Pages:
1
2
3
4 |
woelen
Super Administrator
Posts: 8014
Registered: 20-8-2005
Location: Netherlands
Member Is Offline
Mood: interested
|
|
I needed the second harddrive to install a fresh OS without having to overwrite my first harddrive. The first one contained a lot of personal data and
that of course should not be overwritten.
|
|
MagicJigPipe
International Hazard
Posts: 1554
Registered: 19-9-2007
Location: USA
Member Is Offline
Mood: Suspicious
|
|
Good excuse then.
"There must be no barriers to freedom of inquiry ... There is no place for dogma in science. The scientist is free, and must be free to ask any
question, to doubt any assertion, to seek for any evidence, to correct any errors. ... We know that the only way to avoid error is to detect it and
that the only way to detect it is to be free to inquire. And we know that as long as men are free to ask what they must, free to say what they think,
free to think what they will, freedom can never be lost, and science can never regress." -J. Robert Oppenheimer
|
|
quicksilver
International Hazard
Posts: 1820
Registered: 7-9-2005
Location: Inches from the keyboard....
Member Is Offline
Mood: ~-=SWINGS=-~
|
|
Back in DOS days I had the privilege of meeting Phil Zimmerman (wrote PGP) prior to his trial. The older versions were the ones that caused all the
fuss. Microsoft has built so many way to data-mine an erased HDD they they are teaching classes in it for LE agencies' computer people. Apparently the
slick ones to get stuff back from are Vista and WIN7. These are not back-doors in the most common sense but methods to undelete and skirt around MS's
own privacy & encryption. The reason I mention Zimmerman was that recently many OLD computers are being used as DOS/FAT machines using Zimmerman's
PGP 6 or lower for DOS on a command line level. There is a possibility that if such a thing were used making several levels of encryption: one within
another; the time some of the REAL machines would need to open it up would be days or more.
He released the code, HASHES, etc with each release so folks would know it was genuine. This was when encryption was a munition. It's not dealt with
that way as most public material can be defeated by the real computers. However the old FAT based computers could be MORE tough than today's.
At a Cisco conference a speaker was politely asked to drop a topic dealing with the problems of older OS's, encryption and deletion. In fact, MIT had
a contest some years back to resurrect drives that were not physically damaged. The winner's (it was a draw between two) was a 486 with Novell DOS v7
and a GUI on it for simple apps Windows for work groups v3.11 and OS2 v2.1. material deleted and over written on both those platforms was not
available once the MBR (that's what what it was called back then) was wiped.
Runner's Up were: a tiny program that over-wrote a FAT running computer and deleted it's place on track 0 it; all in one key stroke which could be
configured as a Function Key and something else together, total program (written in Assembler) was less than 1K.
Another one was Microsoft's own WIN95 (it's MSDOS 7) in FAT16 with a program written in DOC ANSI C that moved the FAT16 MDR to the next available
space; thus the user over wrote it and that user could be out of luck or he could remember what it was he was doing and what he wrote when it was
started & could bring it back with exactly the same eight key strokes. So it's either set to hide or set to destroy. It even remembers what app
you were in size 12K ! the only hurdle with DOS was the naming convention; especially the naming convention for an executable. But they hurdled that
by using two programs that could find it's hidden sister called "uninstall.moc" to uninstall.com (remember "com" files? - anything under 64K and
that's a LOT of program for assembler without macros! Or keep the standard EXE file, but there's no need because the sister file renames and starts
the program in a package that 1K ! like temp-cln.exe in the root directory run it and -"netlog.012" & turn that into "netlog.exe"
[Edited on 12-3-2010 by quicksilver]
|
|
franklyn
International Hazard
Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline
Mood: No Mood
|
|
Brave new world
Links for the full article , scroll down for the text
" Your ISP Is a Copyright Cop "
" 'Private' or 'Incognito' Browsing...Isn't "
http://www.pcworld.com/article/191312
http://www.pcworld.com/article/191312-2
http://www.pcworld.com/article/191312-3
http://www.pcworld.com/article/191312-4
http://www.pcworld.com/article/191312-5
Some here are already ahead of this
http://www.sciencemadness.org/talk/viewthread.php?tid=1372
" Your Passport Could Make You a Target for Crime--Wirelessly "
http://www.pcworld.com/article/191312-6
http://www.pcworld.com/article/191312-7
.
|
|
Lala
Harmless
Posts: 1
Registered: 12-7-2010
Location: i'm in your head...
