-
Content Count
1,705 -
Joined
-
Last visited
Everything posted by shadowx
-
Need Help .... Word And Symbol Replacement Vbulletin hook
shadowx replied to TubeOfMommment's topic in Programming
Well unless you can paste that line here theres nothing anyone can do to help. Just make sure you have put in all the quotes and double quotes (if possible a syntax highlighted editor should show unquoted and quoted sections of code) -
Need Help .... Word And Symbol Replacement Vbulletin hook
shadowx replied to TubeOfMommment's topic in Programming
For the love of all things fluffy dont use "w8ting" anyhoo, i digress! Can you post a sample of the string you want to clean? If so all you need to do is a string search for "=" and save the position in a variable $pos = strpos($string, "="); * $find = "_"; * $replace = " " * $this->post['message'] = str_replace($find, $replace, $this->post['message'], OFFSET(will be $pos)); So now your script starts after the first = sign and is now searching the image SRC. You can then find the string [/img]http://forums.xisto.com/and record the position of the first bracket and using the $pos variable calculate the length of the string to search and use that as a limit: $pos = (5) $end = (32) $len = $end - $pos (27) The numbers in brackets are to show fake values that ive used to illustrate it. Im a bit rusty with my PHP, its been a while, but i think you can set a LENGTH parameter for str_replace, which will be 27 in this example. I think.... -
What Is The Best Language For .exe And How To Compile It
shadowx replied to damoon's topic in Programming
I suggest python as it doesnt rely on a virtual environment to run like Java does. But having said that one Java app will likely work on linux, windows and mac perfectly the same as it runs within the java virtual machine. -
It sounds like you need to install audio drivers. If you right click on "My Computer" and go to "properties" Then the hardware tab at the top then "Device Manager" look for any "unknown devices" with big yellow question marks (?) next to them. These devices will all require drivers. The first step is to double click on them then click "re-install driver" click "Yes this time only" when asked about connecting to windows update and make sure you are connected to the internet. Click next and then click "Install automatically" or something along those lines *not* the "manually" option. If you are lucky you will now automatically install the drivers. It will say this is happening which is good. If however it says it cant find any drivers just close that window and move on to the next device that is unknown.If you still have drivers missing go to windows update (start menu, all programs then right at the top) when asked choose the "custom" option and once it has checked for updated see if there are any on the left under "Hardware" it will saw "Hardware(5)" or some other number. If its 0 then its down to manual installation. But if it has a number above zero click it and check the drivers you need (they will mention audio, video, ethernet, wireless etc... in the name of the update i expect) then click on the install updates button jsut above the "hardware" link. Follow it through and install them, restart and see how you stand.for manual installation go back to device manager, double click the device you want to install drivers for and go to the "details" tab at the top. In the drop down box select "Device instance Id" and you will see a string of worsds, slashes and numbers like "PCI\VEN_1002&DEV_12345&SUBSYS_blah...." The important part is the bit *before* "&SUBSYS" or "&REV".Basically this string means the following: "PCI\" means its a PCI card "VEN_1002" means it comes from a vendor with the code "1002" and "DEV" is the device code. So in my example above you just need the bit that says "PCI\VEN_1002&DEV_12345" Type that into google (i mean the codes you find on your system, not what ive typed here) and add the word "drivers" afterwards, eg: "PCI\VEN_1002&DEV_12345 drivers"You'll now see lots of crap pages about how they can solve your problem, probably with "Driver detective" well they cant. But you need to find the name of that device, it will be in one of the results, just a keyword like "dell" "Ati" or whatever, you need to piece it together to find the name of your device, or at least the manufacturer. Then you can google the name of the driver you need eg "ATI graphics driver" or whatever it turns out to be, download it and install it and you should be good.Its a little confusing but its not difficult. Good luck!PS: One last thing to try is to google the name of your PC eg "HP minitower 2250 xp drivers" but of course use the model of your pc, not the hp stuff. You might find that the manufacturer has a driver page for each pc they make so you can just look under the sound, audio, network etc... sections and download the drivers from there. In fact, id try this step first
-
A quick google showed: http://forums.xisto.com/no_longer_exists/ Other than that dual boot with fedora
-
With my feet.No i joke, watching my hands as i type this i realize that my left hand probably does a little more than the right, but only a bit. My left hand straddles the "ASDF" area of the keyboard and my right sort of rests the index finger on the O key, but then im left handed, so i suppose it makes sense for my left hand to do the most work.
