Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - shad0wingfir3

Pages: [1] 2
1
Awesome POLYmath +1, these are great. I will be checking these out.

2
Hi, a friend of mine has an older psvita. He would be interested in jailbreaking it, but I am not familiar with the scene. Does anyone have any good resources for this?


3
Are you sure codeacademy can be considered as a resource? I prefer books to codeacademy.




I would, at least personally since it is more hands on. I guess I haven't found the right book about programming, nor do I have the experience to tell if it is a good book to learn from or not. I think my list is for quickly getting your feet on the ground. This is by no means complete. This is just what I have come across that has taught me the most over the last few weeks.

4
Its from a document I am making as I journey along my path. I can't say I will be here forever. But I see your point.  :D

5

Personal Training Roadmap


Areas:
Programming
Web application
Networking


Basic:
   Programming
Python
Javascript
PHP
   Resources
http://www.codecademy.com
http://www.python.org


   WebAppSec
XSS/CSRF/DirectoryTraversal/Jsinject/SQLi
   Resources:
http://www.evilzone.org
http://www.enigmagroup.org
http://www.hacking-lab.com
http://www.hackthissite.org
http://www.securityoverride.org
http://www.owasp.org


   Networking
TCP/IP


   Resources: http://www.tcpipguide.com/

6
General discussion / Re: Post your deskTOP
« on: September 13, 2014, 04:42:11 am »

7
General discussion / Re: Punk rock
« on: September 12, 2014, 07:18:44 am »
Check out touche amore, they are really good to.

8
General discussion / Re: Punk rock
« on: September 12, 2014, 06:51:34 am »
I think you would like Such Gold, have you tried last.fm yet? They have a really good recommendation engine. I have gotten to listen to some many new bands from their suggestions. Many of it is local talent you wouldn't find unless involved in their local scenes.

9
Anonymity and Privacy / Re: BitTorrent
« on: September 12, 2014, 06:44:13 am »
You're not very bright are you?
....
Stop assuming you have a clue, because clearly IT is not your department.

Good thing I did this whole introduction about how I came here to learn, and I was just starting off. Clearly IT is not my department, if my information was incorrect please point it out.

In regards to

1. If he's running a TOR node meaning: he's allowing others to use his computer as a jump point, they could be using that connection to download and upload TOR (This is discouraged but not at all improbable)
2. If his wireless access point has been hacked and used to download TOR files then his ISP would obviously assume he was the culprit...
3. If his system has been trojaned/rooted then just as with tor it could be used as a pivot point for downing/upping torrent files.
4. If he was running a firewall he'd be able to tell what ports are open on his system.

1) Yes this is possible, but if I remember correctly these would be the precautions you take (https://www.torproject.org/eff/tor-legal-faq.html.en), and this still doesn't take  away from the fact you assume, and accept the risks of that scenario no matter how unfair it seems.

2-3)If his wireless is hacked, you could keep track of the usage of it, and quickly determine it. This doesn't not take away the risk of getting called out by your ISP. People have had their lives ruined by hackers downloading CP through their computers, whether they were guilty or not..(now this is extreme I know) they were still responsible. If his system has been compromised, well unfortunately that does suck. There should be some indications of this intrusion, and actions taken appropriately.

4) This pretty much doesn't change what I said about the firewall keeping prying eyes from seeing his traffic....his ISP still saw or was notified of behaviors on his IP. Seeing what ports are open doesn't nothing to change that fact. And is quite irrelavent unless the former points were the cause. Then actions would need to be taken.

If any of my information is incorrect, please correct it (addressed to everybody), as yes I am new, but I am not dumb. I have torrented for years without so much as a notice, if you get hit with a notice it is still your responsibility to comply. Pirating is risky business, but this risk can be mitigated with proper precautions.

10
General discussion / Re: Punk rock
« on: September 12, 2014, 06:00:00 am »
Punk rock is my favorite kind, check out the music thread where I posted to get some really good modern punk bands.

11
General discussion / Re: 5 million GMail accounts' password leaked
« on: September 11, 2014, 09:59:49 pm »
Thanks for the heads up, my email was on the list, Google did not give me any warnings. All is well now.

12
Anonymity and Privacy / Re: BitTorrent
« on: September 10, 2014, 09:29:57 am »
1. Do you run a TOR node?
2. Do you use a wireless router?
3. Have you checked your system for malware and verified your open ports?
4. Do you have a firewall?

1) Do not use Tor to torrent...read here: https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea
2) Your wireless (unless customized for tor/proxies) router will not prevent or anonymize your traffic from ISP eyes.
3) Possibility, but highly doubt it. Still always good to check to make sure it is not a phishing attack.
4) This is not doing anything to help with the issue...unless you are trying to use a torrent client, and it is being blocked.

OP: When you torrent, unless it is free software under a non-restrictive license...you run the risk of being found out. That is the inherent danger of downloading things that have copyrights. There are two things to do here, 1) Stop torrent illegal things for a while, let it cool down. 2) When you do download, check your trackers, and use a peer block that will stop known lists of IP's used to find individuals with files illegal gotten. A good tracker will stop the brunt force of the risk associated with torrenting by auto-blocking RIAA, and other entities. A peer-block is a list or filter that blocks known bad IPs from connecting to the swarm/ more specifically you since I believe it is implemented client side.

Another option depending on the amount you do torrent, consider tor guard which will (very generally) encrypt your torrent traffic so your ISP does not see that you are downloading illegal things, but it won't stop them from knowing that you are torrenting. I believe they offer VPNs as well....also consider a seedbox.

All in all, don't be stupid. Don't torrent or open files without verifying file integrity. Check reviews of the torrent on the websites you do visit. And for the love of god employ some common sense. Check out the guides here, or Google search for ways to limit your exposure of getting caught.

13
Hacking and Security / Re: Google chrome virus HELP
« on: September 10, 2014, 06:29:48 am »
I know this bro fixed his problem, but adwares can simply be removed by uninstalling any "suspicious" named program in the installed programs list. If that doesn't cut it, I would resort to malware bytes and similar software.

Just saves you some hustles.


The problem here is not that the ad-ware program couldn't be uninstalled (if you knew what to look for), the problem comes from possible unseen malicious activities like changed registry values, web-browsing configuration changes (redirecting, and click jacking). A simple uninstallation might get rid of 1 instance of the program, if it is a worm or virus the program will be installed again. Hell the program might not even be listed if it tries to hide itself.

14
I know I will get flack for using Windows, let alone 8.1, but I game and Linux sucks when it comes to triple A releases, so beat it  ( >:( )

Anyway, my question is if 'hypothetically' your windows machine was infected with malware, and specifically got rooted, can the perpetrator infect the recovery partitions that come with a standard OEM install? Or does a factory reset legitimately destroy problems like that?

15
Hacking and Security / Re: Overly excessive restrictive corporate proxy
« on: September 08, 2014, 06:19:41 am »
I don't have any familiarity with corporate firewall/proxies, is it not possible to temporary disable it on your end while you browse? Or is it a VPN and the proxy is maintained remotely?

Pages: [1] 2