This forum is in archive mode. You will not be able to post new content.

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - x86_64

Pages: [1]
1
General discussion / What Makes a Good Blog Article?
« on: September 29, 2012, 11:17:41 PM »

Everyone knows that the human mind is pre-determined to read in sections of information. When reading a thread we expect to get a very short introduction to the context, followed by a thorough explanation of the issue at hand. Then we expect either a question to be raised or a summary to be presented. This is so that the human mind can process it adequately without reading back over the article. [End introduction to context]


Currently I am planning on making a blog, and am considering what order/format (shown by context above, avoiding re-reading) would be best for readers to find reading the articles "clear" (require minimal thought) and therefore make reading the blog most enjoyable to those interested in the niche. Assume that the people reading natively speak english, which allows the connotations and order of learning common from their grammar be consistent for discussion. [End thorough explanation]


What order do you expect?
I will provide, after a couple of replies, my opinion... hopefully this will become a good discussion that we can all benefit from. So please reply high quality with a lot of consideration. [End of question/summary]

2
C - C++ / Re: My Simple PortScanner [*nix]
« on: September 23, 2012, 10:18:53 PM »
Was tested on mac, one with real specs. I didn't bother with optimisation as it just gets the job done.

3
C - C++ / My Simple PortScanner [*nix]
« on: September 06, 2012, 11:23:17 PM »

This is just a basic TCP Port scanner that returns a list of the ports and whether or not they are open. It should run on any *nix system. Due to adding the import "sys/types.h", it will also run on legacy BSD systems which don't include the needed definitions in "sys/socket.h". It takes the IP to be scanned as the only argument when run from the command line.


Code: [Select]
#include <stdio.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netdb.h>


int main(int argc, const char * argv[])
{
    int s, port;
    struct hostent *hostaddr;
    struct sockaddr_in servaddr;


    servaddr.sin_family = AF_INET;
    hostaddr = gethostbyname(argv[1]);


    for (port=0; port<=65535; port++)
    {
  s = socket(PF_INET, SOCK_STREAM, IPPROTO_TCP);
  servaddr.sin_port = htons(port);


  if(connect(s, (struct sockaddr *) &servaddr, sizeof(servaddr)) == -1)
    printf("Port %d is closed\n", port);
  else
    printf("Port %d is open\n",port);
    close(s);
    }


    return 0;
}


I compiled it with gcc 4.2.1 and tested it on a mac.

4
Hacking and Security / Re: Oracle
« on: September 02, 2012, 01:14:03 PM »

5
Hacking and Security / Re: Oracle
« on: September 02, 2012, 12:47:01 PM »
So what is the question?

6
General discussion / Re: free software
« on: September 02, 2012, 12:45:23 PM »
Or maybe release a free version, then add features based on feedback to suit the end-user better. In the newer, more fully featured, version charge a little, and when you release a new one rinse and repeat. So there is always an  older version for free for those who need it, but the new shiny added feature one for those who want it and can afford it?

7
Projects and Discussion / Re: Malware development tips and tricks
« on: September 02, 2012, 12:35:11 PM »
Personally I think malware should benefit the black hat with minimal damage to the victim. Otherwise it is as pointless as vandalism.

8
General discussion / Re: free software
« on: September 02, 2012, 12:15:29 PM »
Ethically, I agree with the donation idea, but I also think that it will never work as those with the money to pay most likely wont as they will think "but they didn't have to pay". Open source applications are definitely replacing commercial applications. Companies still believe, though they use a lot of open source, that any applications other than development tools are to be purchased from commercial sources. If there is even a remote chance that it can affect their reputation and/or income. This is purely because of the lack of support available.


Companies need guarantee's, they NEED to have someone to blame when their systems fail. If we could market support to them appropriately then companies would be much happier to take on open source. All the examples above are used in educational facilities which will give companies the ability to put it on paper "our employee x123 has used this in an educational environment, we'll blame him".

9
Projects and Discussion / Re: Collie IDE
« on: September 01, 2012, 10:51:16 PM »
Java was chosen as I have used it before quite a bit and it is cross-platform. I haven't got much experience using C or C++. This will be my first full-scale desktop application so I will do it in Java. I think I will stick with Java for now, if the job I get wants me to work in another language I will learn that obviously. For now I will stick to what I have previously used until I get some experience.
Do you think I should make a debugger Kulverstukas, or should it be left for future possible improvements?

@area_13, have you tried "dr java"?

10
Projects and Discussion / Re: Collie IDE
« on: September 01, 2012, 10:01:16 PM »
What is it specifically you mean by debugger?
(Please elaborate, sorry)

11
Projects and Discussion / Collie IDE
« on: September 01, 2012, 09:52:18 PM »
I am about to start coding my own IDE (as a learning experience) using Java. The IDE will only support Java (at least to begin with). I am not sure about the features I should include, please post below with any features you would like to see/use regularly in an IDE?

This is a list of the features I hope to implement so far:
  • Auto-complete.
  • Auto-generate main class on project creation.
  • Code folding.
  • Code generation (getter/setter).
  • Compile returning errors.
  • Find and replace keywords (and refactor class names etc)
  • Highlight matching bracket.
  • Project panel.
  • Run able to kill it if needed.
  • Syntax highlighting.
Thank you for reading, and thank you even more for all replies.

Future possible features:
  • Debugger.

Documents:

12
Anonymity and Privacy / Re: Apple Machines and Anonymity.
« on: September 01, 2012, 07:48:30 PM »
Sorry for going off topic.

13
Anonymity and Privacy / Re: Apple Machines and Anonymity.
« on: September 01, 2012, 07:14:16 PM »
Thank you Namespace7.
I'll follow your advice. I wont 'do anything stupid'. For the time being I am just trying to get learning resources (on a budget). so that I can program open source applications, currently trying to decide on the programming language I should specialize in (Computer Science graduate) and the field that I could be of most service to within open source.

14
Anonymity and Privacy / Re: Apple Machines and Anonymity.
« on: September 01, 2012, 06:51:35 PM »
@kulverstukas
I work using linux and mac. Over time I progressed to only using apple machines as personal preference.

@namespace7
Sorry for the ambiguity. I meant from the specific applications. I know that the apple store is logged into by default, but I was not sure what other built-in applications put out data without my input. I do wish to learn more to understand it all enough that I wouldn't need to ask this question, but just need some rough guidance to remain anonymous while I am learning. I understand that I shouldn't be at risk as I do not know enough to exploit anything, but I just want to make sure I am secure to download ebooks for educational purposes.(Piracy)

15
Anonymity and Privacy / Apple Machines and Anonymity.
« on: September 01, 2012, 06:13:13 PM »
All my devices are from Apple. this includes an iDevice, a laptop and a desktop. I use tor and plan on working on some black hat research to learn how the exploits work first hand, so that I can defend against them. I have read the sticky in this section and the two part tutorial on remaining anonymous. I was going to use wireshark to find this out but felt that still being rather amateur and not being specifically familiar with that tool I may miss most things.
  • What data is being leaked from these devices?
  • How do I turn disable data being leaked?
Thank you for reading.

Pages: [1]


Want to be here? Contact Ande, Factionwars or Kulverstukas on the forum or at IRC.