Jump to content

<<< 12Oz Computer Tech Support SuperThread >>>


Mainter

Recommended Posts

Originally posted by johnny ballbags@Mar 3 2006, 02:17 PM

wtf?

 

do you see this really happening?

if so will there be ways to have some bootleg internet type shit goin on?

 

 

yes this will happen in my liftime for sure and yes there are ways to get around they been waiting for this to happen sense the beginning the program is called black angel

 

here is the artical

 

Black Angel

 

Black Angel is a software product, which we, (and our beta testers) believe is going to have a significant impact on the Internet, and it's users. After Black Angel is released, you can expect to see most Internet Service Providers and other administrators of multi-user systems, ganging up on the authors and any distributors of the code, Black Angel.

 

Imagine having the ability to control anyone, anytime, anywhere? Imagine, using the Internet without ANYONE tracing anything back to you, executing your actions, your mind, and your thoughts, without the FBI breathing down your neck. Black Angel will give you an assortment of capabilities, without the identification. You can become fully anonymous, in any type of Internet related activity, but with more power then you could ever imagine! Some functionality which is being included has never been implemented before, or, has not been implemented in the scope that it will be in Black Angel. No, this is not fiction - this is real.

 

Have you heard of the freedom project? Well, for those of you who have asked us if we are associated with freedom, the answer is no! We observed their services, and were dismal. Freedom servers are "static" predefined servers around centralized locations. They feed your activity through those servers, to apparently make you anonymous. These servers are known, and web developers and ISP's are now blocking most, rendering their services useless. In addition, Freedom charges you, if you want to use their services. They have your credit card details, and they call it anonymity. Well, comparing freedom to Black Angel would degrade the value of Black Angel!

 

Why are we so silent about Black Angel? Because others are going to try to implement our ideas, and in the process, they may unintentionally degrade functionalities in their attempts. Therefore, we have agreed to keep silent until the software is actually released, and we are going to make sure that only the talented programmers play apart in the development of Black Angel! We have the ideas, now the software's standards, and the codes, much match the unique underlying concepts of what it has to offer.

 

We are only telling you what our beta testers have told us. We are not interested in promoting the software, today, we are only interested in informing those interested and curious in Black Angel development, and it's implementation. We do not know when it's going to be released, but we are hoping it should be available this year.

 

If any Trojan or Anonymity tool on the Internet has impressed you, then we believe you would greatly appreciate the code put into this project! Black Angel is not really a Trojan, it's an anonymity tool with other Trojan style features, which contains (both in Trojan and anonymity sections) never before released, exposed or exploited code. The software is not designed to assist 15-year-old kids for playing petty little games with their friends. It won't have any lame functions such as moving the mouse, flipping the screen (etc). It is serious software, for serious people, if you're interested in playing games, go somewhere else.

 

Additionally, you may do a search on Black Angel if you would like more information, or you can read sans.org's views, and my extracts at the Sans Education and Research Organization (scroll down to theNew Trojan in the Wild section).

 

We suggest you get Black Angel out of your mind for now, put it in the back of your head, and throw it in the subconscious mind - you'll be aware when it's released, I assure you.

 

Regards,

 

 

*************

Link to comment
Share on other sites

This forum is supported by the 12ozProphet Shop, so go buy a shirt and help support!
This forum is brought to you by the 12ozProphet Shop.
This forum is brought to you by the 12oz Shop.

World's largest Windows error message

error2006-02-20.jpg

 

We went down to New York for the long weekend. Despite the 16-degree weather, we walked down to Times Square - all the bright lights lured us the ten blocks from our hotel. When we got there, we stood like, well, tourists, gaping at all the electronic billboards. And then, across the square, I saw it: the world's largest Windows error message - on a two-story high e-billboard (I guess everything really is bigger in New York). It was the only billboard in the entire square with absolutely no movement - since the PC running it had obviously frozen.

 

error22006-02-20.jpg

 

http://www.networkworld.com/community/?q=node/4630

Link to comment
Share on other sites

Songbird - The Music/Web Player

 

download it here http://www.songbirdnest.com/

 

Songbird was built from Mozilla’s popular open source (that means free to use and modify) web browser, Firefox. It will run on Windows, Mac OS X and even Linux.

 

Because Songbird is open source, it has some added features that are different than the popular players seen today.

Link to comment
Share on other sites

microsoft cannot make up there own ideas everyone knows gmail the google email service

 

well sense they are trying to get back the market share of search engines microsoft has came up with a orginal idea all by themselves /HAHAH yeah right!!!