Member Is Offline
Mood: ..like a pimp
|
|
you know what...think about this..we are talking here about having no privacy on our computers but at least it IS possible to decide fuck it and not
use one and then that problem would over with right..but check this out..i dont know if this has been discussed here before but where i live is just
about the worst place in this country as far as having any rights and privacy..here in good old los angeles more and more ( all in the name of
"PUBLIC SAFETY") they are installing CCtv cameras that are recording the streets and sidewalks and storing it all...about a year and half ago i was
reading local beverly hills paper and there was a story that talked about how beverly hills is striving to be the SAFEST CITY in the US and how
within 5 years every inch of street and ally will be CCtv and how it senses motion and will be able to tell the difference of a human creeping
instead of a raccoon or cat walking around at night..oh and also the use of the wonderful ALPR that all their cars now have and now more and more LAPD
cars on the road with aswell as la county sheriff's ..incase you aren't aware of what that is it's the AUTOMATIC LICENSE PLATE RECOGNITION software
that captures the license plates of every car that it passes even one's going the opposite direction..it takes snapshots of the plate and runs it
through the hot sheet database of course ..but it also picks up 'hits' if the car's registration has been suspended if the r/o is wanted or their
license is suspended..i find this to be the very end of rights and privacy.....here's a demo on youtube and some other links showing us how fucked we
are letting ourselves become..
..http://www.youtube.com/watch?v=itolga3Hi8c
http://sheriff.lacounty.gov/wps/portal/lasd/!ut/p/c5/04_SB8K...
http://sheriff.lacounty.gov/wps/portal/lasd/!ut/p/c4/04_SB8K...
http://sheriff.lacounty.gov/wps/portal/lasd/!ut/p/c4/04_SB8K...
you know last year i got pulled over and didnt have my license on me and the lapd officer got all excited to get to use his new toy that had me just
put my index finger on a little tiny pad and with a minute they had pulled me up off my print...its all bad and getting worse..
|
|
quicksilver
International Hazard
Posts: 1820
Registered: 7-9-2005
Location: Inches from the keyboard....
Member Is Offline
Mood: ~-=SWINGS=-~
|
|
Britain has a shit-load of cameras; perhaps way more than LA. but your point is well taken.
A method (not a complete answer) to reduce the effectiveness of many systems was to use a transparent covering over the plate which cannot be
determined to be against code. Almost anything can reduce the effectiveness of these systems, including heavy rain (wet plates) drops of mud
(recognition software pulls too many hits & is forced to "choose") therefore defaulting, etc. The transparency often (but not always) reduce
legibility due to glare. The companies that sell these systems push for privacy intrusion based on the LE "force multiplier" sales pitch: which you
heard in the video.
One of the major problems is the "probable cause" element that it introduces into traffic stops. ....Making a situation worse by introducing a "cried
wolf" phenomenon into a really serious man-hunt.
[Edited on 13-7-2010 by quicksilver]
|
|
franklyn
International Hazard
Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline
Mood: No Mood
|
|
Halloween all the time , will masks become fashionable ?
http://money.cnn.com/video/technology/2011/10/05/t-ts-iphone...
.
|
|
IrC
International Hazard
Posts: 2710
Registered: 7-3-2005
Location: Eureka
Member Is Offline
Mood: Discovering
|
|
EU Parliament Member Proposes ‘Black Box’ to Trace Citizens’ Web History
http://www.theblaze.com/stories/eu-parliament-member-propose...
Europe's version of big brother?
"Science is the belief in the ignorance of the experts" Richard Feynman
|
|
franklyn
International Hazard
Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline
Mood: No Mood
|
|
Your stuff isn't yours to sell - all your stuff belong to us. Will this be the end of Ebay ?
www.marketwatch.com/story/your-right-to-resell-your-own-stuf...
" The more numerous the laws, the more corrupt the state."
-Tacitus - AD 69
.
|
|
Morgan
International Hazard
Posts: 1694
Registered: 28-12-2010
Member Is Offline
Mood: No Mood
|
|
"It is the definition of “observe” in this case that will blow your mind, though."
http://www.extremetech.com/extreme/146909-darpa-shows-off-1-...
|
|
SM2
Hazard to Others
Posts: 359
Registered: 8-5-2012
Location: the Irish Springs
Member Is Offline
Mood: Affect
|
|
Yep, it's been like that in UK for quite some time. Longer in some Scandinavian countries, I would guess. In W. Germany at the time, there were some
local revolts against it.
