Search found 17 matches

Return to advanced search

Re: Predator USB key lock

In response to the question about what happens if you lose the USB, you have a password you can use to unlock it.
by capflyboy
on Sat Jul 16, 2011 12:52 am
 
Forum: General
Topic: Predator USB key lock
Comments: 11
Views: 13160

Predator USB key lock

I'm currently using this and am enjoying it. (and have been for a while) This program uses a USB key to lock/unlock your computer. (desktop or laptop) You can determine the read/write intervals so you can tell it how often to detect the key. The best part is, with the free version, if you lose USB's...
by capflyboy
on Fri Jul 15, 2011 1:58 am
 
Forum: General
Topic: Predator USB key lock
Comments: 11
Views: 13160

Re: Pl4ase h3lp m3 h4x0r!!!

To be honest... idk.
It's always how I've posted on any form I guess.
Sandbox, ik its no huge accomplishment, but hey, the SQLi's take a bit of work.
We all started somewhere right?
by capflyboy
on Wed Jul 13, 2011 8:30 pm
 
Forum: NZone
Topic: Pl4ase h3lp m3 h4x0r!!!
Comments: 17
Views: 9672

Re: Pl4ase h3lp m3 h4x0r!!!

The title is worse than the content if you ask me. We dont teach. I was in your spot, I came here knowing nothing months back. I now know how to do DoS attacks, SQL injections, and a few other things I taught MYSELF. Sure, the guys here gave me recources, tips, tricks, and hints. But never were like...
by capflyboy
on Wed Jul 13, 2011 3:42 pm
 
Forum: NZone
Topic: Pl4ase h3lp m3 h4x0r!!!
Comments: 17
Views: 9672

Re: Opinions on LOIC

What would be the most efficient "attack?" An ICMP Flood or a SYN flood? Some people say you can ping a computer to death. Wouldnt that take a few users and alot of time? lol I dont know code enough yet to make my own program for a DoS. I do know that the SYN works by sending a bunch of TC...
by capflyboy
on Wed Jul 13, 2011 2:55 pm
 
Forum: General
Topic: Opinions on LOIC
Comments: 14
Views: 12580

Re: Opinions on LOIC

What would be a good place to learn and understand how it works?

I dont think it's wrong to use these programs.
As long as you know whats happening, and whats behind that button you're pushing.
I dont see anything wrong with that.
by capflyboy
on Wed Jul 13, 2011 2:24 pm
 
Forum: General
Topic: Opinions on LOIC
Comments: 14
Views: 12580

Opinions on LOIC

I've heard good and bad about LOIC. What are your opinions? I saw a post from a ways back asking for help in the New Zealand DDoS attacks. They had a link and everything to the anonomyous IRC for operation payback... They linked to sourceforge so people could help wit the DDoS. I figure if it's in l...
by capflyboy
on Wed Jul 13, 2011 2:43 am
 
Forum: General
Topic: Opinions on LOIC
Comments: 14
Views: 12580

Re: SQL Injection (some help)

Of course it's just for informational purposes. Anybody else who would think different would have to be daft. http://www.youtube.com/watch?v=7dLqyRCzx0U There are 5 (FIVE) parts of this tutorial. Watch them, learn from them. Do not skip around and guess your way through. The goal is to learn. Not be...
by capflyboy
on Wed Jul 13, 2011 1:01 am
 
Forum: General
Topic: SQL Injection (some help)
Comments: 16
Views: 16252

Re: SQL Injection (some help)

Theres some sites that actually give you a list of SQL Injection vulnerable sites. What you do with that info is your business. Theres a few tutorials on youtube on how to do it with the firefox hackbar. You still learn some code and why it works in those tutorials. Does anyone think it would violat...
by capflyboy
on Wed Jul 13, 2011 12:05 am
 
Forum: General
Topic: SQL Injection (some help)
Comments: 16
Views: 16252

Re: How to Protect yourself from guys like us!

As acevic said. no risk, no fun.
Thats why we do this.
We get a thrill out of the risk, and the knowledge we gain from it.
(I speak for myself at least. I've heard a few others say they feel the same.)
by capflyboy
on Tue Jul 12, 2011 11:53 pm
 
Forum: General
Topic: How to Protect yourself from guys like us!
Comments: 30
Views: 18208
Next

Return to advanced search