 

http://ideas.live.com/programpage.aspx?ver...2b2e6d&GT1=7936

 

• Previews of your messages you can read without leaving your inbox

• Drag-and-drop organization

• One-click control over junk and scam e-mails

• Right-click power—reply, delete, and forward

• 2 GB of storage (2 GB = 2,000,000,000 bytes)

• Learn more about the features of Windows Live Mail beta

 

you know damn well with this serive now they just opened 100 more security holes

 

happy hacking

Link to comment
Share on other sites

just putting microsoft tools in here for the hell of it http://www.ideas.live.com/programpage.aspx...9b-33c2d53ac53b but just to let you know its just to spy on your usage so i do not recommend downloading it

 

What it is:

An automatically self-updating PC care service that runs quietly in the background. It helps give you persistent protection against viruses, hackers, and other threats, and helps keep your PC tuned up and your important documents backed up.

What it does for you:

• Runs quietly in the background, providing anti-virus and firewall protection

• Updates itself to help you keep ahead of the latest threats

• Runs regular PC tune ups

• Provides one-click solutions to most problems

• Makes back-ups a breeze

• Lets you see the status of your system at a glance

Link to comment
Share on other sites

Msconfig Tutorial, Microsoft System Configuration Utility

 

How to use MSConfig properly in Windows XP

 

How to access msconfig ==> Start ==> Run ==> type: msconfig ==> Click 'OK' or hit Enter

 

This will start something called the Microsoft System Configuration Utility aka msconfig. You will have 6 tabs. General, SYSTEM.INI, WIN.INI, BOOT.INI, Services, and Startup. Each of these tabs has their own purpose.

 

General Tab

 

Here you have the choice of what you want loading when your machine boots up. There are three choices:

 

Normal Startup - This will load all device drivers and services.

Diagnostic Startup - This will load only the basic devices and services (Good for trouble shooting)

Selective Startup - This allows you to choose what you want to be loaded at bootup depending on the configurations you have set. (Note: Selective startup is for advanced users and can be used for troubleshooting)

 

SYSTEM.INI Tab

 

This is a configuration file that tells the machine what system aspects to load. I highly recommend not touching this tab.

 

This file is used to initialize Windows system files. Such as, the fonts, keyboard, language and various other settings. It is located in the Windows directory.

 

WIN.INI Tab

 

Once again this is a configuration file that tells the machine what system aspects to load. I highly recommend not touching this tab.

 

This file is located in the Windows directory, and is used to load various settings when Windows boots. Such as, communications drivers, wallpaper, screen saver, languages, fonts, etc... These are all loaded when the file is initialized. However, if this file becomes corrupt, Windows may not load or if it does, it will have many errors.

 

BOOT.INI Tab

 

The boot.ini is a file that tells the machine what to boot to when you startup the machine. Usually it doesn't need to be touched unless you install another hard drive and make a dual boot system. Another time you may need to edit it is when you take out a hard drive from a dual boot system, you will still see the option to boot to that hard drive even though it really isn't there. Then you would go to the boot.ini and take out the line for the hard drive that no longer exists. Just be careful when you do, you don't want to remove the wrong line. If you do happen to delete the wrong line, don't panic, all you need to do is restore the boot.ini, follow these directions to restore the boot.ini. (Note: This will work on any Windows OS that contains a boot.ini - if you have the XP CD.)

 

1. Insert and boot from your WindowsXP CD.

2. At the first R=Repair option, press the R key

3. Press the number that corresponds to the correct location for the installation of Windows you want to repair. Typically this will be #1

4. Type bootcfg /list to show the current entries in the BOOT.INI file

5. Type bootcfg /rebuild to repair it

6. Take out the CD ROM and type exit

 

A good rule of thumb from what I have seen is usually the boot.ini file lists the OS's in the order they appear when you boot up and have the choice which to boot to. So for example, here is my old boot.ini when I had a dual boot XP system.

 

[boot loader]

timeout=30

default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS

[operating systems]

multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Home Edition" /fastdetect

multi(0)disk(0)rdisk(1)partition(2)\WINDOWS="Microsoft Windows XP Home Edition - Old" /fastdetect

 

When I boot up the machine I would have the choice to go to:

 

Microsoft Windows XP Home Edition

Microsoft Windows XP Home Edition - Old

 

So if you look at the boot.ini they are listed in the same order as they are listed in the boot up menu. Therefore, if you removed the Old OS and you wanted to keep that option from showing up during boot up, you could just removed that entry for the old OS install. Another good idea is to label the OS's like I did with something like Old at the end so you know which one is which.

