Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - PiZZ4

Pages: [1] 2
1
Hardware / Re: [HELP] Low Budget Laptop
« on: August 06, 2013, 10:02:33 pm »
Just a quick mention; if you are planning to load Linux on the laptop make sure that the hardware is supported. Here is a great website with Linux compatible laptops. It's a little expensive though. Also Dell makes good Linux friendly laptops.

https://www.system76.com/laptops/

2
Operating System / Re: Which Linux flavor should i go with?
« on: March 12, 2013, 02:30:31 am »
Will keep in mind, thanks.

And yeah, not sure if it was graphics but i had to download new AMD drivers because my fan was always on full speed. The drivers made it ran at normal speed.


The driver support for AMD cards in Linux is some what, poor. I tried switching myself but the drivers were unstable in Ubuntu. I've been reading around and it looks like Nvidia might have better driver support but I haven't test this out myself.

4
Found it on the Webs / Re: Tor Is Useless
« on: June 27, 2012, 04:58:04 am »
As an alternative, I use i2p2.

http://www.i2p2.de/

5
Anonymity and Privacy / Re: Need help regarding torrentz downloading
« on: March 23, 2012, 12:47:45 pm »
I2P has a built-in torrent client. I don't know if they have a portable version of the software.   

6
Tutorials / Re: Hacking WEP with Backtrack4 Final and Airoscript
« on: February 22, 2012, 06:17:25 am »
Crack WEP:
Code: [Select]
http://lifehacker.com/5305094/how-to-crack-a-wi+fi-networks-wep-password-with-backtrack
Crack WPA:
Code: [Select]
http://lifehacker.com/5873407/how-to-crack-a-wi+fi-networks-wpa-password-with-reaver
Videos:
Code: [Select]
http://www.securitytube.net/
Videos are fun to watch but reading about the subject, either it be an book on cracking WEP passwords or an article about sql injection, will help in your learning process. Take it from someone who's been there before.

7
Android / Re: WiFiKill - kill those damn network hoggers
« on: January 31, 2012, 08:57:04 pm »
Just adjust the QoS settings on the router if you want to restrict or block network hoggers. 

8
Tutorials / How to create a hidden volume with TrueCrypt
« on: January 29, 2012, 11:27:27 pm »
 Today I'm going to show you how to create an encrypted hidden container volume using Truecrypt.
What is a hidden volume?

   Lets say that you have some very sensitive files that is encrypted on your computer and someone (roommate, government, someone with a gun) wants to look at those files. However, you do not want to release those files but instead show them a different set of files that are similar (or fake). You then can release a different password to them that will only show them the other non-sensitive files keeping the real files safe from exposure.

So how does this work?

   We are basically creating a virtual hard drive that has two parts, a outer volume and hidden volume. Each volume will have a different password, and you may only access that volume with the matching password.

+++++++++++++++++++++++++++++++++++++++++++++++
+                                                    +
+                                                    +
+                  Outer Volume                  Hidden Volume +
+                  Password:123456           Password:654321
+                                                    +
+++++++++++++++++++++++++++++++++++++++++++++++

To get started download your copy of TrueCrypt here:
Code: [Select]
http://www.truecrypt.org/ and install it on your computer.

Once installed, open the volume manager:


Then click on Create Volume, this will start the wizard.



The first step is to select what kind of volume you want to create. You can use this program to encrypt an entire hard drive or just a small container volume. Today we are going to select "Create an encrypted file container" then click next.



For volume type click on "Hidden TrueCrypt volume", then click next.



For the creation mode we will be creating a new volume so click on "Normal Mode", then click next.




For this step we are going to name and save the file. You can save the container file anywhere on the hard drive. Once finished click next.




Now we are going to create the outer volume.



For this step you can choose any encryption algorithm that best suits you, for this demo I'll choose AES-TwoFish, then click next.

 


Now for this step, depending on how much hard drive space that you have or the size of the files that you want to have encrypted, you can make the volume as big or small as you want. Keep in mind that you would want to use an 50/50 approach when creating the volumes. For example, if you create an volume that is 100 GB use 50 GB or the outer volume and 50GB for the hidden volume. For this demo I'll create a volume with 500MB of space. Once finished, click next.



Now create a password that will be used to access the outer volume. You can choose a weak password since this is not the hidden volume.



