Jump to content

NetSplitter

Members
  • Posts

    18
  • Joined

  • Last visited

About NetSplitter

  • Birthday 04/20/1990

Profile Information

  • Interests
    Networking, Security, Hacking techniques, Cisco, Linux/Unix/Opensource software, Reverse Engineering, and Theology.
  • College Major/Degree
    Network Administration
  • Favorite Area of Science
    Computer Science
  • Occupation
    Network Adm.

NetSplitter's Achievements

Quark

Quark (2/13)

4

Reputation

  1. "I was recently reading something about the different features a website can recognize you by, and some people got into an argument about whether or not a website could recognize someone's MAC address. I had to Wiki that because I didn't know the difference between MAC and Mac. I'm sure I would have been more interested in the discussion if I knew what all the terms meant." Lol, I wanted to address the mac address question. The simple answer is no, there is no way a website can determine your mac address by just browsing to it. In the same sense your computer cannot determine the mac address of the web server you are accessing, unless of course it's on the same subnet as you on your network. ARP is a very interesting , read up on it if your are curious. "What does the "system" Tor (The Onion Router) do? I know what a Router is, and I had to hook one up one time." I've used Tor before but never for illegal reasons, just to try it out. From what I remember it seemed like a group of servers that the tor client would direct your traffic through, resulting in the ability to browse anonymouslywithout worryingabout someone tracking your steps back. I'm sure there is a "How Tor works" somewhere that could explain this much better. "What are "ports and protocols," and how are they related to hacking? I tried Wikipedia and Dictionary.com, but I couldn't understand their descriptions." Right as you were typing this message you were using several ports (port 80 for certain) and protocols (ARP,TCP,IP,HTTP,etc). I'm not for sure how to explain this unless you asked something specific. A very simple example would be if you did a "port-scan" on your local network and found a server that had port 22(protocol: ssh) open.You could then attempt to guess username/password, find an exploit, social engineer, etc to gain access to that server .
  2. Indeed the internet will not work, the reason being is routing within the network will be setup in such a way that the only route leading to the outside is via that proxy - so there really isn't a way to avoid going through it unless you can find another exit point (proxy) within the network that leads/allows traffic out. The real question was "Is there a possibility to unblock the websites without changing the proxy configuration?" And the answer is no. Depending on what software is being used to filter your traffic there isn't much you can do on the client side. You can try finding a web proxy online to "bypass" certain filtered content within the proxy on the network you are at, but this can get you in trouble so explore at your own risk and just be aware everything you are accessing is getting logged.
  3. iNow I must be missing something, because I don't quite know where I've been proved wrong. Nor do I know where I've proved anyone else wrong. Whatever you have sticking in your arse you might want to get it removed. Please point out what has been selective with my interpretation and where I've ignored factual content regarding what I posted. Also please point out where I have argued that "my" interpretation is the only right one and that everyone else is wrong. Your assumptions make this very unpleasant, and I don't enjoy such conversations. My interpretation of biblical scripture relies on cross referencing and historical relevance to the time period. I could care less if that has any relevance to you or not, but to me it gives me a broader picture of what I read. What did I post regarding Matthew 5-17 that was irrational? It is you who seems to have a problem with hearing any other interpretation than your "own". I enjoy discussion scripture, and I have no problem admitting when something doesn't sound morally fit to me.
  4. Jesus didn't condemn the women at the well for committing adultery, he condemned the ones doing the condemning (Not trying to just throw that in there, I find it a little relevant). The verse seems pretty focused towards the Pharisees and there hypocritical way of teaching. Much of the Old Testament laws were focused towards Israel, as you suggest he states that he didn't come to abolish the law, but he also says he came to fulfill it - which to my understanding leads to the new covenant which is based on absolute love. I will write more later, and respond to your other posts within a couple days.
  5. I was merely asking if you had studied the references that you made. Didn't realize I wasn't being clear enough.
  6. No worries, my replies will be spaced out as well due to life in general, but I will eventually write back as well.
  7. You said "that is what it says, no way to get around what it says except by violating the 9th commandment". Now to me your statement seems a little broad regarding what iNow had posted, I'm sure you were referring to many other topics within the bible instead of exclusively what iNow posted. But you made the claim so I am going to ask that you back it up, if you have read/studied the chapters and text regarding the statements you should have no problem providing me with your interpretation.
  8. I have too, but I may have interpreted it wrong. Since you're saying the statements below are true, I would be interested to read why? "In Matthew he advocates murder and states his approval of the hatred and ignorance expressed by the prophets in the old testament. In Mark (and also in Matthew) he advocates child abuse, and criticizes people who do not kill a disobedient child. Jesus also advocates death and killing in Revelations, and supports the beating of slaves in Luke. Not to mention... All of those I shared above in a previous post already... facts you seem to be conveniently choosing to ignore."
  9. Have you actually studied the chapters and text that you are referring to here and came to these conclusions yourself?
  10. Start here: http://simple.wikipedia.org/wiki/Algorithm
  11. I am in no way a dieter, but I have made drastic changes within the last year. A couple years ago my diet consisted of toaster strudel in the morning, eating out with co-workers at lunch, then eating dinner at a restaurant with my girl friend. I gained 15-20 pounds within a few months. To me this was unacceptable as this was the first time I truly had gained weight, and I slowly started changing my diet. I do not normally drink milk anymore, I prefer soy milk (silk regular to be specific ). Not just because it's healthier but I also like the taste more than milk. I have pretty much separated myself from any form of soda, I normally drink at least 3-4 bottles of water a day, normally it's spring water but I don't really care. I always make sure to eat breakfast in the morning, normally cereal or some kind of yogurt (blueberry normally). I do not drink alcohol. Lunch normally consist of subway. Dinner is a toss up, it may be a home cooked meal, out to eat, or just me scrambling together what I can find in the kitchen.
  12. Is this just at one place, or multiple hotspots that normally redirect? Some wireless spots are configured to redirect you to a web-based authentication page, and until you are authenticated you would be unable to access the internet. This could be a curse if redirection truly doesn't work. I would be more suspicious of the web browser vs the OS. I assume you would be using Firefox or ice weasel with Ubuntu, is Firefox what you use with your windows machine as well?
  13. I've spent a lot of time in hotels this year and I haven't found one yet that doesn't redirect me (either for 802.1x authentication or just to advertise their homepage). The "HTTP Redirect" is normally done by the wireless lan controller, or a Radius/Tacas server performing authentication IF used. It really depends on the technology, but a simple example would be this. 1. User connects to wireless and opens web browser with homepage set for "www.google.com" 2. DNS request is sent / received 3. TCP handshake completes 4. Client sends a HTTP GET to google server 5. Wireless lan controller sees the "HTTP GET" intercepts the packet and reply's back to the client with its configured redirect page. Using Linux wouldn't stop a "http redirect", not sure what you mean Externet?
  14. Wouldn't the key space be 2^56 instead of 7.2x10^16 (not that it matters because the answer is still the same hourly wise) - I've just never seen it written out like that. 2^56 / 7.2x10^16 = 7205 seconds = 2 hours. I would believe that to be correct. Useless side note: Although it would be VERY unlikely it would take two hours. On average brute force attacks will end up finding the correct key after half the keyspace has been attacked(central limit theorem) Just curious, is this for a class, certification, or just self-study?
  15. There are several open source options, I would suggest going to www.sourceforge.com and just looking. Be sure the project is active. Since this is a university you are designing this for, I am sure they have a MSDN agreement with Microsoft. Therefore I would suggest trying to get a hold of a SharePoint license. We use SharePoint where I am employed and I have been quite impressed with it. It integrates really well into AD environments.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.