topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Saturday December 20, 2025, 9:39 pm
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Recent Posts

Pages: prev1 ... 130 131 132 133 134 [135] 136 137 138 139 140 ... 404next
3351
Living Room / Re: Recommend some music videos to me!
« Last post by wraith808 on November 01, 2015, 10:25 PM »
Traci Lords - Fallen Angel (Yes, that Traci Lords - techno/trance)

She actually did some pretty good stuff for a while in the music industry... and on the Mortal Kombat soundtrack.





Helps that it was one of the best fights in the movie.
3352
Living Room / Re: Recommend some music videos to me!
« Last post by wraith808 on October 31, 2015, 10:42 AM »

They all rock.

But there's a very different "feeling" when you play them. The JP version totally feels heavier right from the start.



One I think you'll like Renegade.  And anyone that likes their music heavy.



Although I that that there are only three horsemen.  Anthrax is on a second tier.  And slayer got pissy because they weren't playing The Four Horsemen.
3353
N.A.N.Y. 2016 / Re: N.A.N.Y. 2016 Announcement
« Last post by wraith808 on October 31, 2015, 10:33 AM »
Did any/everybody receive the NANY 2015 mug (or other goodies) they ordered? I did order a mug way back in Januari/Februari but it never made it across the pond. Probably sunk on the way over because Cody got sea-sick, I guess :tellme:
And I don't recall seeing any pictures either. :huh:

I received my order.  Perhaps contact cafepress?
3354
Living Room / Re: Do we have any musical people on DC?
« Last post by wraith808 on October 31, 2015, 12:03 AM »
Prince in a recent interview. What do you smoke to keep looking this young? Prince: "I smoke other Guitar players"



He reportedly asked Dhani Harrison before hand how he wanted him to play it- and Dhani said, something different than the way his dad played it - just to go all out and burn it.  Afterwards, George Harrison's wife said that she was wondering what Dhani was up to when he asked Prince to play it, and she had her doubts - but that he'd killed it.

For all that he was doing in there, I noted that he was paying constant attention to Tom Petty, and when he called it, was instantly there.

Very underrated guitarist.
3355
Living Room / Re: Recommend some music videos to me!
« Last post by wraith808 on October 30, 2015, 11:51 PM »
Bad quality... but Chuck Berry and John Lennon on Johnny B Good




Warning... Yoko is on stage...
3356
Living Room / Re: Recommend some music videos to me!
« Last post by wraith808 on October 28, 2015, 11:39 PM »
^ I'll have to give that a listen. :)

In the meantime, Let There Be Rock! (The original video isn't on YouTube, and Bon Scott at the pulpit is just classic.)

Yeah... I was looking for it earlier, and realized that it's not there.  The guy that did that video has some pretty cool stuff though... https://hearthis.at/djschmolli/

3357
General Software Discussion / Re: Windows 10 Announced
« Last post by wraith808 on October 25, 2015, 09:31 PM »
^ Not for me. :(

http://www.techtimes...ged-by-microsoft.htm

http://www.techrepub...icrosofts-new-rules/

Doesn't seem so ominous if those links are what the forbes article was referring to.
3358
Living Room / Re: Internet of Things thread (IoT)
« Last post by wraith808 on October 24, 2015, 07:45 PM »
Would you connect those devices to, say, your phone?

No.  So I guess that answering the rest is rendered moot?

When I say I wouldn't connect those things... I really mean it.  And though I don't understand everything in regards to the security, I do know enough to prevent corruption of the non-connected method via other connections.  I don't care what advantages I'd get from doing it, unless I could be sure that it was totally inviolate, I wouldn't.  Which you can't be sure of.  So I don't.
3359
General Software Discussion / Re: Unique Solution to Pirates
« Last post by wraith808 on October 24, 2015, 02:19 PM »
I just wanted to point out that i think its a terrible idea for software to do bad things to a user's computer or files if it suspects that it has been pirated.
Now in this case, it seems the author is just making his software malfunction, in ways that wouldn't cause loss of work, so i don't have a problem with it.

