• Lucid Dreaming - Dream Views




    Results 1 to 17 of 17
    1. #1
      Member
      Join Date
      Oct 2010
      LD Count
      Working on it.
      Gender
      Posts
      14
      Likes
      0

      Ask me things :D

      I'm quite the tech type of person, though my intentions are not usually meant for the good, they are usually malicious in just about any way I can think of. As many of you may classify people under the general category of "hackers," I would be one of them. Ask away and I shall try to answer .

    2. #2
      Banned
      Join Date
      Nov 2007
      LD Count
      im here for you
      Location
      australia
      Posts
      3,677
      Likes
      415
      What codec/container for your music files do you prefer? Preferred bitrate? If you had 30 TB of storage at any given time, would you use FLAC?

    3. #3
      Member
      Join Date
      Oct 2010
      LD Count
      Working on it.
      Gender
      Posts
      14
      Likes
      0
      Quote Originally Posted by no-Name View Post
      What codec/container for your music files do you prefer? Preferred bitrate? If you had 30 TB of storage at any given time, would you use FLAC?
      Umm, I'm not much the music type . Though, I prefer my music files to be in 320 bitrate MP3 files, if I had 30 TB of storage I'm pretty sure it wouldn't be used for music at all. (There would be a ton of games .) As for FLAC, I think I'd rather just stay plain and simple with using MP3 considering I usually have many iDevices that I sync with.

    4. #4
      Member Achievements:
      1 year registered Veteran First Class 5000 Hall Points

      Join Date
      Sep 2004
      Gender
      Location
      Seattle, WA
      Posts
      2,503
      Likes
      217
      Since people are more gullible and less secure than software, I'm wondering what percentage of your "hacking time" do you spend on some form of social engineering (e.g. phishing)?

    5. #5
      Member
      Join Date
      Oct 2010
      LD Count
      Working on it.
      Gender
      Posts
      14
      Likes
      0
      Quote Originally Posted by Replicon View Post
      Since people are more gullible and less secure than software, I'm wondering what percentage of your "hacking time" do you spend on some form of social engineering (e.g. phishing)?
      In my personal experiences the use of social engineering was rare for me. I would not use it very often unless it was to run a scam on Microsoft to get free keyboards and mice :3. As for phishing, I never got into it because uploading a virus to a popular game or software was a much easier method to getting accounts of all varieties. To give you an exact percent I would have to say about 2% of my time was spent social engineering.

      Keep the questions coming .

    6. #6
      Member Achievements:
      1 year registered Veteran First Class 5000 Hall Points

      Join Date
      Sep 2004
      Gender
      Location
      Seattle, WA
      Posts
      2,503
      Likes
      217
      Haha that's so true, "fake" anti-virus software is the best. You'd think, when you see the "your computer is slow" popups, that it's just an amateur job, but when you actually install those tools, they're sometimes really, really, professionally done!

      Ok, here's another question: What's your motive? Some people are pranksters... some are malicious for their own gain (financial), while others are doing things out of principle.

    7. #7
      Member
      Join Date
      Oct 2010
      LD Count
      Working on it.
      Gender
      Posts
      14
      Likes
      0
      Quote Originally Posted by Replicon View Post
      Haha that's so true, "fake" anti-virus software is the best. You'd think, when you see the "your computer is slow" popups, that it's just an amateur job, but when you actually install those tools, they're sometimes really, really, professionally done!

      Ok, here's another question: What's your motive? Some people are pranksters... some are malicious for their own gain (financial), while others are doing things out of principle.
      My motive use to be just to have some fun with the people, I did run through finding some girls that I played with their minds for a day or two, but I eventually just let them be and moved on. I don't mean any large harm, although I did one time delete a guys secondary hard drive because when I viewed his webcam he gave me the middle finger D:, I taught him to do that again.

    8. #8
      Member
      Join Date
      Feb 2004
      Posts
      5,165
      Likes
      711
      Personally I think we should get out of Iraq and Afghanistan, and use our trillion dollar military to invade countries that harbor cyber terrorist. And I include the people who created the fake anti virus, viruses as cyber terrorists. While destroying a persons computer, is not nearly as dramatic as blowing something up, it does far more property damage on a larger scale, and the suffering is spread across millions of people, instead of dozens or hundreds.

      Some people think computers and they picture nerdy kids and stuff, not me though. I picture an old lady who uses the computer to keep in touch with her grand children. I see my mother, playing games on myspace and trying to keep in touch with her friends. I see small business people, trying to make a living so they can feed their family. I see young kids, just playing and trying to have fun.

      What kind of sick person, goes around trying to ruin other people's lives? In my opinion, destroying someone's computer is worse than mugging them. For starters a new computer probably costs more than a person would be carrying around on them. Secondly, its such a personal attack, to target someone's computer.

      Like you mentioned though, hacking is a pretty board and vague term. Not all of which are really that harmful. Normally I don't think of viruses and hacking in the same terms, because in my opinion people who use viruses are far worse, and usually full blown criminals. You mentioned viruses though, so I am curious what kind of stuff you have done in regards to them.