Part of the impetus for this is the re-gentrification of inner cities. I can still remember like it was yesterday, when Hoboken and Jersey City were
basically slums, or mob only zones. Yuppi yippy yuppi BigApple, NyNy uses to
imply Manhattan only.
oh, I forgot to say, Guten Morgan!
[Edited on 28-1-2013 by SM2]
|
|
Morgan
International Hazard
Posts: 1694
Registered: 28-12-2010
Member Is Offline
Mood: No Mood
|
|
The Threat of Silence
http://www.slate.com/articles/technology/future_tense/2013/0...
|
|
franklyn
International Hazard
Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline
Mood: No Mood
|
|
www.wired.co.uk/news/archive/2013-05/28/password-cracking
www.wired.co.uk/news/archive/2013-05/28/password-cracking/pa...
www.wired.co.uk/news/archive/2013-05/28/password-cracking/pa...
_______________________
www.dailymail.co.uk/sciencetech/article-2331984/Think-strong...
.
|
|
franklyn
International Hazard
Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline
Mood: No Mood
|
|
Back in the heday of seruptitious bugging, before everyone got in on the act,
a small appliance that attached to a phone called an "infinity transmitter" or
"harmonica bug" allowed one to dial that phone and with the appropriate tone
disconnect the ringer " hookswtich bypass" so that one could eavesdrop on nearby conversation.
Now this feature is built in to your cell phone
www.zerohedge.com/contributed/2013-06-24/single-most-importa...
.
|
|
AndersHoveland
Hazard to Other Members, due to repeated speculation and posting of untested highly dangerous procedures!
Posts: 1986
Registered: 2-3-2011
Member Is Offline
Mood: No Mood
|
|
I have long suspected that protecting against child pornography will just be used as an excuse for the government to consolidate direct control over
the internet. "Think of the children!"
We have heard that before.
The EU would just love to regulate the internet, I have no doubt. They have a history of trying to silence historical, scientific, and social
opinions they do not like. Similar mentality to the former Soviets in many ways.
[Edited on 24-6-2013 by AndersHoveland]
|
|
phlogiston
International Hazard
Posts: 1379
Registered: 26-4-2008
Location: Neon Thorium Erbium Lanthanum Neodymium Sulphur
Member Is Offline
Mood: pyrophoric
|
|
[Edited on 24-6-2013 by phlogiston]
-----
"If a rocket goes up, who cares where it comes down, that's not my concern said Wernher von Braun" - Tom Lehrer
|
|
franklyn
International Hazard
Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline
Mood: No Mood
|
|
Your phone software has hidden capabilities _
www.businessweek.com/articles/2013-07-03/security-enhanced-a...
Historically _
www.heise.de/tp/artikel/5/5263/1.html
.
|
|
Fantasma4500
International Hazard
Posts: 1681
Registered: 12-12-2012
Location: Dysrope (aka europe)
Member Is Offline
Mood: dangerously practical
|
|
about technology:
some druggies i know, because obvs. pretty much anybody at my age are deep in drugs because thats fashionable, showed me one thing, they are agaisnt
the law because drugs, so some good thing the drugs do
anyhow..
if you take illuminati
spell it backwards
itanimulli
then it was .net .com or .org
seemingly i cant get it to work now..? it worked for 2 months straight i remember
now what this thing did was that it went straight to US' government site, the actual site, not some knockoff
some might say this is somewhat small time propaganda, anyhow if a mirror site was created i would believe that they would be notified about it and
cancel it immediately, so i find this unlikely
the people doesnt know what power they posess, after all powerful men are people like the people
the government is people controlling people
|
|
ElectroWin
Hazard to Others
Posts: 224
Registered: 5-3-2011
Member Is Offline
Mood: No Mood
|
|
http://itanimullihoax.wordpress.com/
|
|
franklyn
International Hazard
Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline
Mood: No Mood
|
|
www.sovereignman.com/personal-privacy/think-your-password-is...
Review
http://www.sciencemadness.org/talk/viewthread.php?tid=7144&a...