Not bad things.  But even what Renegade is proposing isn't *bad* things.  It's not doing anything that is directed at anything other than the software itself.  Even popping up the dialog - he's not saying do anything.  But it will put a scare into them.
3360
Living Room / Re: Internet of Things thread (IoT)
« Last post by wraith808 on October 24, 2015, 02:14 PM »
So, for people that think the negatives of IoT outweigh the positives and are willing to do some work, they can get a sense of control back by getting, "grokking" and applying router software.

Why are air gaps considered one of the hardest security mechanisms to get around?


How did we get from locking IoT in a (Pandora's) box to the trials and tribulations of Air Gapping?? I've been thinking for a while now about angling towards Shades' plan of using a completely controllable firewall/border on/to/between the internal and internet networks to try and mitigate WTF is going on with Windows these days.. So how does air gapping - with its range restricted attack surface - play into this?


In... just don't.  I like the idea of IoT.  But the most secure way of engaging in IoT is... don't.  Which is for all intents and purposes, an air gap.  Between your refrigerator and the internet.  Between everything that could be exploited and the internet.  To be sure, I have some interconnections.  Hell, I just got my Onion Omega (the power switch broke off which is the reason I haven't posted anything yet).

But I'd never connect my power, refrigerator, laundry, or any appliance to the internet.  Because it's more of a risk than I want to take.  The air gap between them is not a security measure I want to do without.

And that's where the second paragraph above comes into play, which was not quoted, i.e.

To have the hubris to think that understanding nullifies the risks- well, I'm not going to think that my understanding covers all that I don't know- or all of the ways to hack such an interconnected world.  I've seen people do some pretty scary things to secured systems.
3361
Living Room / Re: Recommend some music videos to me!
« Last post by wraith808 on October 24, 2015, 01:09 PM »


The SFW version.  It's still really cool :)
3362
Living Room / Re: Internet of Things thread (IoT)
« Last post by wraith808 on October 24, 2015, 01:04 PM »
So, for people that think the negatives of IoT outweigh the positives and are willing to do some work, they can get a sense of control back by getting, "grokking" and applying router software.

Why are air gaps considered one of the hardest security mechanisms to get around?

To have the hubris to think that understanding nullifies the risks- well, I'm not going to think that my understanding covers all that I don't know- or all of the ways to hack such an interconnected world.  I've seen people do some pretty scary things to secured systems.
3363
Living Room / Re: Are RFID Skimmers FUD? Or a real, present threat?
« Last post by wraith808 on October 23, 2015, 07:24 PM »
Ah... I just included the whole quote.  The part I really meant was that RFID wasn't an everpresent threat.
3364
General Software Discussion / Unique Solution to Pirates
« Last post by wraith808 on October 23, 2015, 01:45 PM »
Just found out that the developer of uBar for Mac found a unique solution to Pirates.

The text of the article is below:

The Klingon Pirates

When I released uBar 2 last year, it wasn’t long before cracked copies started appearing on the internet. uBar costs $20, which is more than reasonable for the amount of work put into it and what it does. But there’s always people who feel entitled to your work, and proclaim “it should be $X”,  where X is the amount they arbitrarily have decided to be acceptable. That’s fair enough – nobody is forcing them to use uBar – but some people think that justifies pirating it. The “I’m pirating it because I don’t know if I like it enough to buy it” routine doesn’t work given the generous 4 week trial period. This is merely a case of people feeling entitled to other people’s work.

So a year ago, I decided to do something about it. Rather than change the protection mechanism and play cat and mouse with people that have nothing to do all day but crack software, I decided to play the long game, and have some fun while I was at it.

I made it so that if uBar detected that the registration mechanism was circumvented, after 10-15 hours it would begin substituting any app or window title with… Klingon.

I searched Google for “Klingon Dictionary”, and found a list of several hundred Klingon words. I then created a mechanism that would substitute the words of any sentence into a sentence with an equal number of random Klingon words. So “This is the title of a window” would become “Qus tay ngaS qlm lom wlv Qu'”, whatever that means.

So I implemented this system, and decided to wait and see what would happen. I figured the pirates wouldn’t suspect it had anything to do with a counter-piracy measure, but rather would assume it was a bug. They could solve it with a relaunch, but that would be annoying.

I was right. In fact, support emails began coming in from people who had the gall to actually request support when using a pirated copy of uBar.

