Post

 Resources 

Console

Home | Profile | Active Topics | Members | Search | FAQ
Username:
Password:
Save Password
Forgot your Password?

 All Forums
 VBGamer
 VBGamer
 Cryptograhpy
 New Topic  Reply to Topic
 Printer Friendly
Previous Page
Author Previous Topic Topic Next Topic
Page: of 4

Brykovian
Bryk the Cheese Slayer!

USA
58 Posts

Posted - Nov 18 2004 :  9:44:54 PM  Show Profile  Visit Brykovian's Homepage  Click to see Brykovian's MSN Messenger address  Reply with Quote
quote:
Originally posted by Hacker9988

... willing to take any punishment that may come from my hacks to better mankind.


Wow -- aren't you the noble one!

Let me know which e-mail you're sending the BrickCrypt solution to ... thanks!

-Bryk


www.mwgames.com
Go to Top of Page

masterbooda
Swordmaster

277 Posts

Posted - Nov 22 2004 :  3:12:35 PM  Show Profile  Visit masterbooda's Homepage  Reply with Quote
Um....What's a Hack?

:>)Lol...

Can my title be "Talentless Fool"...hmmm...lol

DaBooda out....

P.S. Hack doesn't ryme with Game, so why is it here on a site dedicated to Games?...Hmmm...Does not compute...

DaBooda Team is back: http://dabooda.789mb.com/
Go to Top of Page

Brykovian
Bryk the Cheese Slayer!

USA
58 Posts

Posted - Nov 22 2004 :  3:57:03 PM  Show Profile  Visit Brykovian's Homepage  Click to see Brykovian's MSN Messenger address  Reply with Quote
quote:
Originally posted by Hacker9988

ok, i'll send u an email once i've got the encryption. I should be done shortly.




Still waiting, and ...

{breathes heavily into cupped hand ... sniffs hand}

... yep! My breathe's still baited!!

-Bryk

www.mwgames.com
Go to Top of Page

Knight Chat X
Squire

USA
24 Posts

Posted - Nov 23 2004 :  01:20:36 AM  Show Profile  Visit Knight Chat X's Homepage  Reply with Quote
quote:
If you don't already know from my name, I am a hacker. Normally a quite good one at that, but I'm stuck on something. I can't say much because of the sensitivity of this topic.


It's kinda funny but that sounds like the start of a game.

Here's a little fun game called Uplink, could learn somethin from this:
http://www.introversion.co.uk
Go to Top of Page

Hacker9988
script kiddie

23 Posts

Posted - Nov 23 2004 :  11:40:03 AM  Show Profile  Visit Hacker9988's Homepage  Send Hacker9988 an AOL message  Reply with Quote
I have seen that game and it is very far off from real hacking. Real hacking you have to locate a server, not just click on a location and connect. Advice from expirence, that game sux.

Dim YoureGay as Boolean

If YoureGay = True Then
Me.Visible = False
Else
Me.Visible = True
End If
Go to Top of Page

Knight Chat X
Squire

USA
24 Posts

Posted - Nov 23 2004 :  3:26:08 PM  Show Profile  Visit Knight Chat X's Homepage  Reply with Quote
It is just a game but for the most part the concepts of older higher level network hacking is there, it provides a real world like element, it actually shares info. of what it would take to perform a successful hack, it shows how serial series connections take place (not recommended), it mentions firewalls, hardware upgrades, scanners, logs, the purpose of each, and much more, and gives a lowdown on the method's that used to be more common, if you really knew what you are doing the obvious would be easily noticed. The game is more of a reflection of older networked systems before computers became more protected, but the basics are there, many aspects of the game are hyped up, but the simpler parts hold true to certain facts.

Bottom line, remove the delayed tracing timer idea and the first thing it should teach you is that when you make a connection there are fingerprints, logs, which record your activities, and you'll also notice for every system you branch off of there is another log, everytime u connect the new connection is logged on every machine leading back to yours, in reality that's all true, even when an IP is spoofed, the bigger picture is the big guys like the white hats monitor bigger stuff, but never assume the small stuff goes ignored, unless you can remove all logs of your activities from all machines you're basically out of luck, back when system's weren't as protected this might have been a piece of cake, but today, no way, even your hardware now contains logs, if you have a high speed connection your modem is basically it's own seperate computer, that's right, and it keeps in sync with your ISP so long as it's connected and power turned on, I could go into this and make a book but I've got more important things to do, I'm just tryin to show ya why it's not such a good idea to hack a website these days, I just do not recommend it, if that saves some kid from making a small mistake that'd cost them more than they know it's worth it to post here.

Think I'm done here, about to watch some new game trailors.

Laterz!