 

More Boot.ini information can be found here:

http://support.microsoft.com/?id=102873

 

Services Tab

 

I do not recommened using msconfig to disable services. Instead I recommened going into services.msc and disabling the services you don't need that way. How to access services.msc ==> Start ==> Run ==> type: services.msc ==> Click 'OK' or hit Enter

 

Startup Tab

 

Here is a list of the programs that load on startup. Some are needed, some are not. I don't recommened disabling the ones you aren't sure about. If you aren't sure what it is, either leave it or research the file name and see what it is and see if you actually need it to load at startup. In fact, I actually do not recommend using msconfig to disable startups, what I do recommend is a program called Starter. It goes more in depth for startup programs and is safer for disbaling startups, check it out CodeStuff Starter.

 

Troubleshooting with MSConfig

 

Before you start a troubleshooting session, you can use the System Configuration utility to initiate a System Restore operation. To do this, click the General tab, and then click Launch System Restore. You can then create a restore point that you can use to restore your computer to a previous state.

 

The System Configuration utility automates the routine troubleshooting steps that Microsoft Product Support Services Support Professionals use when they diagnose system configuration issues. When you use this utility to modify the system configuration, you can select check boxes to eliminate issues that do not pertain to your configuration. This process reduces the risk of typing errors that you may make when you use a text editor such as Microsoft Notepad. You must be logged on as an administrator or as a member of the Administrators group to use the System Configuration utility.

 

Tech Guru

Link to comment
Share on other sites

If you've elected to upgrade all of your equipment and do not have devices on your network that do not support WPA functionality, you can set up a honeypot to distract would-be intruders if you are in an environment prone to war drivers or neighborhood snoops. A honeypot is a fake target that deters hackers from locating your real network. Take an old 802.11b access point and:

 

1.

 

 

Set the SSID to something different than what you are using in your new WPA capable access point or router.

 

2.

 

 

Use a channel at least 5 channels away from the channel you've set on the new access point or router to avoid interference.

 

3.

 

 

Place it near an outside window.

 

4.

 

 

Plug it in to a power outlet, but don't connect it to your network.

 

5.

 

 

Don't point any of your wireless computers or devices at this device.

 

You've just built a honeypot. This may engage casual (but not determined) snoops and neighbors. If you live in an area that is densely populated, you may need to experiment with channel settings because you could find that there are not enough available channels to implement this.

Link to comment
Share on other sites

PC Support

Get all your Windows, Hardware, Networking, and software support questions answered here

 

PC Tips and Tricks, Modding

 

Linux/Unix Support

Get all your Linux/Unix questions answered here

 

Linux/Unix Tips and Tricks

 

Mac Support

Get all your mac questions answered here

 

Mac Tips and Tricks

 

Electronics

Get all your questions on MP3 players, Digital Cameras, Digital Video Cameras, TV's, etc. answered here

 

its all up to you of what you want on this thread so post your questions and suggestions

Link to comment
Share on other sites

you know i have to give both sides of the story

 

 

Anti Honeypot Technology

 

What is Anti-honeypot technology?

 

lTools that are used to identify honeypots

 

lFor example “Honeypot Hunter�

 

Effects on honeypots

 

lIf a honeypot is detected, users can attempt to bypass detection

 

lHoneypot can be attacked if detected

 

lThe honeypot could be used to attack other systems

 

More effects on honeypots

 

lPrevents honeypots from collecting valuable information

 

lHoneypot itself loses effectiveness of being a covert system once compromised

 

lGives attackers more characteristics to identify honeypots

 

Characteristics of identifying honeypots

 

lFinding honeypots is a difficult process

 

lAttackers look for differences between a real system and a honeypot representation of a system

 

lHoneypot systems typically limit outgoing bandwidth and the outgoing number of connections

 

lAlters outbound packets to prevent attacks

 

Connection Limiting

 

lHoneypot will count the outbound connections within a period of time.

 

lOnce the threshold is reached the new outbound connections are denied

 

lOne of the most easiest characteristics to detect

 

lSimply open up 10-20 websites and see if the connection is blocked

 

 

 

Outbound packet alteration

 

lModifies packets that are believed to be of an exploitive nature

 

lHoneypots compute a hash of portions of the packet

 

lReturns a response based on the hash

 

lAttacker expects to receive a known response but instead receives a modified response from the honeypot

 

Send-Safe Proxy Scanner

 

lSend-Safe’s proxy scanner searches for multiple open proxy servers for obscuring a spammers identity.