It wasn’t who you would normally expect, and frankly, forgive, such as teens without any income. Many people have pirated high-end software in their youth, so I can empathize. The difference is that people with a conscience tend to do the right thing once they enter adulthood and earn a living. They understand that other people also earn their living writing the software they use, and that paying for what they use is what makes it work.

Instead, we got emails from grown adults using their corporate email addresses, replete with management job titles. These people actually pirated a $20 piece of software, and then had, again, the gall to email the uBar team for support. Example, with identifying information mercifully redacted:

Just reporting a bug. Every now and then the bar writes gibberish for the titles.

[image here]

These are Lotus Notes, Adium, Rdio. A re-launch of the application fixes the issue.

Kind regards,

[Redacted full name]
Development Manager
[Redacted company name]

[Redacted company address]
[Redacted company phone and fax]
I don’t know what “Mismoh pon” means in Klingon, but we can rest assured that Mr. Development Manager knows it’s Lotus Notes, which he may or may not have decided he didn’t have to pay for.

He got the boiler-plate response:

Dear [redacted],

As you are using a pirated copy of uBar, it is unavoidable that you must begin learning Klingon. It is the life you have chosen. Dujeychugh jagh nIv yItuHQo’!

Sincerely,

The uBar team
It’s been a year since this little experiment started, and it’s been interesting to say the least. uBar is used by thousands of Mac users every day, and I’m glad to conclude that the overwhelming majority are legitimate, paying customers who appreciate the effort put into it.

Qapla’!

3365
General Software Discussion / Re: Nirsoft's Antivirus Hall of Shame
« Last post by wraith808 on October 22, 2015, 02:38 PM »
I had one guy complaining about how my software didn't work after he bought it... he couldn't open any files, etc. etc. Turns out he never even installed it!!! You just can't compete with that kind of ignorance.

You win.  We're doomed.  ;D :huh: :-\
3366
Living Room / Re: Are RFID Skimmers FUD? Or a real, present threat?
« Last post by wraith808 on October 22, 2015, 08:38 AM »
That new (to the USA) chip and PIN system for credit cards has had a known vulnerability for 5 years, which has been successfully taken advantage of in the wild:

http://www.wired.com...p-and-pin-card-hack/

That's not RFID it doesn't seem.  Or am I missing something?
3367
Living Room / Re: Are RFID Skimmers FUD? Or a real, present threat?
« Last post by wraith808 on October 22, 2015, 12:05 AM »
Oh, I know it's real.  But is it as real of a threat as the people that want to sell you RFID shielding say it is?
3368
Living Room / Re: Are RFID Skimmers FUD? Or a real, present threat?
« Last post by wraith808 on October 21, 2015, 08:02 PM »
I've pledged for a minimal wallet on Kickstarter: Wally Micro - The Minimal Wallet with a Few Surprises.

Going a little off-topic, nice looking idea except the price kind of kills it - for the last 30+ years I've just been using the plastic card wallets the bank provides free as my cash/card wallet.  About 3mm a side bigger than a card and can hold up to eight.

Yeah... I've been getting a lot of minimalist wallets as of late, and price isn't so much a factor as addiction to collecting them is :)  The cheapest I've gotten is the Dash 4.0.  The most expensive, I don't even want to talk about.  But there's quite a few choices out there, and each has its advantages and disadvantages.  I just don't like back pocket wallets anymore.
3369
Living Room / Are RFID Skimmers FUD? Or a real, present threat?
« Last post by wraith808 on October 21, 2015, 03:15 PM »
tinfoil_hat.jpg

I've pledged for a minimal wallet on Kickstarter: Wally Micro - The Minimal Wallet with a Few Surprises.  As always comes up in these campaigns, people asked about RFID protection.  So they did some research and a blog post: RFID: To Block – or Not To Block.  They also referred to another article: The Skimming Scam.

A quote that I think sums it up:
The real threat to credit card hacking is in the form of ATM skimmers. Thieves place readers into any ATM or point of sale device where cards are read, and all of your data is collected. For them, it's much more efficient and they can gather thorough data in large quantities this way. Unfortunately, a foil sleeve or lined wallet can't protect you from this. The good news is the U.S. is finally adopting the Euro-style chip and pin pairing called EMV cards. They've been using this across the pond for nearly a decade, and it seems to be an effective redesign for minimizing fraud.