-
I dont know how easy it is to reverse engineer a Java applet... Im not sure how complex their compiling algorithm is, but it might be something to worry about that much. It would be a good idea to have a reasonable limit on the server to say 5 or 10 credits, some sort of limit that if the credits are more than that the user must be cheating somehow. You'd have to know how many credits it is reasonable for the user to get per day/hour or something and work out an upper limit. Also, depending how large the applet is going to be you could make a client which users save to their desktop and it can be a simple VB application with a web browser embedded in it which then loads the applet direct from your server in the same way it would load if you had as part of any HTML page. The disadvantage is that if the applet is really big users could easily get annoyed. But if you followed this approach you could use one of the other methods above of setting a token or key and assigning it to a particular copy of the applet for a short time.
-
There can be a lot of things running, particularly if you have had the system for a while and bits and pieces of programs get left behind that trigger various processes and what not.But it will get you out of a lot of trouble. Especially when something crashes and the "End Now" just doesant work, which is most of the time actually... but "End Process" completely kills it regardless of its state. Also useful if explorer.exe crashes (thats when you open a folder and it just crashes or the start menu/task bar crashes or disappears) If you kill the process explorer.exe the start menu and taskbar will go away, then just go "New Task" and type explorer.exe and it will all come back within a few seconds. A lot quicker and easier than waiting minutes for it to come back and safer than holding in the power button and restarting the machine.
-
"Something just struck me, how about generating an MD5 of the current application being used to prove the original application was used?"Funny as it seems i just thought of that too :lol:That would indeed solve the problem i think....You could have the app MD5 itself as it sends the data (perhaps MD5 the file myapp.app or whatever you call it) and that can then be the "key" that shows it is legit. Though then someone could write their own app that just sends an MD5 hash that they made themselves from your file, and just send that off using their own app... SO you would need someway of ensuring that the MD5 hash came from the program that is sending it, otherwise i could manually make an md5 hash of your app, and then make my own app that sends the message md5="somehashq32353wed" credits="=1000000000000" and as far as your server can tell it is a legitimate request and i would get lots of credits...This is a fairly tough one...
-
If you want the app to reside on their desktop have it download a "cookie" like a small text file, possibly encrypted which contains a token made by the server (you could also just have the app request a token which it then stores in its own memory as a variable, hence it will be destroyed when the user closes the program) and again have the token expire after a certain time and have the app send the token off each time. That way the user has the Java app on their desktop but it requires the "key" or token, from the server before it can be used.
-
Ah i see, Basic knowledge can give you a hand in solving little "fake virusses" but its easy to get caught out. CTRL+ALT+DEL is your friend. It will show you what processes are running. If you see "shutdown.exe" then your being tricked i would imagine.And if you have a browser open do CTRL+ALT+DEl and end the process. (Processes tab>iexplore.exe OR firefox.exe then click "End Process")That will kill any of those "Your PC is about to explode and destroy the world. Download our free antivirus to save your life" type websites that pretend to be folders etc... on your PC.
-
Watch This Amazing Magic Of Man Becoming Woman
shadowx replied to friendforever's topic in General Discussion
Well, you need to answer for yourself. Is this guy the modern day Gandalf and can turn himself from a solid man into a solid woman at the click of his fingers. Or is it simply a trick involving trap doors mirrors and video edits? -
I dont think there is a real way around this, unless you compile your application when the user requests it:HTTP request for myapp.appPHP/CGI/ASP application starts compiling myapp.app PHP/CGI/ASP creates a custom "token" that is valid for 5/10/20 minutes and is logged in a log at the time it starts/expiresPHP/CGI/ASP is still compiling the code for the app so it inserts the custom token into the code and carries on compilingmyapp.app is ready to be used with its custom tokenwhen the data comes in from the app the server checks its logs for the token which is also sent in to the serverIf the log shows the token as expired the app reloads the page or gives an error or somethingIf the log shows the token as valid the data is sent on to the SQL database and what not.This way each app only has a lifespan of a limited time. If you expect the user to use the app for an hour then make the token expire after 1:20 or something practical. The limitation here is i dont know how/if its possible to make a PHP/CGI/ASP script to compile a java app. I suspect it is but im not 100%You could theoretically change the token into being the app name, so instead of "myapp.app" you get RANDOM_TOKEN.app Have the app referenced in the HTML as a PHP page: app_src="app_create.php"Then app_create.php makes a token up randomly, assigns an expiry time/date in a log somewhere and then sends out the app named as RANDOM_TOKEN.app (eg 144DFFGVR4DBD.app) And have the app transmit its own name with the data and that can act as your token and no compiling needed. Just a bit of copy/rename/send of an app file.
