Jump to content

Sensei

Senior Members
  • Joined

  • Last visited

Everything posted by Sensei

  1. Its name consists of 11 bytes in hexadecimal numeral system. 11 bytes * 8 bits = 88 bits. Which is a typical length for a certain type of hash. https://en.wikipedia.org/wiki/Cryptographic_hash_function https://www.google.com/search?q=hash+"88"+bits+length Although it can shorten a hash with more bits to less, cutting part of it, to make it harder to figure out what it was prior modifications. The proper, untruncated, MD5 hash length should be 128 bits = 16 bytes = 32 characters in hex format. https://en.wikipedia.org/wiki/MD5 SHA-1, SHA-256 are longer. https://en.wikipedia.org/wiki/SHA-1 160 bits https://en.wikipedia.org/wiki/SHA-2 256 bits If you see such name on your drive, you should: 1) open regedit and search for this value either in ASCII and hexadecimal (byte) form. 2) use FileMon or equivalent to figure out which app opens and uses this folder: https://learn.microsoft.com/en-us/sysinternals/downloads/filemon 3) scan all content files for the existence of this name in some file. However, the chances of success are slim. I would simply rename it to something else (i.e. append suffix, prefix) and then see what happens. Is it recreated? Some app starts misworking?
  2. Ok. Now imagine. Hackers break to your smartphone, so their IP address, is equal to your IP address. And you complain about unauthorized transaction, is laughable. It happens from 1) your device 2) from your IP address 3) from your GPS.. 4) you were there at the time of dinner.. True investigation that you're not the real purchaser but fake would require taking monitoring data and comparison of data. If they have such.. Most people will just give up and become their loss.... ps. I see your reply was adjusted while I was in the middle.. so excuse me to not taking account your further thoughts..
  3. How can they differ from legal or illegal access? It is word from you vs word of bartender, where you get drunk.. ...you have no idea when and where somebody will make photo of your cards..
  4. And you aren’t liable for most of it, in the US. You’d owe at most $50 per card, and some cards have zero liability. That puts the burden on the credit card companies to have decent security measures. One card I have texts me for approval if the purchase breaks a pattern ..in the real world (except for commercials) it doesn't look like that.. Lucky you. I never had unauthorized attempt of transaction..
  5. It all depends on the operating system being used.... Different operating system, different meaning.... As usual, his post is too ambiguous. Creating such a folder on C:\ would require administrator privileges..
  6. ....hmm... one of the funniest things I've read this month.. Try this with your wife..
  7. ..so, you apparently spent literally zero time watching youtube videos with queries I gave which shows "how they did it".. and "how".. or you did not understand.. Giving exact links would be like "tutorial how to steal your money".. In 5 minutes after I wrote my initial post about it, I found video, were they showing device which does NFC from "meters" around them, because they used so large antenna in the bag (50 cm+).. ps. I know an IT multimillionaire here who told me 10 years ago that he cut the connections from his VISA debit cards to RFID/NFC to disable the connections.. ps2. If someone takes your wallet with your cards, you know they are lost. So you turn everything off and you're done. If someone takes your wallet, debit/credit cards, takes pictures, you still have them on hand and nothing happens, you have no idea that your data was stolen. Until "doomsday." Then you are not able to say how it all happened, because it could have happened several months ago. ..5 mins and you have a video of a people selling RFID/NFC antennas.. recording stuff from your device from meters (due to the size of their antenna in the bag)..
  8. Are you asking for permission to delete files from your own drive?
  9. Do you truly believe/buy this marketing BS...? Seriously? You just repeated what they say in their marketing materials as if you work in bank marketing.. Not really. I know people who have been denied refunds. I will keep the details to myself, otherwise I will influence the thieves what/how to do it.. ..professionals do it from your current IP address.. If someone doesn't bother to cover their credit/debit card when it is used to authorize a contactless transaction (thus cameras won't work), is that a technical issue or a human issue? If someone doesn't take the trouble to buy RFID/NFC protection shield (which doesn't protect against cameras BTW!), is it a technical or human issue... ? I read OP, "gimmicks" as "fakes", and responded accordingly in 3rd post, by saying each such protection "shield" should be checked independently by the owner using appropriate devices/environment.. People here started to say that it is unneeded fake for paranoid people, so I objected.
  10. First they had to hack the FB account. Later, there was a trick. How is this different from, say, Mitnick? Mitnick called people in the company pretending to be an IT administrator.
  11. After 5th transaction in a day or exceeding day limit you have to authorize by PIN (the same which is used in ATM, so pretty much constant - and easy to intercept by camera). But it generally depends on the bank you use. Different banks have different default settings. The customer can adjust these settings or turn them off. People here commonly use a one-time-generated number in a specialized application to confirm transactions. It is non refundable. If you entered a PIN, it is final, you cannot get a refund. Thieves have learned how to trick people into giving them this one-time-generated number by pretending to be friends - basically, they steal someone's Facebook account and write to their friends asking for a small loan, the unsuspecting people give them the code and the money disappears. If someone cares about security, they should use: 1) virtual cards with one-time generated data.. 2) Have two accounts with independent cards. When he/she needs to pay for something, he/she transfers money from his/her main account to the other and pays for the item immediately (online or in a regular store). Then the account remains empty until the next transaction. Even if the data is lost, in any way, online or offline, by a camera or a rogue merchant, it doesn't matter. They can't take money from the empty account.
