topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Thursday April 18, 2024, 2:51 pm
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Topics - gjehle [ switch to compact view ]

Pages: [1] 2 3next
1
General Software Discussion / looking for a Win XP x64 beep.sys
« on: July 08, 2013, 09:22 AM »
Hi there fellow DCers,

haven't been around in a while, but here goes :)

I'm currently looking (kind of desperately) for a copy of beep.sys from a Win XP x64 system (the x64 is crucial here, 32bit wont do).
I already found it on the net on the classic but rather shady "dll download" portals.
I'd much rather get it from someone that has a higher reputation and trust-level than randomwebsite.com ;)

So, are there any folks out there still running XP x64 and willing to share a copy of their beep.sys?
Any help is much appreciated :)

2
Hi there,
it's been quite a while since I've been truly active here with anything coding related.

I've been working with the boost library for the last weeks and really like it.  However, I've barely scratched it on the surface.
I'm now looking for a good book on the topic to get into it in way more detail.
I've already got a couple of years of C++ experience under my belt so I'm not looking for anything like the 'Dummies' series ;)
Something that covers best practices, examples, and patterns would be perfect.

So here I am, asking for your recommendations on the topic :)
Any pointers you can give me are much appreciated.

3
Adventures of Baby Cody / Baby Cody arrives in Stuttgart, Germany
« on: March 11, 2011, 01:27 PM »
Hello fellow DCers, it's been quite a while since I've last been active on the forums.
This is going to change now since I'll be reporting on Baby Cody's adventures in Stuttgart.

A few minutes ago Cody flew through the door of shackspace, the Stuttgart hackerspace.
I managed to snap a quick photo of him when he landed right in the middle of one of the electronic lab's workbenches.
 
The guys at shackspace are currently in the middle of renovating their newly acquired space and then moving their stuff from the old to the new one.  Cody kindly offered to help with the logistics and will be supervising the move!

Stay tuned for more Baby Cody news over the following days!

4
Mircryption / AES-256 less secure than AES-128
« on: August 01, 2009, 07:48 AM »


This just in from #mircryption
I'll just quote it here since lizzy didn't want to sign up just for that:

123446 <lizzy_> hi guys
123504 <lizzy_> we have a BIG problem, at the Pre-panic stage:
123523 <lizzy_> look at today's slashdot.org
123550 <lizzy_> Cryptography is all about safety margins. If you can break n round of a cipher, you design it with 2n or 3n rounds. What we're learning is that the safety margin of AES is much less than previously believed. And while there is no reason to scrap AES in favor of another algorithm, NST should increase the number of rounds of all three AES variants -- now, before there is a reason to panic.
123614 <lizzy_> At this point, I suggest AES-128 at 16 rounds, AES-192 at 20 rounds, and AES-256 at 28 rounds. Of maybe even more; we don't want to be revising the standard again and again.
123614 <lizzy_> And, even more strongly, I suggest that people don't use AES-256. AES-128 provides more than enough security margin for the forseeable future.
123614 <lizzy_> Schneier on Security: Another New AES Attack (1 August 2009)
123614 <lizzy_> http://www.schneier....another_new_aes.html
123614 <lizzy_> http://snipurl.com/ogstr
124102 <lizzy_> ..
124143 <lizzy_> i also propose that the number of rounds used be shown ,eg: AES256-16
125559 <lizzy_> see also: slashdot.org

5
Living Room / 2009/May/31 - DC/IOSx02 - DC Meetup Berlin, Germany
« on: March 29, 2009, 09:25 AM »

hello fellow DCers,
today I have the distinct honor to announce:

DC/IOSx02 - Donationcoder Meetup / In Outer Space - the 2nd installment

http://follvalsch.de/dump/dcmb090103/1.jpg


location: c-base - space station below berlin
rungestrasse 20, 10179 berlin, germany
datetime: 2009/May/31 / 5pm / open end

when we met last time right after the annual chaos communication congress 25C3 early january this year it was a small yet awesome meetup.
so awesome in fact, we agreed to do it again!

as last time already the event will be held on board c-base, the space station buried below berlin.
c-base, conveniently located in berlin's city center, can be reached by subway via stops S+U jannowitzbruecke or U heinrich-heine-strasse.

we still don't believe in agendas, so this is an open discussion / hangout / boozing / lounge / nerd event.
if you're in the area (there happens to be a certain 'it security congress' at the same time) please drop by and join us for some bottles of club-mate and/or brewskies.

for questions of any kind please contact me or housetier.
if you're planning to attend, please let us know so we get a rough idea of what to expect.

6
Living Room / Ever wanted your OWN plane? Well.... HACK ONE!
« on: January 05, 2008, 06:07 AM »
Boeing's new 787 Dreamliner passenger jet may have a serious security vulnerability in its onboard computer networks that could allow passengers to access the plane's control systems, according to the U.S. Federal Aviation Administration.