-
Watch This Amazing Magic Of Man Becoming Woman
shadowx replied to friendforever's topic in General Discussion
There is magic in the world. But it cant do things like in that video.If the bed had a trapdoor in it the guy could easily go under the covers, drop through the door and the woman shows up. I have a feeling that when he is playing with the clock that the woman is getting under the covers from under/behind the bed, so when the guy gets in the bed he just goes through a trapdoor and its just her left to show herself. -
Watch This Amazing Magic Of Man Becoming Woman
shadowx replied to friendforever's topic in General Discussion
Yup...Hes under the bed. A mix of mirrors and/or sidepanels and he slips under the bed and she slips out. Done. -
Well in theory you could send a token to the Java app from the server perhaps just an MD5 of the current date/time then have the Java app perform some modification, perhaps reversing the string or something like that and sending the token back with the SQL data. If the token doesnt meet the requirements (you would need to store the token the server sends out and then perform the same modification EG reverse it, and compare the two) scarp the data and block the IP.you could also program in a token into the app itself just so it sends a sort of "password" along with the SQL data that authenticates it. Both methods are vulnerable to decoding the app and going through the resulting goo of code to find the method employed but if they can do that then your SQL data is in trouble anyway....
-
msdos wont teach you to hack. If you wish to learn to hack or crack visits sites like hackthissite.org and bright-shadows.net. They are brilliant sites with plenty of "games" or scenarios where you have to research topics like basic javascript programming, SQL injection, PHP programming etc... and thats how you learn.
-
Google "Msdos Commands" and/or "Batch file tutorial"A batch file is a "batch" (hence the name i guess) of msdos commands. You can for example have one to auto download a file from a shared network resource with commands that execute thus: (These arent real commands...)Ask for confirmation of the copyCopyOpen the folder in explorerClose the command promptAnd technically speaking this isnt, and never can be a virus. A virus by definition is a snippet of code (be that DNA/genetic code as in the flu virus, or programming code) which is injected into another program such as msn, IE, FF etc... and runs that way. It can be run on its on the same way a flu virus cant grow and reproduce on its own, it must first get inside one of your own cells, at which point it takes over, replicated itself and explodes the cell spreading hundreds of copies of itself. I think a virus is usually delivered by a computer worm, which by itself is harmless, its just a program that crawls through networks spreading whatever it's payload is, which is usually a virus.
-
Please for the love of all that is coded dont use frontpage....It really is the worst piece of software (windows Vista aside) that was ever created.It insists on using absolute paths to images and such instead of relative. So when you make the site on your hard drive it will link images like <img src="C:\Documents and Settings\shadowx\My Documents\Website\images\image01.jpg"> and that just wont work on the web. In fact, i lie. It will work perfectly *for you* and anyone else that happens to have an image called "image01.jpg" and have their windows logon name as "shadowx". Im not saying you need to learn HTML, actually, yes i am. If you want to specifically make a website yourself you need to learn HTML, even if you use a WYSIWYdG (What you see is what you *dont* get) editor like frontpage you need to learn HTML to change the image paths, add forms that actually work and make the website work in firefox, and to make it show up in search engines and to have decent effects like rollovers etc... Frontpage just cant do this!!!!!!!You could use a CMS like joomla, but you still need a very basic understanding of websites and how they work. But i definitely suggest using a CMS like joomla instead of WYSIWYG editors.