That's been my feeling for a while, and the fact that the human factor is a big issue, i.e. carrying everything and not knowing what you're carrying with big bulky wallets.

An an interesting quote from the Slate article: If you’re going for maximum efficacy, however, few [RFID shields] work as well as simply wrapping your cards in aluminum foil.


3370
General Software Discussion / Re: Nirsoft's Antivirus Hall of Shame
« Last post by wraith808 on October 21, 2015, 02:53 PM »
Oh and yes, we need to make the messages mandatory to read, so use UAC prompts (why don't more antivirus apps do this when they detect problems!?).

UAC prompts don't make it mandatory to read.  Just to click! ;D
3371
Living Room / Re: Apple leads the charge: Root access is no longer root access
« Last post by wraith808 on October 21, 2015, 02:51 PM »
(As an aside, there's a cheat for logging in as NT AUTHORITY\SYSTEM.  Let me know if you're interested).
A new one, or the usual of running cmd.exe as a scheduled job? :)
That's actually simpler than my method.  I didn't even realize that worked!  Seems like quite a hole... and quite obvious once you think about it.  And not much different than my method.

I use psexec sysinternal tool, and just use the -i -s switches.

And when you do it, you turn it completely off until you reboot again and turn it on.  It's hard enough to get people not to run as admin when they don't have to- rebooting?  Not going to happen.
Well, while I'm not fond of the way Apple is doing this, you don't really need SYSTEM/root privileges often, neither on OSX nor Windows. And normal admin privileges don't (yet...) require this switcharoo, so it's not too bad in and by itself. It's the reason behind it that's worrying :)

Definitely... if you were just *using* them.  But rootless also *undoes* them.  Which is the terrifying part- especially as the reason behind them is pretty transparent.
3372
Living Room / Re: Apple leads the charge: Root access is no longer root access
« Last post by wraith808 on October 21, 2015, 01:23 PM »
It's not just Apple. Microsoft has a built in account that's a level above Administrator now. If it creates a file or folder, you can't delete or modify it even if you are the admin (i.e. root) on your system.
Hasn't NT always had the SYSTEM AUTHORITY?

I'd assumed that he was talking about something other than NT AUTHORITY\SYSTEM since that's been around for a while.  (As an aside, there's a cheat for logging in as NT AUTHORITY\SYSTEM.  Let me know if you're interested).

IMHO it's a very good idea to not let your OS admin account run as root/SYSTEM (just like it's a good idea to user a less-privileged account for your daily work!). But of course it should still be possible to elevate to root/SYSTEM rights, and I believe having to reboot to do this is a bit overkill...

And when you do it, you turn it completely off until you reboot again and turn it on.  It's hard enough to get people not to run as admin when they don't have to- rebooting?  Not going to happen.
3373
General Software Discussion / Re: Nirsoft's Antivirus Hall of Shame
« Last post by wraith808 on October 21, 2015, 11:28 AM »
Most importantly, force people to get in the habit of actually reading the messages that are presented to them. I've been informally training both our in-house staff, and the staff at our clients for years, and it's been quite successful. I do frequently get calls from client locations asking about strange messages/behavior from time to time ... But it's at the 'Just click no!' stage that I can get them out of on the phone now about 95% of the time.

This.  100x this.  Winpatrol is great... if you read the messages.  It, more than anything else, has saved me from countless hours working on relatives' machines.  But it does take attentive computing.
3374
Living Room / Re: Apple leads the charge: Root access is no longer root access
« Last post by wraith808 on October 21, 2015, 11:27 AM »
It's not just Apple. Microsoft has a built in account that's a level above Administrator now. If it creates a file or folder, you can't delete or modify it even if you are the admin (i.e. root) on your system.

I didn't know about that!  Do you have any links I can read up on in regards to it?
3375
Living Room / Re: Apple leads the charge: Root access is no longer root access
« Last post by wraith808 on October 21, 2015, 07:57 AM »
^ Yes, I understand that it's about taking control away from you and for no other purpose.  That was what I spoke of in the OP.  This is the first step, and a lot of it makes very little sense, other than if that was the point.
Pages: prev1 ... 130 131 132 133 134 [135] 136 137 138 139 140 ... 404next