13 posts • joined 10 Feb 2009
I had a Job offer from these idiots, RFID and it's security applications.. Telling me to grow up, how about you grow up first, RFID has never been nor will it ever be a secure medium.
Surprised to read you can clone the SIM. I so need to go an buy a SIM reader.
Two people on the same cloned cell answering the same call at the same time.. Classic
I thought Cloning a phone was cloning the MIN and EPN, I didn't know you just needed a SIM reader, I feel enlightened...
Internet Exploiter, Internet Exploder.... Oh wait no it's crappy Explorer, lets have a moment to reflect on how many explorers went into the Jungle only to be eaten by the natives.
Another Skiddiot Bites the Dust...
I am not surprised he was leaving the Job of security officer, some security officer, hack your own work places machine's, dude if I had done that 6 years ago when I worked for a court house as a security guard I would be in Jail right about now being anally raped repeatedly.
Hahaha, it's against regulation to be smoking on duty!
Would people be willing to pay for and buy a cell phone if they realized that device is nothing more than a glorified tracking device?
GPRS.. or GPS in short, it's built into every 2G and 3G handset, one manufacturer has made it a huge selling point, Samsung Mobile Tracker. It's very scary the way they slowly eroded peoples privacy rights by offering them all picture and video messaging.
I've always hacked my phones and will continue to do so, if it upsets the manufacturer that I can turn off that feature and still be in possession of a tri-band handset that is not locked to any network, then tough beans!
If it's illegal to hack a phone why do the manufacturers sell phones to companies that then lock that phone to their network and insist on having there branding placed onto the device?
Have those companies not therefore hacked the phone?
Causing everyone to pay £10 to someone with an unlocker to re-flash the phones firmware.
Thats terrible a little old lady being shoved out the way, then Tarazed, but then again if she was arguing with the long arm of the law, then no surprises really. But still shocking that a Granny would resort to trying to get physical with a very large and by the looks of it, intolerant police man.
The article mentioned this being the work of the BlackEnergy toolkit, so how do PC's get BotNets, the simple answer, people with infected windows machines and that leads me to my next question how often does your internet provider go that one step further and provide the home user with a firewall to go with their new ADSL modem, the answer to that, never!
So you've got all these machines with no firewall being stolen off their owners and turned into a Bot-Net.
The BlackEnergy Toolkit was written by a Russian hacker by the name of Crash (Cr4sh) if your looking for someone to blame, I suggest we turn our attention in his direction.
I even found his website, where he uploads, trojans and more bot kits for windows machines.
I can only close by saying I hope the FSB and KGB go knocking on his door!
If people that released these kind of BotNet toolkits got made an example of and kids where educated better as to why its illegal to go cracking machines they dont own, then the whole internet would be a better experience for us all.
So the DDoS attacks that are being targeted at some of the bigger names in the security industry also appear to be targeting transvestite sites. Now theirs a botnet owner who appears to have serious issues with regards to their own sexuality!
- +Comment Anti-Facebook Ello: Here's why we're still in beta. SPAMGASM!
- Vid+Pics Microsoft WINDOWS 10: Seven ATE Nine. Or Eight did really
- Analysis Windows 10: One for the suits, right Microsoft? Or so one THOUGHT
- Xbox hackers snared US ARMY APACHE GUNSHIP ware - Feds
- George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests