Search found 70 matches

Return to advanced search

Re: Java switch statement

sanddbox wrote:
Reason7194 wrote:Ah, thanks. Question: Why must i set the IOException to a character?


Remember that in Java, everything is an object. IOException is...well, no exception.


I see what you did there ;)
by yourmysin
on Mon Jan 31, 2011 9:57 am
 
Forum: Programming
Topic: Java switch statement
Comments: 8
Views: 7916

Re: Prog Battle: Round 1

Good challenge TheTan. I didn't submit a solution, but I'm proposing another, more challenging, challenge. Given some set (Which may contain duplicates) write a program to generate all permutations of the set. Also, write a function f(n) which will compute the cardinality of the set containing all p...
by yourmysin
on Wed Jan 12, 2011 10:51 am
 
Forum: Programming
Topic: Prog Battle: Round 1
Comments: 18
Views: 7552

Re: Hacking For Dummies - good/bad for beginners?

I bought this book about 5 years ago and it was a complete waste of $30. You can learn more just by browsing this forum.

If you're looking to learn check out Hacking: The Art of Exploitation. Also, check out the blogs of some people in the industry such as Bruce Schneier - http://www.schneier.com/
by yourmysin
on Wed Jan 12, 2011 10:44 am
 
Forum: Books
Topic: Hacking For Dummies - good/bad for beginners?
Comments: 9
Views: 18744

Re: Digital Fortress - Dan Brown

Dan Brown is known for books containing misleading information. This is true for The Lost Symbol, The Da Vinci Code, Digital Fortress, Angels and Demons as well as Deception Point. I've read them all and can attest to this. Otherwise, he's a decent writer. He likes to keep chapters short (sometimes ...
by yourmysin
on Sun Jan 09, 2011 11:33 am
 
Forum: Books
Topic: Digital Fortress - Dan Brown
Comments: 20
Views: 22470

Re: 1066 archery club website

Sandbox, HackThisSite has enough controversy over whether we are Legal or not, we don't want to take any chances. Assuming the site was previously attacked and exploited, someone will find out. The first step after you realize your site was compromised- Look at the logs. What would you think if you ...
by yourmysin
on Fri Dec 25, 2009 12:07 am
 
Forum: Web
Topic: 1066 archery club website
Comments: 10
Views: 7728

Re: TrueCrypt

Read the wiki.

It's important to make sure your computer is ONLY powered on while you're using it.
by yourmysin
on Wed Dec 23, 2009 12:32 pm
 
Forum: Crypto
Topic: TrueCrypt
Comments: 6
Views: 7270

Re: how i can hack web site..

Based on his named signature and English ability, he may not be a native English speaker. In that case, I feel it is even more important to help him. But, to be honest, I'm not sure exactly what he is looking for. That being said, lets give him a few days and see if he responds. Otherwise, I'll clos...
by yourmysin
on Wed Dec 23, 2009 11:40 am
 
Forum: NZone
Topic: how i can hack web site..
Comments: 9
Views: 6058

Re: Hack this zine #8

I sent them an email. Hope it gets fixed.
by yourmysin
on Wed Dec 23, 2009 11:36 am
 
Forum: Off-Topic
Topic: Hack this zine #8
Comments: 2
Views: 3374

Re: TrueCrypt

Truecrypt is pretty handy. At this point in time the use of cryptography in the court room really impacts the case. Truecrypt and other hard drive encryption schemes are generally vulnerable to something called a "Cold Boot Attack". Basically, when a hard drive is fully encrypted the passw...
by yourmysin
on Wed Dec 23, 2009 11:31 am
 
Forum: Crypto
Topic: TrueCrypt
Comments: 6
Views: 7270

Re: Backdoors in Web Applications

Don't forget about popen, passthru and backticks (If PHP is configured for command execution)-

For instance, will display all contents in the directory

Code: Select all

<?php
   echo 
`ls -a`;
?>
by yourmysin
on Sat Dec 19, 2009 2:45 pm
 
Forum: General
Topic: Backdoors in Web Applications
Comments: 1
Views: 2874
Next

Return to advanced search