Jump to content

I_Broke_My_MHZ

Member
  • Posts

    185
  • Joined

  • Last visited

  • Donations

    0.00 USD 
  • Country

    United States

Everything posted by I_Broke_My_MHZ

  1. I wish I could. I have it but it is a .bmp and compressing it would degrade the quality. If I find it I'll post it.
  2. Some facts about this new troublesome vulnerablility: 1) Effects Win98/ME/2000/XP/2003 2) Indexing programs like googledesktop further enhance the ability of the virus to infect the computer. 3) Some browsers cannot open the image without the aid of another program. If the browser is set to prompt before doing so, this can reduce the risk. 4) Even if the extention is changed (say .bmp or .jpg), some image programs will still attempt to render the image correctly and thusly infect the system.
  3. I like the colors, but the background picture is retarted.
  4. Not enough demand and Win98 is rather old. There is 98Lite which will do what you want.
  5. But he didn't do any Mac address filtering, so that isn't the problem. You guys are just confusing him. There are two different types of WPA-PSK: AES and TKIP. AES is hardware based, TKIP is software/firmware based. Which one are you using?
  6. Unfortunately I don't know much about the programming aspect of it all. Maybe the source code of some existing tools can give some useful information. Maybe you should try your luck at a forum more geared toward network programming?
  7. Just because Windows says 1024kb = 1mb doesn't mean everyone else has to! To me it makes a lot more sense that 1000kb = 1mb being that a mega is 1000 kilos.
  8. NOS means Network Operating System..a fairly useless term.
  9. This is a guess, but it probably has to do with the DVDs being rated as 4.7 on a 1000kb = 1mb scale as opposed to the scale that is used normally 1024kb = 1mb.
  10. Centrino technology is a system that involves the processor, wireless network card and battery. The lower clock speed, better battery and integrated wireless are ment to put an emphasis on mobility performance. Not exactly good for games or anything else high-performance, but works great if you are always going around with your laptop. You don't have to get Centrino to have wireless functionality.
  11. Assuming it is just a .scr file, you can have a batch file copy it to the windows directory.
  12. That statement is just retarted, but yet, appropriate for the question asked.
  13. Yeah your computer is just messed up. Not only did you have a virus, you have norton..which is garbage. Time to format.
  14. Exploits exist that enable someone to close/crash a browser, but it is more likely that IE is just getting errors and closing automatically. Have you updated to the latest version of IE?
  15. Filter what? You need to be much more specific than that!
  16. Nothing except enabling WPA encryption will protect you. WEP - too weak, someone can crack it in under 15min. Disable SSID - Only disables one type of SSID broadcasting. A simple sniffing tool can pick up the SSID fast. MAC Filtering - A sniffer can pick up the MAC addresses of the computers connected and clone them. Disable DHCP - The dumbest one of all, one could just assign themselves a static IP. Just enable WPA and you will be fine.
  17. After a lot of digging I came across this site: http://www.haslo.ch/permalink_669~en Which has a rather useful analasis on the privacy issue.
  18. Say I have an address like "optemistic.com" but instead of the browser going to "optemistic.com", it gets redirected to a file in the hard drive (like c:\web page\page.html). How would I go about doing that? I'm doing this on WinXP Pro.
  19. I was considering getting WoW, but I've been reading a few articles about "The Warden" lately that cite concerns over the program's activity. Most notebly is the reading and verifying of every window title that is opened. So I have two questions: 1) Does "The Warden" send potentially personal data over the internet? 2) Besides reading titles, is there anything else worth mentioning about it?
  20. This will be somewhat difficult. I think such a technique as spoofing the IP requires the use of raw sockets. Not only were raw sockets disabled/hampered in the newest update to windows, but you will have to know how to utilize raw sockets. So...um..look into that I guess. A lot of the more advanced *nix nuking tools I saw use raw sockets.
  21. For Win2k you would probably have to install a bridge adapter.
×
×
  • Create New...