Search:

Type: Posts; User: imported_blackfoot; Keyword(s):

Page 1 of 16 1 2 3 4

Search: Search took 0.01 seconds.

  1. Replies
    41
    Views
    13,577

    wow

    I can't believe so many suggested to start with 'C'.

    I suggest a scripting language will give a rewarding learning curve.

    I suggest that you start with perl as it can be applied across a range...
  2. Replies
    7
    Views
    1,649

    why

    Why would one replace with random characters?

    Surely, one would aim for a specific addition ala wyd and cupp being nicely structured examples.
  3. Replies
    1
    Views
    1,099

    just as good

    Yes, a printed antenna is just as good. Indeed, in many respects much better because they can be balanced much more precisely.

    Further with a printed board you can utilise both sides too.
    ...
  4. Replies
    1
    Views
    894

    library script

    Scapy can act as both a python library and a functional script.

    If you wish to record packet transfer such as activity through a browser, then start scapy as an interactive python script and have...
  5. done

    Yes, your suggestion is notable.

    In fact, most matching programs I know already use quite sophisticated algorithms for combinations and permutations without specifying your additional command-line...
  6. Why?

    Why are you writing this?

    What do you expect?

    Of course, it is quite normal for an operating system to be able to read the contents of the disks. When using backtrack as a LiveCD/DVD for...
  7. Replies
    12
    Views
    7,556

    Unlikely full mitm over wifi

    You seem to suggest in this repeat post that you have this working over a wpa network. This is a level III redirect mitm-type sniffer exploit.

    This summary (below) is that which is required for a...
  8. Replies
    7
    Views
    1,746

    google

    google
    search term: learn bash
    return value line 2:
    http://www.w3reference.com/bashprogramming.html

    or buy a book

    As sure as eggs are eggs you shouldn't be using backtrack!
  9. Replies
    3
    Views
    3,247

    what you can do

    So, an interesting question...'what can I do to fix this'.

    If I were you I would open a web link to a search engine such as google. Then I would type in a search query such as mmm....rt2561st
    ...
  10. Replies
    4
    Views
    3,404

    wifi

    I doubt this is an actual mitm.

    You are using wpa (wpa2). It is not really feasible to encode/decode two or more independent streams (two or more computers/laptops) with this encryption.

    It...
  11. Kiddie stuff?

    So UPnP is now Kiddie Stuff?

    Have you seen the code?
  12. run out

    So has this thread run out of steam now?

    I sense the original question has been resolved after clarification of your meaning.
  13. Isp

    A little friendly comment:

    You all might want to check the terms of use from your ISP before using some of these tools if you are inexperienced.

    They are mostly VERY NOISY!

    For those of you...
  14. Replies
    14
    Views
    1,918

    home directory

    xinit first checks your home directory for .xinitrc
    If not found it then reverts to the generic configuration.

    Thus, individual users can have their own setup since .xinitrc can exist in...
  15. Replies
    11
    Views
    2,332

    Bang

    Yup

    Quick draw, that's me!
  16. Replies
    11
    Views
    2,332

    which

    use which:

    which qtparted

    will help you find it if it is in the path.

    Mine reported

    /usr/sbin/qtparted
  17. Replies
    14
    Views
    1,918

    standard

    It is a standard way to configure xinit

    See:

    man xinit

    for a review and guide

    Let me know if I can help with specifics
  18. Replies
    14
    Views
    1,918

    xinitrc

    In the root directory (or home) add this file and edit as desired

    #!/bin/sh
    #
    # ~/.xinitrc
    #
    # Executed by startx (run your window manager from here)
    #
    # exec ion
    # exec jwm
  19. original questions

    I am joining this thread late and streaker has already commented on some points which no doubt have helped you.

    It is not possible for someone to 'sniff' an ip connection as clear text when using...
  20. Not easy

    Plagiarism cannot be condoned, even though your intentions seem reasonable.

    You should at once contact the author and obtain permission to translate, preferably in writing.

    The author of the...
  21. yes

    Yes, bt3 will work with the encryption you mention...actually the conf file does not need amending it only needs the passphrase, (as the kernel has all the hooks you need already).

    Most likely you...
  22. in already

    It is included.

    Firstly, create a password in a configuration file thus;

    cp /etc/wpa_supplicant /etc/wpa_supplicant.orig

    wpa_passphrase essid passphrase > /etc/wpa_supplicant.conf

    (use...
  23. variable

    It varies depending on your interface.

    Usually use wpa_supplicant or iwpriv once the interface is 'up'.
  24. Replies
    11
    Views
    5,138

    detail

    All in the detail.

    An attempt to 'spoof' source IP addresses only without further crafting or control will result (if successful) in meaningless IP packets arriving (without foreward knowledge) at...
  25. Replies
    3
    Views
    2,950

    fdisk

    backup data then

    http://support.microsoft.com/kb/69013

    fdisk /mbr
Results 1 to 25 of 386
Page 1 of 16 1 2 3 4