.
|
|
franklyn
International Hazard
Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline
Mood: No Mood
|
|
As nasty as they come
Ransomware denies you your computer files and for a fee will restore their use.
I do not think it came from here , and do not know the source of this pestilence.
But given the number of members here it is probable some will succumb also.
Cryptorbit is the name of the thing which slayed me. It encrypts all manner of
data files undetected in the background then announces it's deed with three 2 kb
files in every folder it's visited. See the .gif , .htm , .txt , inside the
Additionally I include a screen capture .jpg of the extortion site you are told to visit
to make your payment in Bitcoin ~ $ 600 , through Tor. , and just to mock one
all the more they provide a link ( I highlighted in yellow with red border ) to a
youtube video - www.youtube.com/watch?v=WV3wzN3OV2I
Cryptolocker works the same way , this explains how and precautions to take.
www.youtube.com/watch?v=cYVqJ0N0FDY
http://blog.teesupport.com/infected-by-cryptorbit-ransom-vir...
www.bleepingcomputer.com/virus-removal/cryptorbit-ransomware...
The tool available from bleepingcomputer does not restore my files , likely because
as Kaspersky states below about Cryptolocker , it now fully encrypts the whole file
not just it's header as told in the next account at Malwarekillers. Terminating the
infestation as fast as possible is the best one can do.
http://blog.kaspersky.com/cryptolocker-is-bad-news
www.malwarekillers.com/how-to-decrypt-cryptorbit-files
www.pelstar.com/big-mikes-blog
N O T E : The support for Windows XP with Service Pack 3 ends April 8, 2014
Now is a good time to install the operating system again and start fresh
<!-- bfesser_edit_tag -->[<a href="u2u.php?action=send&username=bfesser">bfesser</a>: deleted
upload]
[Edited on 17.2.14 by bfesser]
Techniques to Disrupt, Deviate and Seize Control of
an Internet Forum In case you wonder W T F ! is going on here
?
www.zerohedge.com/contributed/2012-10-28/cointelpro-techniques-dilution-misdirection-and-control-internet-forum https://web.archive.org/web/20120814124000/www.washingtonsblog.com/2012/08/the-15-rules-of-internet-disinformation.html
___________________________________________________________________________________________________________________
___________________________________________________________________________________________________________________
___________________________________________________________________________________________________________________
|
|
bfesser
Resident Wikipedian
Posts: 2114
Registered: 29-1-2008
Member Is Offline
Mood: No Mood
|
|
I deleted the .zip file you uploaded—<em>please don't upload files from virus-infected machines.</em>
|
|
roXefeller
Hazard to Others
Posts: 463
Registered: 9-9-2013
Location: 13 Colonies
Member Is Offline
Mood: 220 221 whatever it takes
|
|
At least those guys are putting their creative talents to a remuneration scheme and getting paid for their handiwork. In a way they are being honest about their highway robbery. I can pay them to free
my ransomed computer, or I can pay norton (annually) to 'free' my yet-to-be-ransomed computer. Now the malware writers are getting a cut of the
market share. Either way, owning a computer is a depreciating scenario, financially that is.
It's hard to polish a terd.
|
|
franklyn
International Hazard
Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline
Mood: No Mood
|
|
This time we were lucky
http://easysyncbackup.com/decryptorbit
www.bleepingcomputer.com/forums/t/517689/howdecrypt-or-crypt...
.
|
|
aga
Forum Drunkard
Posts: 7030
Registered: 25-3-2014
Member Is Offline
|
|
Hello ?
Did ANYONE ever think any of this easy-to-hack crap was ever Secure Ever ?
Windows wasnt designed as Insecure, it was/is just crap programming, and the Idea of security was an add-on that came after the money deluge began.
Every single bit of data you transfer goes *somewhere* on it's way from you to them or vice versa (i.e. Internet)
Where the data goes is Beyond Your Control.
Due to the inexplicable ineptitude of M$, your computer is also vulnerable to Smarter people simply finding a Hole, poking through it, and then taking
absolute control over it.
To be fair, M$ isn't the Only OS provider with Holes, just they get more heavily targetted, and seem to have a surplus of holes.
ALL safety is an Illusion.
Regarding Your Computer data, there is no Safety or Security at all.
[Edited on 22-6-2014 by aga]
|
|
Pages:
1
2
3
4 |