  12. Losing money from a credit/debit card that has a magnetic stripe (which one doesn't?) is as easy as this guy shows: You still have CC/debit card at hand, but somebody else has unlimited number of copies, so you have no idea how this all happened, if they will use it after months.. People frequently give their credit/debit cards to bartenders, salesmans, waiters, receptionists etc. etc. They can duplicate your CC and/or make photos and then use anywhere else, Internet or regular shop. CCTV installed in the shop with 4k/8k may be enough to record all CC details when person do contactless operation.. If they are not greedy, you won't notice for days or months, or never. A 70-plus-year-old woman found another woman's debit card here. She started using it for her daily grocery shopping contactless. The limit at the time was set at $12.5 per day, now it has been extended to $25 per day. Grandma used the card for several months. She was not greedy - used just $5 per day or so. The card's owner discovered the operations on the card by accident after several months and contacted the police. Those waited for the thief in the store, as she daily appeared in the same place, and caught her. A greedy thief will be detected immediately, while a non-greedy thief will remain undetected because his/her operations mix with all the other operations that people perform on a daily basis. Going back to the RFID/NFC topic: https://www.youtube.com/results?search_query=hacking+contactless+cards The first video I have here for this query string shows how such "action" in the shop will look like from thief POV. It happens so fast that you don't even know what happened. I don't want to advertise the device name, but it is just $330 at Amazon. Once you have the device name see Linus Tech Tips about the device (more technical and more professional discussion).
  13. Your response is too ambiguous. What are your objections at all? According to my country statistics (national bank data and police data from Google), there were 1:190 chance (0.5%) of losing money from stolen debit/credit card data ("unauthorized usage of credit/debit card data") in my country in 2021..
  14. ..The same could be said of the IT antivirus industry.. or the condom producers industry.. insurance industry (even more!).. Hackers are installing card readers on ATMs around the world, and local newspapers frequently warn about it. Such things are detected only if they immediately start taking money from stolen cards. If they did it six months later or later, no one would know how they got the data. How can a hacker install a card reader/camera recorder on devices? Simply by being employed in a store, restaurant or hotel.. How did you get infected with HIV? Who have you had sex with in the last few years? If someone has sex every day, the answer is almost impossible.. The same goes for cards. You insert them into unknown devices several times a day.. Have you checked where your, family members, and friends data get leaked in hacker attack by now? https://haveibeenpwned.com/
  15. If someone was seriously interested in this, they would simply buy an RFID receiver and transmitter, and do a series of experiments... One thing might be fake and other not, you have no idea with what you are dealing with, until you will check it.. apparently not so obvious to some... I would don't trust even brand name stuff (just today I found it does not want to work with Bluetooth speakers...)
  16. ...you don't use it often in your answers..
  17. Lucky you. A good wife is worth a billion dollars in gold.
  18. How can you prove that this is not what they are looking for? Brain in a vat: https://en.wikipedia.org/wiki/Brain_in_a_vat
  19. ..your self-confidence about your abilities is overestimated.. you cannot even detect the things the application does on the computer or smartphone which you hold in your hand..
  20. ..no "X Files" anymore.. ? 😮
  21. They would have to have sonar on the mother ship. But I like your idea. It could/should be checked by the Pentagon or other agencies using their own data from sonars..
  22. A properly designed submarine has a sound transmitter that is activated automatically or manually in an emergency situation.. e.g., the flight recorder of an airplane submerged in water has a sound emitter activated when the plane sank (how many times was it used? how often does the plane land in the ocean??)..
  23. Since "Bigfoot" is a mammal and not a single microorganism, it requires a sufficient population to keep it genetically healthy and diverse. It would have to number in the hundreds to thousands. Otherwise, they would have to mate with their relatives, which would end in DNA degeneration. Incest and inbreeding are unhealthy. https://en.wikipedia.org/wiki/Inbreeding https://en.wikipedia.org/wiki/Inbreeding_depression
  24. ..I'm in hell when I read yet another of your posts about UFOs and nothing else.. Your entire existence is spinning around this..
  25. C:\Users\Sensei>nslookup scienceforums.net Server: UnKnown Address: 192.168.43.1 Non-authoritative answer: Name: scienceforums.net Addresses: 2a01:a500:512:1:5c1:d0e5:17:be57 94.229.79.58 https://ipinfo.io/94.229.79.58 Summary ASN AS42831 - UK Dedicated Servers Limited Hostname xyloid.org Range 94.229.64.0/20 Company UK Dedicated Servers Limited Hosted domains 10 Privacy True Anycast False ASN type Hosting Abuse contact abuse@ukservers.com Hosted Domains API scienceforums.net moxey.uk refsmmat.com nekmesh.info davidmoxey.uk xyloid.org holyspiritsouthway.org.uk statisticsd https://www.google.com/search?q=UK+Dedicated+Servers+Limited https://www.ukservers.com/ They want 49 UKP/month = ~ 63 USD for dedicated Linux servers. 63 USD/m * 12 y/m = 756 USD/y + (domain) ~ 20-40 USD/y = ~ 800 USD/y So, from the ads published on scienceforums.net, it seems that they need to get at least ~ 2000 USD/year or so, to come out at zero.. (Google costs+VAT) If you ask me, $50 a year is needed, not $800 a year, but Dave has more stuff on that dedicated server, which makes him more reluctant to give it up (especially when IT guys earn 5-10x more than a regular people).. https://www.informer.ws/whois/scienceforums.net ps. In September you need to remember about the domain. October is the expiration date.. It is ALWAYS forgotten.. Make alarm in smartphone.. It is 20-50 USD or so saved year by year..

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.