The computer network in the Dreamliner's passenger compartment, designed to give passengers in-flight internet access, is connected to the plane's control, navigation and communication systems, an FAA report reveals.


http://www.wired.com.../dreamliner_security
boeing_787_630x.jpg

Photo: Robert Sorbo / Corbis (Wired)

7
Living Room / Happy Mod 365 Day Everyone!
« on: December 31, 2007, 04:47 AM »

What?
who?
why?

because!

nerds unite

besides, nye is such a lame, old, everyone-knows-what-it-means thing :D

8
Video taken at Assembly07 (Demoscene party).
Using a specially crafted soundfile one of the hackers managed to display the
all too familiar oldskool side-scrollers and abstract shapes to be displayed on an ... oscilloscope!
Just plain awesome.


9
ok, this might sound a bit confusing, let me elaborate.
mouser suggested i post it in here (original: https://www.donation...ex.php?topic=10517.0)

environment:
  • windows XP / 2000
  • touch-screen display (for windows this is just a simple mouse)
  • 2 applications (A and OSK)
    A: random application with GUI
    OSK: on-screen-keyboard

the idea:
  • monitor A's GUI
  • launch/unhide OSK as soon as focus is given to an edit control (usually needs keyboard input)
  • if edit control looses focus (or OSK has no more GUI-clicking going on, aka timeout) close/hide OSK

candy:
  • make this work global for all running apps
  • make it only work for a list of applications
  • make types of controls that trigger the OSK configurable
  • support for arbitrary OSK apps (windows' own, 3rd party)

alternative:
is there any OSK app out there that already does it?
i couldn't find any.

10
Hey fellow DCers,

I was wondering if there is any on-screen-keyboard solution that automatically pops up the moment an edit control gets focus.
Any recommendations?


11
Living Room / (Webfind) Oddity of the day: Prime number shitting bear
« on: October 14, 2007, 06:17 PM »
I can't find words to describe this thing... it's just, uhm, odd.
Yet fascinating.  :huh: ;)



from

12
Adobe presents prototype lens-assembly to take 3D photographs which allow
to move the camera later on in software or change the focus plane.
They also show what they call the 'Focus Healing Brush' to add focus or de-focus to selected image areas.


13
Living Room / UK Government wants your crypto keys... by law.
« on: October 01, 2007, 01:42 PM »
In a few hours time Part III of the Regulation of Investigatory Powers Act 2000 will come into effect. The commencement order means that as of October 1st a section 49 notice can be served which requires that encrypted data be “put into an intelligible form” (what you and I might call “decrypted”). [...]

http://www.lightbluetouchpaper.org/2007/09/30/time-to-forget/

holy fucking crap what the hell?!
mouser, we need a smile-face that does the hitler salute, seriously...
there's just no way to describe how idiotic, nazi, 1984, [more adjectives here] this is...
i'm shocked (and yes, this comes from someone in who's country possession of hacker tools is illegal)

14
Hey there fellow DC'ers
I'm sitting at work here right now, having to deal with a _very_ nasty problem that totally smashes my system's heap, slowly, very slowly... (to the point of no return other than rebooting)
The application is an especially nasty accumulation of C/C++/Managed C++/C# code.
So it got everything, from malloc to new to gcnew.. garbage collected items, and items that need manual disposal.
Everything split up in half a ton of DLL files.

I already found this thread here and was wondering if any of you could recommend any other tools (preferably free software, but if it's payware, whatever, as long as it does the job) to do leak testing, memory profiling.

linux-based valgrind is pretty awesome for this, but well, linux.
i'd need something similar for win2k and xp.

i know leaks are a very common problem to any non-trivial program, so i assume most of you have already had to deal with this problem.
please share your knowledge :D

15
Living Room / (Webfind) CS Jokes - Collection of Computer Science Jokes
« on: September 30, 2007, 09:31 AM »
thought I'd share my latest find since it wasn't already posted here ;-)
Enjoy.

Two strings walk into a bar and sit down. The bartender says, "So what'll it be?"
The first string says, "I think I'll have a beer quag fulk boorg jdk^CjfdLk jk3s d#f67howe%^U r89nvy~~owmc63^Dz x.xvcu"
"Please excuse my friend," the second string says, "He isn't null-terminated."


16
Living Room / (Webfind) Flash game: Double maze, twist your mind
« on: September 29, 2007, 12:27 PM »
Double maze
Use the arrow keys to move the two balls around and land them on the yellow stars
and press Control to reset the level


17
Living Room / THE cup for the uber-tea-geek
« on: September 28, 2007, 11:00 AM »
MyCuppa
Mugs to help you mix your favourite brew to just-how-you-like-it by matching the colour guide on the inside.
Available in Tea or Coffee styles.

