Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.


Filter this topic showing only the reply marked as answer View this topic in a long page with up to 500 replies per page Create new topic
1 | 2 | 3
mercutio
1392 posts

Uber Geek
+1 received by user: 134


  #844081 25-Jun-2013 16:11
Send private message

well until microsoft releases the source code, only employees with full source access can know, and even then it may be obscured.



nathan
5695 posts

Uber Geek
+1 received by user: 1630
Inactive user


  #844083 25-Jun-2013 16:25
Send private message

kiwigeek1: I recall I got laughed at when I said USA was spying on NZ emails.. seems the conspiracies arent always wrong after all. if they werent spying why is PGP with the 1000bit keys not included in all email systems
they once tried to close this guys program down as they could decoded emails.. until they found out
the 256 key was able to be broken cos it had a flaw that made it only 96bits

i say by backdoor they mean they could hack windows security and get in.. theres various windows PE disks with such tools that can edit the registry and change password in seconds or make a guest account super user.. easy to find them online with google searches now if hackers can do it Im sure nsa has more powerful tools then tis

have a listen to these

http://www.youtube.com/watch?v=VjXLRXxUELs

http://www.youtube.com/watch?v=kjmGMOtytLc

http://www.youtube.com/watch?v=4mIdDf3ZwSo


Snowdon wasnt the first whistle blower.. a few come before him that were silenced


don't take this the wrong way, but using a boot disk to edit the SAM or Windows Registry isn't a hack

if you want to protect your data/PC at rest it should be BitLocker encrypted

please read the 10 Immutable Laws of Securityhttp://technet.microsoft.com/library/cc722487.aspx#EIAA

 

Law #3: If a bad guy has unrestricted physical access to your computer, it's not your computer anymore

 

 

kiwigeek1
637 posts

Ultimate Geek
+1 received by user: 12
Inactive user


  #844084 25-Jun-2013 16:25
Send private message

whats interesting even a year ago there was talking of MS allowing some code to be implanted
into skype so NSA could spy on it directly

http://www.globalpost.com/dispatch/news/business/technology/120724/microsoft-hot-water-over-skype-spying-allegations

and now a year on.. come 4th july sounds liek theres some big protests coming



DarthKermit
5346 posts

Uber Geek
+1 received by user: 3317

Trusted

  #844087 25-Jun-2013 16:27
Send private message

Considering how full of security holes most MS software has been in the past, I would not be surprised.

Hackers have been busy doing their thing for years with MS products, so why not the biggest hackers like the NSA?




Whatifthespacekeyhadneverbeeninvented?


nathan
5695 posts

Uber Geek
+1 received by user: 1630
Inactive user


  #844091 25-Jun-2013 16:30
Send private message

DarthKermit: Considering how full of security holes most MS software has been in the past, I would not be surprised.

Hackers have been busy doing their thing for years with MS products, so why not the biggest hackers like the NSA?


I think you mean most Software

its generally recognised now in Security circles when Microsoft started their Trustworthy Computing Initiative all those years ago, its being paying dividends for a few years now

kiwigeek1
637 posts

Ultimate Geek
+1 received by user: 12
Inactive user


  #844094 25-Jun-2013 16:30
Send private message

Listen to the 3rd part on IRS.. what they said was so true.. everyone trusts and follows main stream media

which is trying to convince peopne how bad whistle blowers are all the time.

look at wikileaks Julian.. do you know what the charge was on him to get hin?

believe it or not.. cos the girl he was dating said he didnt want to wear a condom during sex
and oddily enough another girl came forward with the same charge..

and they listing it under rape. theres some very good docus on him that have yet to
air on NZ tv

as for edit sam as not a hack.. and using encryption.. do you think the US cant break a encrypted drive?

they only allow encryptions that they can break.

 
 
 

Want to support Geekzone and browse the site without the ads? Subscribe to Geekzone now (monthly, annual and lifetime options).
kiwigeek1
637 posts

Ultimate Geek
+1 received by user: 12
Inactive user


  #844100 25-Jun-2013 16:34
Send private message

Here is another good watch.. War on Whistleblowers

http://www.youtube.com/watch?v=Gl5Z9HgwyT8

1080p
1332 posts

Uber Geek
+1 received by user: 152
Inactive user


  #845281 25-Jun-2013 21:22
Send private message

Well, if you don't encrypt your hard disks then anyone has a 'backdoor' assuming they gain physical access. Unless the NSA have found a way to add 'backdoor' access to every router on the planet then I doubt that vulnerability, assuming it exists, would matter.

kiwigeek1
637 posts

Ultimate Geek
+1 received by user: 12
Inactive user


  #845286 25-Jun-2013 21:30
Send private message

Did you never read this a few years ago? darn they did have backdoors still exists who knows

http://www.networkworld.com/community/node/57070

kiwigeek1
637 posts

Ultimate Geek
+1 received by user: 12
Inactive user


  #845290 25-Jun-2013 21:39
Send private message

seems router exploiots are still there.. and only way is to active monitor them constantly

this was posted in march 2013

http://www.vty-hosting.com/post-exploitation-techniques-cisco-router-backdoor/

1080p
1332 posts

Uber Geek
+1 received by user: 152
Inactive user


  #845344 25-Jun-2013 23:05
Send private message

Are these exploits for CPE?

 
 
 

Want to support Geekzone and browse the site without the ads? Subscribe to Geekzone now (monthly, annual and lifetime options).

gjm

gjm
810 posts

Ultimate Geek
+1 received by user: 122


  #845872 27-Jun-2013 08:30
Send private message

Listening to some podcasts on Computer Security there seems to be an idea that even the NSA wouldnt be able to break high level encryption. Rather, they are looking at Network Analysis to see where network traffic is going and building up a profile of "suspects" that way. I imagine knowing who "insert current axis of evil leader here" is talking to most often could be just as valuable as what they are saying sometimes.




Do surveys for Beer money (referral link) - Octopus Group 

 

Link for buying beer (not affiliated, just like beer) - Good George


kiwigeek1
637 posts

Ultimate Geek
+1 received by user: 12
Inactive user


  #846118 27-Jun-2013 13:47
Send private message

Well according to some whistle blowers that left NSA I recall him saying they had the fastest computer
in the world back in 1988 that was as fast modern cluster of pcs..how true we never really know.. . so who knows what tech they have now
and no doubt they still have the fastest computers

as you know you can use GPUs in a PC and cluster them to process one part of the hacking
for brute force

whats the name of the tool where you can do this for your self? you can capture a few wifi packets and do the bruteforce offline or check how secure your windows passwords are from the attack etc

soft slips my mind... goes away and looks it up..

back....found it.. cain and abel I believe it is.. impressive list of things it does.
I think it was done by a university.. its used by administrators for checking their own systems out

http://ultimatepeter.com/cain-and-abel-hacking-swiss-army-knife/

K1w1G33k
38 posts

Geek
+1 received by user: 1


  #846128 27-Jun-2013 14:02
Send private message

michaelmurfy: You're starting to sound like this guy:



LOL!! That made my day, sounds like some users I support at work :)




Click to see full size


DarthKermit
5346 posts

Uber Geek
+1 received by user: 3317

Trusted

  #846141 27-Jun-2013 14:11
Send private message

^^^

Looks like that guy has a very passing relationship with both his toothbrush and his sanity.




Whatifthespacekeyhadneverbeeninvented?


1 | 2 | 3
Filter this topic showing only the reply marked as answer View this topic in a long page with up to 500 replies per page Create new topic








Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.