User Controls

  1. 1
  2. 2
  3. 3
  4. ...
  5. 33
  6. 34
  7. 35
  8. 36
  9. 37

Posts That Were Thanked by SBTlauien

  1. Merlin Houston
    Oh according to this that would only get you the first char from the string, so you'd only get "A" out of "AF_INET".
    https://www.gamedev.net/topic/585035-double-pointer-to-argv/

    The way you did it, argv[1] is the correct way to reference the whole string. When you create a socket I don't know if AF_INET is really a string that can be used the way you want.
    The following users say it would be alright if the author of this post didn't die in a fire!
  2. Merlin Houston
    Oh man I'm not good with C and it's been awhile, are you doing the Beej Networking book by chance?

    My guess is you aren't passing the data into socket() correctly, be it that it should be a value and you are giving a pointer or the other way around.

    As I understand argv is a double pointer (and an array is generally a pointer), so argv is an array of pointers. Then argv[1] is a pointer to the first arg. If you wanted a value you'd have to do "*argv[1]". Edit: the star in bold

    Be warned I'm very likely mistaken about some of that.

    https://stackoverflow.com/questions/1641957/is-an-array-name-a-pointer-in-c
    https://stackoverflow.com/questions/4475297/c-how-do-you-access-value-from-a-pointer-to-a-pointer-to-that-value
    https://stackoverflow.com/questions/5580761/why-use-double-pointer-or-why-use-pointers-to-pointers
    The following users say it would be alright if the author of this post didn't die in a fire!
  3. mmQ Lisa Turtle
    I am commandeering this thread for one post to make it about seahorses, of which the male carries the babby seahorsey.

    Thank you.
    The following users say it would be alright if the author of this post didn't die in a fire!
  4. Sophie Pedophile Tech Support
    Originally posted by SBTlauien I have the first model and I like it. I really didn't do to much with it but it can do a lot. I did set up a FM radio station, so I could go out to a big festival where they are playing some radio station loudly and I could take over the radio station within a radius of their antenna and play whatever I want…

    Sweet i am planning on doing this with it. https://samy.pl/poisontap/
    The following users say it would be alright if the author of this post didn't die in a fire!
  5. Merlin Houston
    Only for highly specialized applications like crypto coin mining and data processing like tensor flow, rendering fractals, etc. You can write computer programs that specifically use GPU, but I imagine the learning curve is very steep and with not much value without a specific goal.

    Tensor flow is a machine learning python library made by Google which will automatically take advantage of the GPU if you have one. It's a lot easier to get started than you think: https://www.tensorflow.org/tutorials/mnist/beginners/
    You can basically ignore the math and just know you are shaping a function/line (or many functions/lines) to represent data points.
    The following users say it would be alright if the author of this post didn't die in a fire!
  6. HampTheToker African Astronaut
    Loved my S4. Every ROM flavor under the Sun, and multiboot meant I could use like four or five ROMs with shared apps across each ROM. Hands down the best phone I've owned thus far.

    Right now, I have an Asus Zenfone 2 Laser running CM13. It's not bad at all for what I paid for it ($250 for the 64gb 3gb RAM SD615 variant). I'd probably stick with Asus if it weren't for the fact that they preinstall Cheetah Mobile apps. Thank God for root.

    Next would be my bluetooth headphones. They're SoundPeats QY7, and they kick fucking ass. They hold a charge quite well, and the sound is great. Best headphones I've ever owned.
    The following users say it would be alright if the author of this post didn't die in a fire!
  7. Still rockin my galaxy s4 with no plans to upgrade
    The following users say it would be alright if the author of this post didn't die in a fire!
  8. you could've gotten in a lot of trouble for this if you didn't write SWIM
    The following users say it would be alright if the author of this post didn't die in a fire!
  9. Ajax African Astronaut [rumor the placative aphakia]
    The following users say it would be alright if the author of this post didn't die in a fire!
  10. The following users say it would be alright if the author of this post didn't die in a fire!
  11. Hmmmmmmmm, wonder who is behind all those spam bots now.
    The following users say it would be alright if the author of this post didn't die in a fire!
  12. Malice Naturally Camouflaged
    Originally posted by Lanny The autistic genius meme has got to end.

    Do you people know people with actual diagnosed autism? They're not all fucking sevants.

    Did I post about a paper I found on "child prodigies"? I was looking up information tangentially related to PRL-8-53, the famed "hypermnesiac" (I don't believe it's actual MOA may involve the strict enhancement of memory capacity, but the improvement of the organization of it) that I had incredible results with when delivered intranasally. Anyway, in the paper they found that, and this was for children with a variety of talents far beyond the typical level of their age group, the common link was working memory in the 99th percentile, high 99s IIRC. They found various neurological/cognitive-behavioral differences and described it as essentially being a form of "moderated autism", autistic neurological qualities lacking the crippling disabilities.

    But, yeah, the overwhelming majority of autists are either absolute retards or wholly unremarkable. Weapons grade autism can be a terrifying, destructive thing, though.
    The following users say it would be alright if the author of this post didn't die in a fire!
  13. The specs look good but that keyboard layout sucks. It's about the same size as the keyboard i'm typing on now which sucks for gaming and isn't much better for heavy text, shit posting or computer programming.