It's 'just tea' for me :D


18
The TENORI-ON provides six different performance and sound/light modes for broad performance versatility,
and these modes can be combined and used simultaneously for rich, complex musical expression.


Looks like Yamaha is jumping on the Monome bandwagon...

19
"We can read fingerprints from about five meters .... all 10 prints," said Bruce Walker, vice president of homeland security for Northrop Grumman Corp (NOC.N).
"We can also do an iris scan at the same distance."
http://news.yahoo.com/s/nm/20070921/tc_nm/homeland_technology_dc_2

hell yeah, who needs privacy anyways...

20
Living Room / (Webfind) Programmer Personality Test
« on: September 24, 2007, 12:48 PM »
There was already a posting about a Myers-Briggs Test before on DC, but this a very short version, made especially for the programmer types.
I think it'll hit the target audience quite well being posted here ;-)

Below is the programmer's personality test.
It is based of the Myers-Briggs Personality Test and has been changed to relate to your programming personality type.
This is not a joke test and is really only relevant to programmers, however anyone is welcome to take the test.
There are 12 questions with 2 answers for each question and you must choose one answer from each and every question.
There are no 'right' or 'wrong' answers, your answer will simply show what type of personality you have.


21
There's a beautiful princess, prisoner in the highest tower of a castle, guarded by a mighty dragon, and a fearless knight must rescue her…

This is how each language would manage to rescue the princess from the hands of the dragon
  • Java - Gets there, finds the dragon, develops a framework for dragon anihilation with multiple layers, writes several articles about the framework… But doesn't kill the dragon.
  • .NET - Gets there, sees the idea of the Java developer and copies it. Tries to kill the dragon, but the monster eats him.
  • C - Arrives, looks down at the dragon, pulls out his sword, beheads the dragon, finds the princess… And ignores her to see the last checkins of linux kernel cvs.
  • C++ - Creates a basic needle, and gathers funcionality until he has a complex sword that he can barely understand… He kills the dragon, but gets stuck crossing the bridge because of memory leaks.
  • ... click here for the rest of the extensive list


22
Living Room / Webfind: How to hire and treat your own hacker
« on: September 01, 2007, 04:53 PM »
Just (re)found this gem of hackerdom:
How to hire and threat your hacker in a corporate environment.
Link to the full text below the TOC ;-)

Section 0: Basic understanding.
0.0: Won't my hacker break into my computer and steal my trade secrets?
0.1: Was it a good idea to hire a hacker?
0.2: How should I manage my hacker?
0.3: Wait, you just said "10 times", didn't you? You're not serious, right?
0.4: I don't understand this at all. This is confusing. Is there a book on this?

Section 1: Social issues
1.0: My hacker doesn't fit in well with our corporate society. She seems to do her work well, but she's not really making many friends.
1.1: My hacker seems to dress funny. Is there any way to impress upon him the importance of corporate appearance?
1.2: My hacker won't call me by my title, and doesn't seem to respect me at all.
1.3: My hacker constantly insults the work of my other workers.

Section 2: Productivity.
2.0: My hacker plays video games on company time.
2.1: But it's been two weeks since I saw anything!
2.2: Isn't this damaging to productivity?
2.3: My hacker is constantly doing things unrelated to her job responsibilities.
2.4: My hacker is writing a book, reading USENET news, playing video games, talking with friends on the phone, and building sculptures out of paper clips. On company time!
2.5: But my other workers are offended by my hacker's success, and it hurts their productivity.

Section 3: Stimulus and response
3.0: My hacker did something good, and I want to reward him.
3.1: My hacker did something bad, and I want to punish him.
3.2: I don't get it. I offered my hacker a significant promotion, and she turned it down and acted offended.
3.3: My company policy won't let me give my hacker any more raises until he's in management.
3.4: I can't believe the hacker on my staff is worth as much as we're paying.

Section 4: What does that mean?
4.0: My hacker doesn't speak English. At least, I don't think so.
4.1: I can't get an estimate out of my hacker.
4.2: My hacker makes obscure, meaningless jokes.
4.3: My hacker counts from zero.


23
Living Room / (Game) Crosswords Flash Game
« on: July 19, 2007, 11:11 AM »
Whether you're a crosswords nut or just the occasional bored player, try this one.


24
Not much to say about that one other than it's pretty simple and nice for maybe 5 to 10 minutes.
Make a bet, watch the shellz change places, and pick the right one when it's done spinning.

As you can see from the screenshot, it is kinda simple (I was betting all each round).
26,214,406 points was when I stopped, clicking the 50K button was becoming quite a chore at that point ;-)


25
Living Room / (Video) Stalked by an a-capella group
« on: July 15, 2007, 02:49 PM »
Never spar in New York City's Central Park.
You might get stalked by an a-capella group from UC Berkeley demanding you to fight harder :D




Pages: [1] 2 3next