avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • January 26, 2020, 09:00 PM
  • Proudly celebrating 14 years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Messages - Josh [ switch to compact view ]

Pages: prev1 ... 6 7 8 9 10 [11] 12 13 14 15 16 ... 131next
Found Deals and Discounts / Re: Microsoft 5-Game Arcade/Indie Pack
« on: January 27, 2013, 06:43 PM »
Worth it for deadlight alone!

Find And Run Robot / Re: Opening Templates/Using Templates
« on: January 27, 2013, 12:00 PM »
Are you talking about document templates in Libreoffice? If so, then the program name is completely relevant as you have to understand the switches for how the program opens files.

Running an i3/6GB of RAM and I have not noticed this to be the issue. This laptop currently has a full load of office, kaspersky A/V 2013, VS 2010 and several other tools. I am to a desktop in about 12 seconds after boot and login with approximately 14 start-up processes.

The startup/shutdown times aren't that big a deal to me. But I don't reboot a lot.

I'm more concerned with data access speeds and programs opening and closing since I'm in and out of things constantly with what I do. I should probably shrink my tookit down and just leave everything open. Different OS - different workflow, right?

Definitely so. I do not see any slowdowns, minus a small one when I installed Kaspersky, when opening files or programs. Everything is still fairly snappy. Office 2013 programs open in about 1-3 seconds, depending on the size of the file being opened (I have some VERY large powerpoint slideshows).

General Software Discussion / Re: Who is still runnig XP?
« on: January 25, 2013, 11:09 AM »
:greenclp: :greenclp: :greenclp:   Man, if I could like a post, I would like Carol's above. Bravo!!!  :-* :-* :-* 

On a side note, no, I am not running XP but on a handful of systems that are too old to justify loading Win7/Win8 on. I am in the minority that actually enjoys Windows 8 and I am running Windows 7 on my other systems. Like Carol, I have had ZERO issues with 64 bit versions of Windows since XP 64. The issues with XP 64 were developer/hardware manufacturer buy-in and as such the drivers sucked. Likewise, I would NEVER go back to any OS based on the 9x code-base. Microsoft releasing Windows XP and eliminating the antiquated OSes was the best move they could have made for the industry.

Running an i3/6GB of RAM and I have not noticed this to be the issue. This laptop currently has a full load of office, kaspersky A/V 2013, VS 2010 and several other tools. I am to a desktop in about 12 seconds after boot and login with approximately 14 start-up processes.

I have paid for, and continue to use, FastStone Capture. It is the EASIEST to use and has all of the features I need with very little clutter. Scrolling capture works beautifully with two clicks (click the scrolling cap button or hit the hotkey combo, select area to capture and bam...done). I love movie mode for short "How to videos". I paid 20 bucks for it, once, about 4 years ago and have never regretted it. The features seem to flow very intuitively and make me productive rather quickly. Great tool!

Audio interview with the sudent:

If anyone listened to that... the student was GIVEN A TESTING ACCOUNT. What do you do with test accounts? Errr... test maybe?

Just to add insult to injury, he was given all zeros for all his grades.

Nice. Kick 'em while he's down why don't ya? Show 'em who's the boss.

Proportionality has disappeared from "laws/rules/regulations/whatever". I could give recent examples that would simply blow your mind, however, as they're real, and so utterly insane, they can only be put in the Basement.

The fact that he, on his own, informed them about the vulnerabilities the first time, tells you everything you need to know about his intentions, his moral character, and the nature of the "threat" he supposedly posed.

+1 - Agreed. Now if he'd have polked it twice all sneeky and quiet...then I'd be up for a BBQ. But that ain't what happened.

+1 and +1

Nothing better than BBQing a Good Samaritan though! They're not all that common, so when ya find 'em, better cook 'em up real quick!

But test what? He did not specify ANY of that. Just because you have a "test account" does not mean you have free reign on the network. Often times, these are for a specific purpose. And unless he was granted permission to perform the second vulnerability test, he was still in the wrong. I am not trying to justify the response he received for this, but I do see the validity in the claims that he was in the wrong.

The machine never falters in voting for itself...(as that is its primary purpose)...So if I gotta pick a direction coming outta the gate, Damn Straight I'm backing the dog.

The problem with that is the other party is immediately painted guilty until proven innocent. Doesn't it make sense to wait until information from both sides is available? Something tells me there is more to this than meets the eye.

duh! sorry for over-reacting -- i can see now you were making a joke.. I guess this episode struck a little close to home for me and it's got me a little quick on the draw.

Hence why I told you on IRC that I felt you were jumping to the same conclusion that most people on the internet do and that is to believe the first story to the media, or the side that is easiest to garner the most sympathy for. After all, it makes us feel better to root for the underdog vice the big entity (in this case, the college). Just remember folks, there are TWO SIDES to every story.

General Software Discussion / Re: Lastpass
« on: January 21, 2013, 05:03 PM »
I am with Carol on this one. It sounds like there are deeper issues than LastPass on this one.

Out of curiosity...does anybody know what the school's official written policy is on this? The schools I'm familiar with all require signed agreements before granting access to the university's data centers and their network. IIRC the two I dealt with both had unambiguous policies regarding the unauthorized use of scanning and related tools, along with severe penalties for doing so.


Out of specific interest are bullets 2a and 4.