The net is getting bigger and bigger.
Go to Top of Page

ballistik
Moderator

72 Posts

Posted - Nov 23 2004 :  4:55:20 PM  Show Profile  Reply with Quote
quote:
It is just a game but for the most part the concepts of older higher level network hacking is there, it provides a real world like element, it actually shares info. of what it would take to perform a successful hack, it shows how serial series connections take place (not recommended), it mentions firewalls, hardware upgrades, scanners, logs, the purpose of each, and much more, and gives a lowdown on the method's that used to be more common, if you really knew what you are doing the obvious would be easily noticed. The game is more of a reflection of older networked systems before computers became more protected, but the basics are there, many aspects of the game are hyped up, but the simpler parts hold true to certain facts.

Bottom line, remove the delayed tracing timer idea and the first thing it should teach you is that when you make a connection there are fingerprints, logs, which record your activities, and you'll also notice for every system you branch off of there is another log, everytime u connect the new connection is logged on every machine leading back to yours, in reality that's all true, even when an IP is spoofed, the bigger picture is the big guys like the white hats monitor bigger stuff, but never assume the small stuff goes ignored, unless you can remove all logs of your activities from all machines you're basically out of luck, back when system's weren't as protected this might have been a piece of cake, but today, no way, even your hardware now contains logs, if you have a high speed connection your modem is basically it's own seperate computer, that's right, and it keeps in sync with your ISP so long as it's connected and power turned on, I could go into this and make a book but I've got more important things to do, I'm just tryin to show ya why it's not such a good idea to hack a website these days, I just do not recommend it, if that saves some kid from making a small mistake that'd cost them more than they know it's worth it to post here.




That's what I'm talkin' about! ... well said.

_____________________
..::||::..
Go to Top of Page

Crysstaafur
Squire

USA
37 Posts

Posted - Nov 26 2004 :  7:09:45 PM  Show Profile  Visit Crysstaafur's Homepage  Send Crysstaafur an AOL message  Reply with Quote
http://www.thisisnotporn.com

If you can make to the hidden forums at this site, then I honestly verify your skill.
I am a retired hacker/phreak.

Sadly, actual hackers are vanishing. Ok, being one of the surviving few that still operate from time to time, let me give you some ideas to try, purpose, well,.. that's for you to decide.

Learn how win32 memory addresses are setup, create a program that uses only peek and poke to write and read values from a lpt port, has an embedded controller receive those signals from a homebrew dev cable to activate a beer catching robot.
The point:A true hacker will seem to waste time on things that others would find mind-numbingly pointless.

History lesson/another example:Do you know the name of the first hacker to exist? The father of phone phreaking.. Captain Crunch was his nick. He was the first person who discovered that if you blow a 'captain crunch' whistle (not made anymore...) into a freshly picked up telephone you could dial a single digit. Slight alterations of that signal produce the other tones. even tech tones. 8P Thus the first blue box was born in 1969 at Berkley U.

2nd piece of advice:Unless you can actually crack keyless quantum encryption, always play lame like you don't know a thing. Only share with those who you trust, or in the case of encountering a young one, always challenge them first, if they do well, then reward. If they fail,.. well, by now you should know.

3rd project:Try to write an AI with Heuristic reasoning in VB.

Final point:Not all hackers are theives, not all hackers will call themselves hackers, many aren't even aware that is what they are doing (old Berkley definition of it anyway..). One of the values we hold is that of freedom of information with non-conformity. This is what drives you to your current project does it not? If you really want to buff up in that sense(and I don't condone it, as I have already shown you the white hat direction) then make your own web server, learn to administrate it. Then from another computer connected to the internet elsewhere try to 0wn yourself. That a way, no one innocent is hurt. Think about it. l8trz
Go to Top of Page

Brykovian
Bryk the Cheese Slayer!

USA
58 Posts

Posted - Nov 28 2004 :  8:17:17 PM  Show Profile  Visit Brykovian's Homepage  Click to see Brykovian's MSN Messenger address  Reply with Quote
Excellent post, Crysstaafur! That perfectly fits what I think of a "real" hacker ... but perhaps that has to do with my age.

quote:
Originally posted by Crysstaafur

in the case of encountering a young one, always challenge them first, if they do well, then reward. If they fail,.. well, by now you should know.


Sounds familiar ...

And Hacky ... I'm still waiting. Something tells me that Cryss already has my routine figured out.

-Bryk

www.mwgames.com
Go to Top of Page
Page: of 4 Previous Topic Topic Next Topic  
Previous Page
 New Topic  Reply to Topic
 Printer Friendly
Jump To:
VBGamer © Go To Top Of Page
This page was generated in 0.17 seconds. Snitz Forums 2000

Copyright © 2002 - 2004 Eric Coleman, Peter Kuchnio , et. al.