------------------------------------------------------------------------- Awesome tools: DBAN: Darik's Boot and Nuke: (free) Darik's Boot and Nuke ("DBAN") is a self-contained boot floppy that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, which makes it an appropriate utility for bulk or emergency data destruction. DBAN is a means of ensuring due diligence in computer recycling, a way of preventing identity theft if you want to sell a computer, and a good way to totally clean a Microsoft Windows installation of viruses and spyware. DBAN prevents or thoroughly hinders all known techniques of hard disk forensic analysis. Download Eraser: (free) Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP, Windows 2003 Server and DOS. Eraser is Free software and its source code is released under GNU General Public License. The patterns used for overwriting are based on Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and they are selected to effectively remove magnetic remnants from the hard drive. Other methods include the one defined in the National Industrial Security Program Operating Manual of the US Department of Defence and overwriting with pseudorandom data. You can also define your own overwriting method Download Googlebot
  4. Selenium is a test tool for web applications. Selenium tests run directly in a browser, just as real users do. And they run in Internet Explorer, Mozilla and Firefox on Windows, Linux, and Macintosh. No other test tool covers such a wide array of platform Selenium enables you to record a browser session. For example, you could record the series of actions required to add a product to a shopping cart or register at a website. Platform and Browser Compatibility Supported Platforms: * Windows: o Internet Explorer 6.0 o Firefox 0.8 to 1.5 o Mozilla Suite 1.6+, 1.7+ o Seamonkey 1.0 o Opera 8 * Mac OS X: o Safari 1.3+ o Firefox 0.8 to 1.5 o Camino 1.0a1 o Mozilla Suite 1.6+, 1.7+ o Seamonkey 1.0 * Linux: o Firefox 0.8 to 1.5 o Mozilla Suite 1.6+, 1.7+ o Konqueror You can use Selenium to record each significant client-side action that a user performs in a browser such as clicking buttons and links and entering text into input fields. After you record a test, you can run the test with any browser. For example, you can execute the same test with Internet Explorer, Firefox, and Opera to check that your application is cross-browser compatible. Downloading Selenium There are three different Selenium downloads: * Selenium IDE — Enables you to record a browser session. The Selenium IDE is a Firefox extension so it only works with Firefox. However, tests that you create with the Selenium IDE can be run on other browsers including Internet Explorer and Opera. * Selenium Core — Enables you to run Selenium tests. You can use the Selenium Core library to execute a suite of tests from a browser. * Selenium RC — Enables you to remotely control a browser. Includes a C# wrapper for Selenium so that you can remotely control a browser from a C# application. Selenium RC is especially useful when used with unit testing tools such as nUnit. Selenium is an open-source project (released under the Apache license) created by the developers at ThoughtWorks. You can download Selenium from the OpenQA website at http://www.openqa.org/selenium/ Click here to view movie Googlebot
  5. Codebox is on This adds Device Manager to right click on My Computer [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Devices] @=hex(2):44,00,65,00,76,00,69,00,63,00,65,00,20,00,4d,00,61,00,6e,00,61,00,67,\ 00,65,00,72,00,00,00 "SuppressionPolicy"=dword:4000003c [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Devices\command] @=hex(2):25,00,77,00,69,00,6e,00,64,00,69,00,72,00,25,00,5c,00,73,00,79,00,73,\ 00,74,00,65,00,6d,00,33,00,32,00,5c,00,6d,00,6d,00,63,00,2e,00,65,00,78,00,\ 65,00,20,00,2f,00,73,00,20,00,25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,\ 00,6f,00,6f,00,74,00,25,00,5c,00,73,00,79,00,73,00,74,00,65,00,6d,00,33,00,\ 32,00,5c,00,64,00,65,00,76,00,6d,00,67,00,6d,00,74,00,2e,00,6d,00,73,00,63,\ 00,20,00,2f,00,73,00,00,00 This is my picture
  6. Right-click My Computer To Shutdown In (10m 20m 30m 40m 50m 60m 2hrs 3hrs 4hrs 5hrs 6hrs 12hrs 24hrs) Windows Registry Editor Version 5.00 [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell1...Shutdown In ...10 Min] [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell1...Shutdown In ...10 Min\command] @="shutdown -s -f -t 600" [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell2...Shutdown In ...20 Min] [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell2...Shutdown In ...20 Min\command] @="shutdown -s -f -t 1200" [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell3...Shutdown In ...30 Min] [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell3...Shutdown In ...30 Min\command] @="shutdown -s -f -t 1800" [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell4...Shutdown In ...40 Min] [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell4...Shutdown In ...40 Min\command] @="shutdown -s -f -t 2400" [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell5...Shutdown In ...50 Min] [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell5...Shutdown In ...50 Min\command] @="shutdown -s -f -t 3000" [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell6...Shutdown In ...60 Min] [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell6...Shutdown In ...60 Min\command] @="shutdown -s -f -t 3600" [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell7...Shutdown In ....2 hrs] [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell7...Shutdown In ....2 hrs\command] @="shutdown -s -f -t 7200" [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell8...Shutdown In ....3 hrs] [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell8...Shutdown In ....3 hrs\command] @="shutdown -s -f -t 10800" [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell9...Shutdown In ....4 hrs] [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell9...Shutdown In ....4 hrs\command] @="shutdown -s -f -t 14400" [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\10...Shutdown In ....5 hrs] [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\10...Shutdown In ....5 hrs\command] @="shutdown -s -f -t 18000" [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\11...Shutdown In ....6 hrs] [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\11...Shutdown In ....6 hrs\command] @="shutdown -s -f -t 21600" [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\12...Shutdown In ...12 hrs] [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\12...Shutdown In ...12 hrs\command] @="shutdown -s -f -t 43200" [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\13...Shutdown In ...24 hrs] [HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\13...Shutdown In ...24 hrs\command] @="shutdown -s -f -t 86400" Googlebot
  7. The only browser most of us use is Internet Explorer. Like Democracy, it's not perfect, just the best there is. Here's a trick when it starts popping blank pages where there should be websites, either from URL or Email links. Close the browser and hit the 'Start' button, then 'Run' and enter the following: REGSVR32 URLMON.DLL A message will pop up telling you the procedure was successful. Then fire up IE & go to 'Tools,' then 'Internet Options,' then 'Programs.' Click on 'Reset Web Settings' and everything should be back to nearly perfect. Googlebot
  8. HI all, First and foremost, I am a committed Christian, a follower of Christ. I'm far from perfect, but I try to live my life in a way that provides a true reflection of God's love for mankind. Secondly, I am a family guy. I am very close to my family and make them the second-highest priority in my life. Thirdly, I am a hacker. More specifically, I am a professional hacker. My favorite quote: Many people sing, but few are singers. Many people write, but few are writers. Many people speak, but few are orators. Many people think, but few are thinkers. Many people pray, but few are religious. Many people smile, but few are happy. Many people hope, but few are not disappointed. Many people die, but few will survive... Googlebot
×
×
  • Create New...