User Controls

what information can be taken from an IP address?

  1. #81
    aldra JIDF Controlled Opposition
    "I have no idea what the thread's actually about, better spurt out some poorly-comprehended topical rubbish to make it look like I'm knowledgable"
  2. #82
    Is that someone from DH? Their join date was prior to us showing up.
    The following users say it would be alright if the author of this post didn't die in a fire!
  3. #83
    aldra JIDF Controlled Opposition
    guess not, I figured he was because I only noticed him posting around that time. he mentions some old totse members in his first few posts.
  4. #84
    -SpectraL coward [the spuriously bluish-lilac bushman]
    Originally posted by aldra go away spectral

    go ahead and tell me what you think is wrong about it
    The following users say it would be alright if the author of this post didn't die in a fire!
  5. #85
    That was cute though cause you were ready to rumble
  6. #86
    benny vader YELLOW GHOST
    Originally posted by aldra and again though, this has nothing to do with the OP's question. He asked what information he can gain from an IP address, not what methods are used to geolocate devices when you have access to all of their radios.

    do you use wechat ???
  7. #87
    -SpectraL coward [the spuriously bluish-lilac bushman]
    Originally posted by benny vader do you use wechat ???

    I use themchat.
  8. #88
    aldra JIDF Controlled Opposition
    Originally posted by -SpectraL go ahead and tell me what you think is wrong about it

    lol

    in theory, nothing
  9. #89
    -SpectraL coward [the spuriously bluish-lilac bushman]
    Originally posted by aldra lol

    in theory, nothing

    I use a "half open" high speed port scanner, so the victim doesn't even know they're being scanned, and I also use a "mule" and launch my scans remotely, piping the results back to my own machine on the sly. Getting past the routers is a piece of cake, since most people don't even set a password on it and its still set to the default.
  10. #90
    Symbiote Yung Blood
    the numbers

    lots and lots of numbers

    the new v6 thingy has some letters in it too

    oh fuck
  11. #91
    Red_Woman African Astronaut
    I just watched this and thought it was fun and interesting.

    The following users say it would be alright if the author of this post didn't die in a fire!
  12. #92
    aldra JIDF Controlled Opposition
    most of what he says is accurate, but the majority of the things he mentions are a lot more difficult to execute (and as a result, not plausible in most circumstances) than he implies. even the things that are accurate in relation to 'hacking' portrayed in movies and videogames typically take tens of hours (at least) to find, build and prepare exploits for.


    ie.
  13. #93
    Red_Woman African Astronaut
    Originally posted by aldra most of what he says is accurate, but the majority of the things he mentions are a lot more difficult to execute (and as a result, not plausible in most circumstances) than he implies. even the things that are accurate in relation to 'hacking' portrayed in movies and videogames typically take tens of hours (at least) to find, build and prepare exploits for.

    True that. I mean we're talking about movies and tv shows here. But I have to say that I do appreciate when some do depict - or at least they try - a more realistic approach. Not saying in everything but when it's possible to do smth which is actually based in reality and science, why not do it?

    I was also watching the same thing (from the same channel) done for Medical Scenes, and a Forensics Expert breaking down Crime Scene Investigations also. Really fun to watch and especially the forensic expert guy had some interesting informations about the most recent techniques used and researches which are ongoinng.

    Funny thing, from all 3 it appears that Crime movies&tv shows are the ones getting it wrong mostly, or depicting totally unrealistic situations and procedures.
Jump to Top