Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - straycat

Pages: [1] 2
1
Anonymity and Privacy / Re: Route all traffic through tails?
« on: January 14, 2016, 12:15:44 am »
You realize that tails by default sends all connections through tor? Also I don't suggest using your real life identity all over tor there's no need for it. I respect the "I need privacy" bit but judging from the things you've said you really don't. The other problem I see with sending ALL of your traffic through tor is how many legit services and websites block all tor usage.

So take some time and read up about what you're wanting to do and decide if there's a real need for it. I highly doubt after a bit of research you'll still want to go through all the work.

2
General discussion / Re: What Inspired You?
« on: December 17, 2015, 03:32:15 am »
Growing up poor having to fix my things when they broke instead of buying new. Dad was a mechanic kinda instilled into me it's not that hard to open it up and figure out how it works. Got into computers and gaming as a teenager. By proxy that brought on pirating and hacking video games. So yeah being poor.

3
/bos

4
Operating System / Re: Tails
« on: December 01, 2015, 08:43:01 pm »
Depending on the level of anonymity you are seeking. Casual usage of TAILS is fine hell I'd even go as far to say you're probably fine dicking around places you shouldn't with it away from home. I do agree with the rest tho if you're serious about it and really can't afford a lapse in opsec look towards whonix.

5
Operating System / Re: So I installed Arch
« on: December 01, 2015, 05:06:54 am »
YAY I was wondering if I was gonna see something like this after last night. Pretty much did it exactly how I would tho I would've installed base packages as well. Let us know how the tweaking goes with it once you make it truly yours.

6
Beginner's Corner / Re: Kali Linux - Arguments for a little newbie!
« on: November 18, 2015, 01:39:29 am »
Why shouldnt you run it as your main OS, say Im using a old computer should I still not run it as main?

So usb boot it. I wouldn't run Kali as a main OS cause it's pointless and most of the tools you need root for. Why would you run as root full time? Just use it when you're on the job or you feel like hacking something and use a normal distro the rest of the time.

7
General discussion / Re: To porn or not to porn
« on: November 11, 2015, 06:32:46 pm »
What the fuck is wrong with you dude? How do you not like Star Wars. Is blasphemy

8
Does anyone here play it and if so how far have they come since around March I think is last time I played. Things were looking good after the Wings update I just ditched Windows in favor of Arch to encourage myself to actually get shit done.

I'm really just looking for input on whether I should get another drive and dual boot Windows and maybe come back to Elite Dangerous once the planetary landing patch hits. Will most likely be checking that out so if there is anyone who plays I'd at least like your in game name and bounty hunt or pirate with you.

9
Tutorials / Re: Shellcoing continues...
« on: November 10, 2015, 11:11:49 pm »
I don't know assembly so it's till quite a bit over my head but seems nice. Where's the porn behind your terminals tho? I thought we had an agreement.

10
Hacking and Security / Re: Hacking OS COMPARE
« on: November 10, 2015, 10:01:57 pm »
^This:

Same thing with kali, use debian+kali's repos if you need something from kali's toolkit. But with arch you might not even need those blackarch repos, because most likely AUR already has most of the stuff you need/you think you need.

I use the BlackArch repos seems like they stay more up to date than the AUR repos. Plus adding BlackArch repos is super easy there is really no reason not to add them.

11
General discussion / Re: To porn or not to porn
« on: November 10, 2015, 09:57:28 pm »
Yes you totally should just start running with porn on the background of your terminal full time.

12
oe800 is right if I remember correctly the usual targets in an attack like that would be hidden in memory that way it's actions are harder to trace. Most POS machines run off of an rdp server and that's the ticket in I believe. So attacks are most likely not going to target the card readers themselves but the rdp server or the machine that actually runs the batch and sends off all the numbers at the end of the day. I don't know shit bout chip and pin tho so I could be way off with this.

13
Beginner's Corner / Re: How a keyboard works:
« on: November 08, 2015, 11:53:44 am »
I'd like to go ahead and point out that the basic concept you laid down for us there is used in a shitload of electronics. Not just the keyboard that applies to. For instance video game controllers, keypads on anything, elevators, and literally too many devices to list. Also like to point out that you could use a piece of wire to bridge connections on a circuit board. If you were ever in a situation that you couldn't get a button press to register and had access to the board.

That was hell to read by the way.

14
General discussion / Re: Your top 10 hacker/computer related films
« on: October 22, 2015, 06:10:20 am »
Hackers
War Games
The 13th Floor ( not really hacking but kinda)
Blackhat
Mr Robot
Humans (depending on the way we're defining hacking but robots with free will I'll take it)
Serial Experiments Lain (anime but definitely counts)
The Girl with the Dragon Tattoo
Lawnmower Man
Stein's Gate ( another anime but I couldn't think of another movie to fill out the list)

15
Science / Re: CO2 explosion extinguish fire?
« on: October 21, 2015, 02:42:54 pm »
Heating a can of compressed gas is a bad idea.

https://en.wikipedia.org/wiki/Boyle's_law


Pages: [1] 2