    If it costs a bit more money to go with something with a nice fancy ergonomic keyboard you should go for that especially if its a laptop.
    The following users say it would be alright if the author of this post didn't die in a fire!
  14. -SpectraL coward [the spuriously bluish-lilac bushman]
    yeah, but now the FCC will literally fuck you if you try to build a network based on AM/FM radio… also crystal radios only receive.

    Morse Code AM Transmitter.
    The following users say it would be alright if the author of this post didn't die in a fire!
  15. Sophie Pedophile Tech Support
    [INDENT] The researchers’ attack requires that the adversary’s computer serve as the guard on a Tor circuit. Since guards are selected at random, if an adversary connects enough computers to the Tor network, the odds are high that, at least on some occasions, one or another of them would be well-positioned to snoop.
    During the establishment of a circuit, computers on the Tor network have to pass a lot of data back and forth. The researchers showed that simply by looking for patterns in the number of packets passing in each direction through a guard, machine-learning algorithms could, with 99 percent accuracy, determine whether the circuit was an ordinary Web-browsing circuit, an introduction-point circuit, or a rendezvous-point circuit. Breaking Tor’s encryption wasn’t necessary.
    Furthermore, by using a Tor-enabled computer to connect to a range of different hidden services, they showed that a similar analysis of traffic patterns could identify those services with 88 percent accuracy. That means that an adversary who lucked into the position of guard for a computer hosting a hidden service, could, with 88 percent certainty, identify it as the service’s host.
    Similarly, a spy who lucked into the position of guard for a user could, with 88 percent accuracy, tell which sites the user was accessing.
    [/INDENT]

    http://arstechnica.com/security/2015/07/new-attack-on-tor-can-deanonymize-hidden-services-with-surprising-accuracy/

    Interesting, what is also interesting i read an article about a group of Russian hackers who had compromised an exit node in such a way that it dynamically added malware as user would download files through it.

    I think this was the article.

    http://securityaffairs.co/wordpress/29589/cyber-crime/tor-exit-node-serves-malware.html
    The following users say it would be alright if the author of this post didn't die in a fire!
  16. Sophie Pedophile Tech Support
    LMFAO! Look how they backdoored their code.



    Accurate variable names are important.
    The following users say it would be alright if the author of this post didn't die in a fire!
  17. Sophie Pedophile Tech Support
    Here's a magnet link to the data dump, enjoy.

    http://pastebin.com/KrLzhEzS

    ALSO, Mother of Kek. Hacking Team sells super expensive liscenses while they pirate other people's software:



    Also, have some pentest reports on their clients.

    http://ht.musalbas.com/FileServer/FileServer/clienti/

    The following users say it would be alright if the author of this post didn't die in a fire!
  18. Sophie Pedophile Tech Support
    This is top shelf kek material right here.

    'Hacking Team' Who are notorious for supplying government agencies with surveillance and security tools have been hacked.

    http://www.csoonline.com/article/294...d-denials.html

    I lol'd.

    What's even more funny is that in the dump the attackers also posted some cracked passwords used by 'security experts' working for Hacking Team. Lmfao, look at these passwords:

    [INDENT]HTPassw0rd
    Passw0rd!81
    Passw0rd
    Passw0rd!
    Pas$w0rd
    Rite1.!![/INDENT]
    Wow.

    Here's a pastebin with customer details.

    http://pastebin.com/MP8zpQ26

    I'll update when i find the torrent with all the leaked data, i will seed it for great justice. Here's an invoice in the meantime. They make some serious moolah it would seem.



    [SIZE=72px]DATA LEAKS 4 U! [/SIZE]
    https://mega.co.nz/#!Xx1lhChT!rbB-LQQyRypxd5bcQnqu-IMZN20ygW_lWfdHdqpKH3E
    The following users say it would be alright if the author of this post didn't die in a fire!
  19. you um I Yung Blood
    I just got really high with a couple muslims while watching jihady looking news clips in arabic and talking about how fucked the region is and how it's all the jedis fault. One was from Yemen and seems very rich and kind of effeminate and one is from fucking gaza and is chill and smart as fuck but hard on the jedi bashing. They had a huge chunk of afghani gold seal and we talked about the UAEs inevitable collapse which they basically agreed I knew more about than they did. There were like 1500 electronic devices going off everywhere. Ramadan is kinda fucking cool when you think about it. For a whole moon cycle nobody eats drinks or does fuck all except pray and work/be nice during the day just to prove they can and become self disciplined warriors then eat drink and do whatever at night, then wake up like 4 hours later and do it again. That kinda dedication is why Muslims are able to affect change so quickly in the region, mass mobilization and training engrained in the religious doctrine and you have niggas whose down fo whatever, hence getting manipulated by jedis so often.

    One kept reiterating the fact that it was 3 continents in 1 day today, france, tunisia and kuwait. I thought to make a joke about the white weirdo in the states who killed some black people at church but thought better of it.
    The following users say it would be alright if the author of this post didn't die in a fire!
  20. Sophie Pedophile Tech Support
    So these guys keep up with all the tools to have come out in the pentesting field with links to github and such. It's an interesting resource and i'd invite you to go have a look if you're interested.

    http://www.kitploit.com
    The following users say it would be alright if the author of this post didn't die in a fire!
  1. 1
  2. 2
  3. 3
  4. ...
  5. 33
  6. 34
  7. 35
  8. 36
  9. 37
Jump to Top