Next we are going to format the volume using a FAT filesystem, then click on format.



Once that is complete, click next.




Like I said before we are going to an 50/50 approach. So, we are going to make the hidden volume half the size of the whole volume. Then click next.



Now it's time to create the password for the hidden volume. MAKE SURE YOU USE A STRONG PASSWORD!!! For this demo I'm using "654321."



Once you finish creating the hidden volume exit out the wizard to go back the volume manager. Next, click on the Select File... button then open the container file at the location where you saved it. Then click on the Mount button




A pop will show up asking for the password, but we are going to click on Mount Options... first.



In the mount options menu check the box "Protect hidden volume against damage caused by writing to outer volume." Then type in your password for the hidden volume. This option will prevent any information from begin overwritten on the hidden volume by anyone (system or user) writing files on the outer volume.
Then click ok




Then type in your password for the outer volume and click ok. You now opened the outer volume. You can store some files non-sensitive here. Once finished go back to the volume manager and dismount the volume.

Then select the container file again and mount the drive. When the pop-up prompts you for a password, enter the password that you created for the hidden volume. Now you have access the the hidden volume.   




 

9
General discussion / Re: Megaupload is back , or is it?
« on: January 21, 2012, 04:10:12 pm »
The foundation of sites such as Megaupload are the illegal files,Docs&videos which are hosted & kept of their servers.
How much time is left until they will take down Rapidshare , Mediafire , fileflyer , Zippy
and much more?
think about it , even Youtube is hosting music\videos and information.



They were paying users to upload illegal content without any regulation. That's why rapidshare stop their reward points program.

10
Anonymity and Privacy / Re: A question about using socat
« on: January 21, 2012, 04:04:34 pm »
I've found a solution to my problem using a different method using privoxy. Here is a link on how to do so.

Code: [Select]
http://www.binbert.com/blog/2011/06/how-to-install-tor-on-backtrack-5/

11
General discussion / Re: TuneUp Media There a Crack?
« on: December 26, 2011, 07:45:30 pm »
Try Data Drow, it's free.



12
Hardware / Re: New Computer for Christmas?
« on: December 26, 2011, 07:32:45 pm »
Don't forget about cooling, I suggest getting a liquid CPU cooler something like this.

And for the case I'll get something like the NZXT Phantom.

13
Hardware / Re: New Computer for Christmas?
« on: December 26, 2011, 03:44:09 pm »
I'm looking at getting something with like 16 GB of DDR3 ram and an i7 core processor, but I'm utterly clueless as to what kind of graphics card to get. I never really learned much about graphics cards than I did about processors and RAM. Care to point me towards a good one? Or better yet  http://www.tigerdirect.com/applications/SearchTools/item-details.asp?EdpNo=893897&sku=C122-10650 tell me if that's a good buy or what's horrible about it/how it could be remedied.

Ugly case is ugly... :D

First off you don't need 16GB of RAM, in fact your probably going to use about less than half of that. So don't waste your money on that, I knew a friend that did.

Now for the blue-ray drive, my belief is that the blue-ray (or any disc media) is going to die off in a couple of years. I'll only buy blue-ray optical drive unless I'm build a system for my home theater. But you can buy it if you want too its your choice. 

Also just wait a little bit after January and February to purchase an HDD or a SDD since the prices will be cheaper then. This whole hard drive shortage is driving prices up.

Well those are my two cents....

14
Anonymity and Privacy / A question about using socat
« on: December 26, 2011, 01:12:33 am »
From what I've read and understand to create a  tunnel (or pipe, whatever) with socat through tor you use something like this:
Code: [Select]
socat TCP-LISTEN: SOCKS4A:localhost::80,socksport=9050
Is this the right way, or is there another way to use socat as a listing port for tor.


Edit: From what I just learn you cant send HTTP requests through port 9050 only 8118, so I was wrong from the beginning or I just looked up the wrong tutorial. 

15
Anonymity and Privacy / Tails
« on: September 25, 2011, 04:17:43 pm »
Quote
Tails is a live system: a complete operating-system designed to be used from a CD or a USB stick independently of the computer's original operating system. It is Free Software and based on Debian GNU/Linux.
Tails comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc.

Code: [Select]
http://tails.boum.org/index.en.html

Pages: [1] 2