General Software Discussion / Re: Tips for Windows 8 (got any?)
« on: January 21, 2013, 04:06 PM »
Yes, /hybrid will do it. Forgot that one! Thanks f0dder

But he went in scanning for ADDITIONAL vulnerabilities AFTER he advised them of the first one. That is the problem here. I've watched tools like this drag a network to a crawl from a simple scan. Retina and other tools, while basic in nature, can degrade a network to the point of sheer non-usability. Intent aside, he did not have permission to scan, was not asked to do so after the initial report, and could have taken other avenues with the IT staff to conduct a proper security audit based on what he had already seen. Going in again is where he made his mistake.

General Software Discussion / Re: Lastpass
« on: January 21, 2013, 01:47 PM »
Did you sign in to your account? To access that page, you must be signed in. I can see a "Support summary" at the bottom of the page.

General Software Discussion / Re: Tips for Windows 8 (got any?)
« on: January 21, 2013, 12:56 PM »
Or you can add an alias (no javascript or batch files required) with the command: c:\windows\system32\shutdown.exe -s -t 0  which will shut the computer down immediately.

General Software Discussion / Re: Lastpass
« on: January 21, 2013, 12:54 PM »
Support page for contacting them, after clicking SUPPORT and then MY ACCOUNT:

It seems no one here is able to reproduce your problem. My father uses the free service and has no problems with it, and he has over 400+ logins, much to my dismay and constant pressure for him to clean them up.

I've submitted support tickets and had them resolved fairly quickly. I've also emailed support and received responses from Joe on multiple occasions, even before I paid for the service.

General Software Discussion / Re: Lastpass
« on: January 21, 2013, 11:45 AM »
What database are you talking about that has a limit? I have over 200 sites stored in my LP database with zero problems.

An automatic client script analyzer allowing for security testing of Ajax and Web 2.0 applications
Industries' most advanced and in-depth SQL injection and Cross site scripting testing
Advanced penetration testing tools, such as the HTTP Editor and the HTTP Fuzzer
Visual macro recorder makes testing web forms and password protected areas easy
Support for pages with CAPTCHA, single sign-on and Two Factor authentication mechanisms
Extensive reporting facilities including VISA PCI compliance reports
Multi-threaded and lightning fast scanner crawls hundreds of thousands of pages with ease
Intelligent crawler detects web server type and application language
Acunetix crawls and analyzes websites including flash content, SOAP and AJAX
Port scans a web server and runs security checks against network services running on the server

From the Acunetix website...

The difference between scanning for publicly available information (domain owner, email addresses listed on web pages, administrative contacts, etc.) and vulnerability scanning is that information gathering is passive when you talk about publicly available information. Scanning a server can have real consequences on the server if the tool is not configured properly and is NOT passive.

Mouser, I am not trying to justify the expulsion, merely trying to showcase that the tool he used has been shown to have the ability to crash a remote system when scanned improperly. I agree, he should not have been expelled, however I feel the school was under pressure from the software owner to take further action after he scanned their network again. Again, had he been a professional tester, he could have faced being fired and a follow-on lawsuit. This is not someone being paranoid as this tool CAN break a system.

Renegade, unless he was specifically granted permission to re-check the system, it is an illegal scan of the system. Many professional penetration testers have lost their jobs because of such an act.


The issue was not that he reported the vulnerability, but instead that he ran an automated tool, Acunetix, designed to hack and test systems. Without system administrator approval from both the school network and the remote system network, he is in violation of several ethical guidelines and laws. Tools like this CAN and HAVE crashed entire systems, at times rendering the system inaccessible, because of the amount of traffic they can generate and techniques they use. So, no, he was NOT expelled for reporting the vulnerability, but for going in two days later, using a tool that was not authorized on the school network, and scanning a remote system which IS against the law in many jurisdictions.

Living Room / Doom 3 Source Code - The neatest code I've ever seen
« on: January 16, 2013, 06:56 PM »
This is a story about Doom 3's source code and how beautiful it is. Yes, beautiful. Allow me to explain.

After releasing my video game Dyad I took a little break. I read some books and watched some movies I'd put off for too long. I was working on the European version of Dyad, but that time was mostly waiting for feedback from Sony quality assurance, so I had a lot of free time. After loafing around for a month or so I started to seriously consider what I was going to do next. I wanted to extract the reusable/engine-y parts of Dyad for a new project.

When I originally started working on Dyad there was a very clean, pretty functional game engine I created from an accumulation of years of working on other projects. By the end of Dyad I had a hideous mess.
In the final six weeks of Dyad development I added over 13k lines of code. ballooned to 24,501 lines. The once-beautiful source code was a mess riddled with #ifdefs, gratuitous function pointers, ugly inline SIMD and asm code—I learned a new term: "code entropy." I searched the internet for other projects that I could use to learn how to organize hundreds of thousands of lines of code. After looking through several large game engines I was pretty discouraged; the Dyad source code wasn't actually that bad compared to everything else out there!

Unsatisfied, I continued looking, and found a very nice analysis of id Software's Doom 3 source code by the computer expert Fabien Sanglard.

Source URL


Let's try and remain calm and continue focusing on having a constructive discussion.

Living Room / Re: MS Blocks Ability in Windows 8
« on: January 08, 2013, 06:27 AM »
I seem to be booting straight to the desktop using Start8 but I still have to see the silly (and completely pointless) "Lock Screen" and either log in to an email address or enter a Pin.

Does anyone know a way to by pass the Lock Screen and mandatory login so I switch on and it goes straight to the desktop?
Email Address? PIN?

Just create an "offline account" - at least that's still possible. Why on earth would you want to bypass authentication on the lockscreen, though?

Wasn't this the MAJOR ISSUE with the Windows 9x code base? Users just pressing escape and no real security being provided....

Pages: prev1 ... 6 7 8 9 10 [11] 12 13 14 15 16 ... 131next