-
I dont understand... It really isnt hacking (the shutdown command is after all intended to shutdown the computer) but then the real definition of hacking is to make something act or work in a way it isnt intended (Ie to make a simple MSQL SELECT statement turn into a DELETE ALL statement for obvious reasons) It is a handy line of commands to know. Particularly if you get infected with the SASSER worm in which case the shutdown -a command will hault the system shutdown so you can save your stuff and work on removing it without being shutdown every 5 minutes. You can also use the timed shutdown as a really easy way to shutdown a PC after a download is complete. If the download is predicted to take an hour and you wanna go to bed set a time delayed shutdown for 90 mins or two hours and go to bed safe in the knowledge your windows PC wont set fire to the house while you sleep or somehow corrupt itself due to lack of "sleep". If you or anyone else wants to learn basic hacking look at sites like hackthissite.org and bright-shadows.net (might not be the correct URL, its been a while.)But bare in mind *any* hack you do at a beginner level, or even a fairly advanced level WILL be logged by the victim, and if you are still on the learning path (which if you are using those sites you are) you will not be able to remove or alter those logs. Play safe. The stress is on the word "play" there. I dont advise you take it any further than that, thought "play" hacking is good fun, i just wish i was at a level where i could start a few war games over our work LAN a CTF match with 150+ computers would be extremely enjoyable... Particularly trying to do it without our users knowing XD
-
I second what "The simpleton" said. Netbooks are designed almost exclusively for the internet. Cloud computing and the likes.They arent meant to have nice features like HD surround sound, high quality voice pickup and what not. My advice is the same as the ict Techs, get a better machine! (Or use a different machine) i cant stand netbooks, its like fobbing you off with a lower quality computer and making up some excuse along the lines of "no its not a low spec laptop, its a high spec notebook. Now, about that money..." They have their uses, like mobile internet browsing, word processing and emailing. But IMHO if you come to a point where you need to install software (other than a browser, open office or the GIMP etc...) then you've hit the point where you need a laptop, even a lowish spec one. But thats my opinion. Have you tried googling the SYS file the BSOD highlighted? There might already be an easy fix. And it might be worth updating to service pack 2, and then even 3 if it still doesnt work. Could be something that MS has already fixed.You might be able to find an open source alternative to DNS too which might be lighter and more compatible. I expect the components in a netbook have to be modified or designed for netbook use to make them compact enough to fit in the smaller housing which could be the root of the problem, non-standard hardware with bog standard drivers.
-
RE: learning to meditate: Thats a whole new thread and subject! Search the internet, meditation is very easy and is essentially in its basic form a state of relaxation. RE: meditating in your sleep, i would say that is just out of habit or doing it in waking life. Its something your brain has learned to accept and schedule every day and as dreams are frequently a reflection of waking life the meditation is put in there too.It could also mean you are thinking a lot about meditation or think there is something you are missing or need to know or work out. In which case you need to identify what it is you are missing or searching for and find it or discard the need for it. Then, if this is the cause, these dreams will stop.
-
Changing the password is a reasonable suggestion. It would seem strange for a large amount of data to be transmitted rather than received. Are you sure this is data being *sent* and not received? The only time you really transmit large amounts of data is when you are uploading something like a file. Usually you would only do this when adding a picture to a profile (like facebook etc...) or uploading a website through FTP or whatever, so for 150mb to be *transmitted* is pretty strange. All internet activity needs data to be transmitted to an extent, even web browsing, but for general browsing we're talking less than 1kb per webpage you visit (your PC has to send a message to the server asking for the page, but its a tiny message really) so i dont see how you can use 150mb in just browsing. You say you use ubuntu for browsing? Am i to assume that the windows 7 pc *never* connects to the internet (or atleast the ubuntu OS is running at the time you see this unusual spike?) If it was windows i would say you likely need to scan your PC but as its linux its somewhat more unusual for it to be infected. Nonetheless. Use the "Add remove" applicationms tool to download Clam AV. Im sure there are other products but Clam is the only linux anti virus i know of. Give it a full scan of the linux partition(s) Theres no need to scan the windows ones as anything on there wont be able to start itself, but if you do find something on the linux partitions then scan the windows partitions too, either from linux or from booting windows. Just in case the infection has spread itself at some point when you had that partition mounted. If it comes up clean then i dont know what to suggest. If your connection has it, you could look through some logs to find out what, if any, websites or addresses this data is being sent to or possibly phone technical support for the internet connection and ask if its their systems. It could be that the connection builds up some sort of cache or logs which need to be sent to your ISP every morning (which i would question and probably switch provider if this is the case). It seems very routine if the spike is at the same time each day. I would imagine any well made virus would only transmit while you are using the connection, so it can hide itself in the usual traffic and not cause a spike. You could be right in assuming that the traffic is always there but you never notice it. To test that theory just leave the PC setup as it would be at 8am but do it earlier. so if you usually disconnect at 8am then try DCing at 7am, or if the PC is usually idle at 8am then leave it idle at 7am etc.... so the conditions are the same, and see what traffic is being transmitted. I have a feeling however it may be something to do with your ISP, so check with them if the virus scan comes up clean.