 

Honey Pot Hunter

 

l“Send-Safe Honeypot Hunter is a tool designed for checking lists of HTTPS and SOCKS proxies for so called “honeypots�. “Honeypots� are fake proxies run by the people who are attempting to frame bulkers by using those fake proxies for logging traffic through and then send complaint’s to one’s ISPs�

Honeypot Hunter

 

Honeypot Hunter

 

lThe first commercially available honeypot detection tool

 

lHoneypot hunter tests open proxy connectivity

 

lIt classifies the proxy as:

 

nSafe(good)

 

nBad(failed)

 

nTrap(honeypot)

 

How Honeypot Hunter works

 

lOpens a false mail server on the local system using port 25 to test the proxy connection

 

lHoneypot hunter attempts to proxy back to its own false mail server

 

lThis approach identifies most invalid proxies and honeypots.

 

 

 

Other tools

 

lVarious noncommercial code used to identify honeypots

 

lSebek.c , sebek-find.c , unsebek.c, vmware_detect.s

 

lThese tools exploit vulnerabilities in popular honeypot systems like Sebek, Honeyd and VMWare

 

Honeypot timeline

 

l1. Honeypot

 

l2. Honeypot Detection Tools

 

l3. Anti Honeypot Detection tools

 

l4. Anti Anti Honeypot Detection tools

 

lWill the cycle ever end?

 

Conclusions

 

lHoneypots are a great way to observe, identify and capture potential attackers.

 

lThe effectiveness of honeypot technology only exists if it is unknown to the attacker

 

lHoneypot administrators must make every effort to avoid being detected (eg. Changing default error messages)

 

 

 

Conclusions….

 

lEssentially, the honeypot technologies must remain secret in order for them to be effective in the field.

 

lHoneypot program writers must continually update and change their program to avoid being identified by attackers.

Link to comment
Share on other sites

if you want to steal your neighbors wireless signal

 

 

certain names are a giveaway that a network probably won't be password-protected.

 

Look for "linksys," "default," "Wireless," "NETGEAR," "belkin54g," and "Apple Network 0273df." These are the default network names for the most popular wireless routers. If a network owner hasn't taken the time to change the default name, that's a good clue that they probably won't have a password either.

Link to comment
Share on other sites

You can tell that you've successfully joined a wireless network when your laptop's IP address changes as it's assigned a local number by the network's router. To watch it happen on a PC, keep the Network control panel in Windows open; if you have an Apple notebook, look at the Network section of the System Preferences program. (And if you're running Linux, I don't need to tell you where to look.) Once your laptop has an IP address, your next hurdle is getting DNS to work. DNS stands for Domain Name Service—it's what translates Internet domains like "slate.com" into IP addresses like 207.46.141.216. On most networks, DNS works automatically. But if you get a browser error like "Cannot find server," go back to your network menus and configure your laptop to use a public name server—144.162.120.230 in Dallas, for instance.

 

Once DNS is working, you should be good to go. While you should be able to surf the Web with no problems, you may have trouble sending mail from Outlook or other desktop programs because of restrictions on e-mail routing that have been set up to stop spammers. If you have problems, just use a Web-based mail service like Hotmail or Gmail instead.

Link to comment
Share on other sites

Keep in mind that the neighbors may not be thrilled that you're sharing the line. One guy next door to my new building shut off his network the day after I moved in, probably because he got spooked by all those blinking LEDs on his router. Even neighbors who are happy to share may see you in a different light if they check their router's URL logs and find a few hundred hits on porn sites. While your browsing will show up under an anonymous address, the short range of Wi-Fi means that they'll at least be able to figure out that one of the laptop owners within 100 feet

Link to comment
Share on other sites

Since everyone isn't as eager to share their network as I am, it's only fair to explain that there's an incredibly easy way to keep neighbors and drive-by geeks off your network. All you have to do is set a password that isn't as obvious as "1234." There's an eye-glazing list of Wi-Fi security measures you can implement to block overachieving Russian teens from monitoring your keystrokes, but in real life the only people sniffing your wireless signal are jerks like me who need a place to log on until the phone company wires the apartment. An unguessable password sends as clear a message as a shot of Mace: Go find a Starbucks,

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...