    9. #9
      Rehguh lar Doode
      Join Date
      Nov 2010
      LD Count
      1
      Gender
      Location
      Hurlburt Field, FL
      Posts
      21
      Likes
      3
      DJ Entries
      1
      Here's and easy one. To see how much of a hacker you are you should know the basic of basics. What is the first 48 bits of any packet being sent on a TCP/IP network and most other networks?

    10. #10
      Member
      Join Date
      Oct 2010
      LD Count
      Working on it.
      Gender
      Posts
      14
      Likes
      0
      Quote Originally Posted by Birbs07 View Post
      Here's and easy one. To see how much of a hacker you are you should know the basic of basics. What is the first 48 bits of any packet being sent on a TCP/IP network and most other networks?
      You know what, I could google that but instead I'm going to give you a straight up answer. I never studied packets on TCP/IP networks, seeing as how there are many many subjects that a "hacker" can dwell on I never found packets one that I felt like messing with.

    11. #11
      Rehguh lar Doode
      Join Date
      Nov 2010
      LD Count
      1
      Gender
      Location
      Hurlburt Field, FL
      Posts
      21
      Likes
      3
      DJ Entries
      1
      Ok, what port is most commonly left wide open for you to gain access to an average home computer?

    12. #12
      Member
      Join Date
      Oct 2010
      LD Count
      Working on it.
      Gender
      Posts
      14
      Likes
      0
      Quote Originally Posted by Birbs07 View Post
      Ok, what port is most commonly left wide open for you to gain access to an average home computer?
      I've found port 80 to be the most common to be open, but in all seriousness, open ports do not do much for accessing home computers. You may hear rumors such as, "open ports allow a hacker to gain access," but that's not very true, never have I ever heard of any person using an open port to access someones computer.

    13. #13
      Rehguh lar Doode
      Join Date
      Nov 2010
      LD Count
      1
      Gender
      Location
      Hurlburt Field, FL
      Posts
      21
      Likes
      3
      DJ Entries
      1
      Well ports can be used for simple tasks like accessing someones webcam without them knowing about it and other random crap, but good call.

    14. #14
      Member
      Join Date
      Oct 2010
      LD Count
      Working on it.
      Gender
      Posts
      14
      Likes
      0
      Quote Originally Posted by Birbs07 View Post
      Well ports can be used for simple tasks like accessing someones webcam without them knowing about it and other random crap, but good call.
      Thanks

    15. #15
      FreeSpirit RooJ's Avatar
      Join Date
      Oct 2005
      Gender
      Posts
      680
      Likes
      49
      Ok, what port is most commonly left wide open for you to gain access to an average home computer?
      I've found port 80 to be the most common to be open, but in all seriousness, open ports do not do much for accessing home computers. You may hear rumors such as, "open ports allow a hacker to gain access," but that's not very true, never have I ever heard of any person using an open port to access someones computer.
      Well its not the port thats the issue, its the service behind it. Generally most home computers wont be running a great deal of software that opens ports anyway. Occasionally vulnerabilities are found for OS services, such as the old lsass vuln that worms like sasser exploited, but browsers tend to be the biggest security issue for home computers. As far as ports are concerned (and forgetting webpage vulns such as scripting issues, sql injection etc) websites tend to be a little more vulnerable because they're more likely to have services such as FTP, SSH and the likes running which can be vulnerable to attack.

      Leet, i was wondering if you had much experience with reverse engineering software?

    16. #16
      Banned
      Join Date
      May 2009
      LD Count
      4
      Gender
      Location
      Ohio
      Posts
      73
      Likes
      8
      DJ Entries
      1
      Are you the reason that Trojan made the condom? To protect from your virtual STD?

    17. #17
      Lucid BAWS PXUmais's Avatar
      Join Date
      Aug 2010
      Gender
      Location
      London, :)
      Posts
      255
      Likes
      13
      Favourite RAT (If you use one)?
      What languages do you know?
      Similar to "RooJ"'s query; any experience with reverse engineering software?
      Any Phreaking experience?
      "Logic will get you from A to B. Imagination will take you everywhere." – Albert Einstein.

    Similar Threads

    1. Things to do in LDs
      By jordan1000 in forum General Lucid Discussion
      Replies: 1
      Last Post: 07-02-2010, 02:17 AM
    2. 3 things...
      By Fabio-the-dreamer in forum General Lucid Discussion
      Replies: 2
      Last Post: 11-09-2009, 11:16 AM
    3. Things that you wish were possible.
      By Songbird in forum Beyond Dreaming
      Replies: 18
      Last Post: 03-22-2009, 10:18 PM
    4. 5 Things to do before you die!
      By Dreamhope11 in forum Senseless Banter
      Replies: 10
      Last Post: 06-06-2008, 03:44 AM
    5. YOUR MOM/Things you can do like this
      By Raihab in forum Senseless Banter
      Replies: 15
      Last Post: 07-10-2005, 08:37 PM

    Bookmarks

    Posting Permissions

    • You may not post new threads
    • You may not post replies
    • You may not post attachments
    • You may not edit your posts
    •