Jump to content

riso

Member
  • Posts

    14
  • Joined

  • Last visited

  • Donations

    0.00 USD 
  • Country

    United Kingdom

About riso

  • Birthday 01/14/1982

Contact Methods

  • Website URL
    http://

riso's Achievements

0

Reputation

  1. I can't find him in our member roster to view old activity/posts. Is that nick correct? http://www.dreamincode.net/forums/lofivers....php/t7192.html Your site is mentioned there too. His real name was Kenny Pollock. I think the lads at Neowin traced him and got all the info they could on him, including his mothers name, his address, his picture etc. I just dont know what was up with him, why and how did he do these things?
  2. Yeah, that was the point I was trying to make by raising doubts. You won't know for sure you were hacked, when you were hacked, how you were hacked; unless the hacker left a trace just to let you know you weren't smart enough to secure your system. The question for the original poster is: How do you know you were hacked? What clues led you to think you were hacked? We are offering him advice without knowing the details. Yep. you are very right.
  3. Be carefull though because any programs which point to locations on the current drive letter may misfunction should that letter change.
  4. From the information we were supplied, I can see no reason why the task would be performed by anyone other than an administrator and there shouldn't even be a need to use a script to deploy the command.However I'm sure your addition may be useful to those capable of breaking down your code for other tasks. <Edit> BTW, the 'wildcard' asterisk at the end of my line of code was a requirement! </Edit> It was snippet of code and not the full runas code. The snippet would allow him to enter the old information and the information to be replaced with and then click ok. Then when he clicks ok, the information he entered would be placed after the run code for the file and then the file would run with the information he entered. I hope this makes sence? But basically, this code "should" work, but may need a little "tweaking" in places.
  5. Ah ok, thanks for clearing that up. What about Kidd0. I know he caused no end of issues with Ddos attacks on various tech communities in 2003. What was his problem?
  6. Can you post a screenshot of the error you are getting please? Also, what media are the files on? (CD, DVD, External Drive Caddy?) This can all contribute to the issue you are experiencing
  7. start => run (or command prompt) eventvwr.msc Look for the log file which say: Hacker attached to system and the date and time, then look for the entry of: Hacker detached from system and the date and time. Obviously if someone where to enter the guys machine they would probably have enough nohow of how to clear any evidence of their being there.
  8. Whilst logged in as your account or the admin account, load tweak UI (search google for it, its from MS. In Tweak UI, go to log in and select to copy all options currently set for the current user, so that would be background, theme etc. Note, that through this you can also set the machine to auto login, which can be a security risk and is not recommended.
  9. Maybe the one known as kidd0 will return. But GreenMachine is absolutely right. MSFN has become less interesting (post-wise) over the last few months, IMO. What used to take me about an hour to go through usually only takes me a few minutes. There are too many new threads being created that in which questions have already been answered in previous ones. Maybe a new project will do this forum some good (not that the current ones aren't exciting or useful). What is a patron? Kidd0 seems to ahve caused all kinds of trouble in 2003. What was that kids issue?
  10. riso

    Im New

    Ain't it true. All steadfast and voluntary. Welcome to MSFN riso! DL Yep. I think i will like it here . How fast is this community growing? I mean on average how often do new users join?
  11. To be honest with you, im not 100% sure. However, by my understanding, in XP you can do this reasonably safely and in Vista you can adjust your partitions completely, however in 95 -98 etc, i do not believe you can do this without 3rd party software, which even then can cause the partition to be unstable. My advise would be to ensure you have a good backup of everything before attempting this, even if you where using xp or Vista.
  12. I use a seperate account, but am in the admin group. Although you are right, you can run as. There is also a script online that you can drag the file you want to run as an admin to and it will run that file. The only problem being that you have the admin password showing in plain text format, unless you encode the script, which is easily reversiable.
  13. First thing is to learn not to use the term "hacked" to loosely. The other day i "hacked" someones network, just to see if i could do it. However this was not really hacking. The wireless network had no security so i was free to connect and use their network connection for free. Then i browsed the computers connected to the network and saw 2 machines, one MAC and one PC. The PC was named the owners name (so i now have his name). The guy was sharing out his music and documents, so i could easily browse to his documents etc and if i had been malicious, could have deletted everything. It also gave me the chance to see pictures of him, his family and private arrangments for when he was going away (so i now know he lives in the area. If i spot him i could follow to see where he lives, and then later when i know he is away because of what i have seen on his machine i could break in, knowing he wont be back for a good long while. He didnt have a password on the admin account so i had access to what i wanted. Because i was just doing it to see what i could do and not to be malicious i simply left a message in a place i know he would see saying he has been hacked and should secure his network. Sine then he has secured it with WEP encryption, which is better than no encryption. However, to be secure as possible at a cheapest way try the following: If using wireless use WPA2 and make the passcode something that no one could even guess. Make sure your not broadcasting your SSID and enable MAC connections so only machines with the MAC address' you say, can join the network. Make sure you have a good firewall. A hardware firewall is better than any software firewall, but as that is not usually an option try some firewall software. Anything other than the standard Windows firewall is good. Zonealarm is usually the standard for most home users. Make sure you have spyware software installed. I prefer spybot. Make sure you have antivirus installed, a good free one is Avast! Some people like to run multipul antivirus and spyware programs, but this will seriously impact your system performance. Other than that, just use your initiative. Dont exept files from people you dont know or dont trust etc. Common sense things really.
  14. riso

    AppleTalk

    I have searched but cant find any free ones. I found one that looks like its ok, but its a demo that only works for 180 minutes before you need to reboot.
×
×
  • Create New...