-
EDIT:Can someone also tell me which files/folders/info is deleted when a windows machine is shutdown. The answer could tell me where i might find the files which seem to be causing the problem below. Anyone?Hi folks. So, at work (which is a school, 150+ computers) we have a network, running on netware i believe (im new) with XP on the workstations using the novell client login solutions (including zenworks) and of course the usual shared folders on the network which is where "My Documents" is mapped to and then all round shares mapped to drives. On these shares we have MS Office documents from the 2003 version, among other files. We have upgraded the workstations to 2007 and got new workstations for classrooms which have had a fresh install of XP and office 2007 and then imaged and rolled out to the other machines. These new machines work fine. However, on the old workstations which were upgraded from 2k3>2k7 we get an "access denied - Contact administrator" error when trying to access *any* 2003 office documents. There are workarounds which include copying the server document to the local desktop, and working on it and then copy/pasting back to the server (all staff have all permissions except admin on these shares, that includes read write and modify, so its not a novell permissions error) or using Open Office to open the server version with no problems at all. Again showing its not a network permissions error but instead an office 2k7 permissions glitch. Interestingly this only happens on machines that had a trial version of 2003 prior to a full install of 2k7 or machines which first had 2k3 and then were updated to 2k7. So the problems seems to lie with 2003.But wait, there is another curiosity....I have a laptop here that i am setting up for staff using an image which already contains 2k7 and again, the problem strikes. I found an article online which said to change the registry key under LSA that deals with anonymous access (cant remember its name) to 0. I did that and rebooted and the problem went away, i could access documents. However, its temporary, and after re-imaging the machine to check the version that was on the image i checked and the problem wasnt there. Brilliant i though. But alas, i logged off my account (cdavis) and logged back in on *the same* account, cdavis and the problem returned. Rebooted the machine, logged on as cdavis, problem is gone. Logged off and on again and the problem was back. Tried it with a couple other accounts and it seems that after rebooting the machine and logging on the first time with any account (lets go with cdavis) it works so:reboot>Logon (cdavis)>Works perfectly.Logoff>Logon (cdavis)>No workey>reboot>logon (cdavis)>works....etc....Also a sequence of changing the logon name works so:reboot>logon (cdavis)>Works>logoff>logon (admin)>works>logoff>logon (user1)>works>logoff>logon (cdavis) again>No workey....So there is definitely a file being saved locally somewhere, some sort of temp file or cache file that windows keeps during the session and doesnt delete on LOGOFF, it does however delete it during STARTUP or SHUTDOWN.My question is, why? What does this file contain that somehow changes the user's credentials the second time, or somehow persuades off 2k7 to break? And also where is this file? If i know where it is i can write a script that deletes it on LOGOFF so that if the user logs off and relogs on it will be fine. Asking users to reboot every time they want to relog on just wont work(it happens, the machines are used all day every day so if it doesnt get shut down and the same user as earlier tries logging on it will fail). So i need a solution that enables me to clear this file off, or stop it being made, edited, corrupted, whatever. There are many forums with this problem but no-one has yet found a solution. The systems are all XP SP3, fully updated with XP and optional office 2k7 updates. I have full admin rights so permissions arent an issue for me, and other users are able to open all other types of files from the same folders, or use open office to open the "problem" files, so it is definitely a problem within office 2k7 and not the server.Please help!!