Jump to content
xisto Community
Sign in to follow this  
harriko

Someone Got Hacked! their numbers here

Recommended Posts

hacker society consider him a traitor.

Comrade Hackersy has been unloyal to Mother Russia, KILL that capitalistic bastard :):(.

Kinda reminds me to Enemy at the Gates....

Anyways, out of sight, out of mind, if companies don't suspect anything, they are unlikely to be hyper-paranoia about security. :(

Just saving every penny possible :)

Share this post


Link to post
Share on other sites

I wouldn't even consider paris hilton to be a super star....I don't even see how people can consider her good looking...Cuz like thats disgusting, but thats just my opinion lol....N well hotmail n gmail will always be able to be hacked no matter how much secutiry is put into it...Espicialy hotmail, cuz nobody really likes hotmail...Espicialy l8ly with all the "server 2 busy" messages, but with gmail since it's new it prob has a lot of vulnerabilities to it....and soon enough people were start finding ways to emss with it...For example the "turning your gmail account into a online harddrive"...there's a perfect example but yeah...People might not explot google considering how loveable it is n such...So only the saddistic bored hackers will do that....

Share this post


Link to post
Share on other sites

I agree with Spacewaste, anyway Paris Hilton is just another porn goddess... Lets see now... She did it with sooooo many men that i cannot count using my fingers, but the most remembered one has to be Nick Carter! Its true that no security can stop a very professional hacker, but its to slow down or simply just annoy the hacker! :)

Share this post


Link to post
Share on other sites

Now it seems the loyalty is switching towards gmail.. everyone's into gmail invites and accounts.. you see them in almost all the forum of any board your drop by, in mailing lists, personal websites.. you name it you got it.. lol.. probably another of those crazes...

<{POST_SNAPBACK}>

Yeh I quite agree, But I'm not really bothered, I have unlimited so I just hand them out to anyone.

Share this post


Link to post
Share on other sites

wow that really does suck.. but thats a problem i would be concerned with now that a lot of phones these days have internet access.. i believe that data in our phones are now more succeptable (spelling?) to hackers...

Share this post


Link to post
Share on other sites

Yup! Actually many people are switching to Voice Over I.P because it works better than what it used to be last time! About 4 years ago, the voice was not clear, full of static and always has a lag of at least 5 seconds...
Its pretty much the "newest" technology so far, everyone has to go with the flow!
I also found how it works and how it uses the I.P and everything, i'm afraid its a little too much to put in here! Hope this very long quote can let people have a better understanding of how or why we can get our telephones hacked!
Here is what i found:

"Migrate to IP or risk being left behind." This seems to be the idea in the minds of vendors who have been using circuit switching infrastructures for the transportation of voice. As you are reading this article, the Internet is being modified to support voice traffic and products are being made to link the data and voice networks. Eventually the Internet and the telephone network will be one and the same.
Internet Telephony is an emerging technology and has a number of technological and evolutionary issues. The technological issues are mainly because the Internet was not designed for real time traffic such as voice and video. The evolutionary issues stem from the fact that a variety of vendors develop their products according to market demands and supplies. It will take time for all these products to converge and inter work with the same reliability as the circuit switched networks. However the benefits of using IP as a generic platform for both data and real time applications are compelling enough to encourage resolution of these issues.

The following sections describe the benefits of this technology, the issues related to the technology, the challenges ahead and also present a survey of the current VOIP products in the market, the services provided and how well they handle the issues. 

1.1 Benefits of the technology
 

Integration of Voice and Data
The integration of voice and data traffic will be demanded by multi application software. The inevitable evolution will be web servers capable of interacting with voice, data and images.
 
Simplification
An integrated infra structure that supports all forms of communication allows more standardization and lesser equipment management. The result is a fault tolerant design.
Network Efficiency
The integration of voice and data effectively fills up the data communication channels efficiently, thus providing bandwidth consolidation. The idea is to move away from the TDM scheme wherein the user is given bandwidth when he is not talking. Data networks do not do this. It is a big saving when one considers the statistics that 50% of a conversation is silence. The network efficiency can be further boosted, by removing the redundancy in certain speech patterns.
Cost reduction
The Public Switched Telephone Networks' toll services can be bypassed using the Internet backbone, which means slash in prices of the long distance calls. However these reductions may slightly decrease when the Federal communications Commission (FCC) removes the Enhanced Service Provider (ESP) status granted to Internet service providers (ISPs) by which they do not have to pay the local access fees to use the telephone company (TELCO) local access facilities. Access fees form a significant part of all long distance calls. But in spite of this, the circuit switched telephony would be expensive because of lack of bandwidth consolidation and speech compression techniques. 1.2  New Applications
Directory Services over Telephones
Ordinary telephones can be enhanced to act as an Internet access device. Directory services could be implemented by submitting a name and receiving a reply.
Inter Office trunking over the corporate intranet
The tie trunks between company owned PBXs could be replaced by an Intranet link and would provide large savings at a good quality of service.
Remote access to the office from your home
One's home could be converted to a home office and gain access to the company's voice, data and fax services using the company's Intranet.
IP-based call centers
With the advent of the Internet, companies have experienced large increase in their web site inquiries. These may not result in immediate financial transaction but atleast people get to know about their products. This is the beginning of E-commerce. With VOIP there can be interaction with the customers.
Fax over IP
Real time facsimile transmission is an immediate application of Voice over IP. Facsimile services which use dial-up PSTN services are affected by high cost for long distance, analog signal quality and machine compatibility. Instead a fax interface unit can convert the data to packet form, handle the conversion of signaling and controlling protocols and ensure complete delivery of the data in correct order.


Then comes the blackbox and the gateway!

Gateways
The gateways are the devices that communicate between the telephone signals and the IP endpoint. The IP endpoint usually speaks H.323 for media stream and more recently Session Initiation protocol (SIP).  The gateways usually perform the following 6 functions

Search function
When an IP gateway is used to place a call across an IP network, it receives a called party phone number. It converts it into the IP address of the far end gateway, possibly through a table lookup in the originating gateway or in a centralized directory server.
Connection Function
The originating gateway establishes a connection to the destination gateway, exchanges call setup, compatibility information and performs any option negotiation and security handshake.
Digitizing function
Analog telephone signals coming into a trunk on the gateway are digitized by the gateway into a format useful to the gateway, usually 64 kbps PCM. This requires the gateway to interface to a variety of Telephone-signaling conventions.
Demodulation functions
With some gateways the gateway trunk can accept only a voice signal or a fax signal but not both. But sophisticated gateways handle both. When the signal is a fax, it is demodulated by the DSP back into the original 2.4-14.4 kbps digital format. This is then put into the IP packets for transmission. The demodulated information is remodulated back to the original analog fax signal by the remote gateway, for delivery to the remote fax machine.
 
Compression functions
When the signal is determined to be voice, it is usually compressed by a DSP from 64K PCM to a 5.3 Kbps signal, which is the G.723.1 standard.
 
Decompression and Remodulation functions
At the same time that the gateway performs steps 1-5, it is also receiving packets. Hence this function is required 2.2  Gatekeepers
Terminals are the L AN client endpoints that provide real time two way communications. When an endpoint is switched on, it performs a multicast discovery for a gatekeeper and registers with it. Thus the gatekeeper knows how many users are connected and where they are located. The collection of a gatekeeper and its registered endpoints is called as azone. A gatekeeper is required to perform the following functions:

Address translation
Translation of an alias address to a Transport Address using a table updated via Registration messages.
Admissions control
Authorization of LAN access, using Admissions Requests or Confirm and Reject (ARQ/ARC/ARJ) messages. Access is based on call authorization, bandwidth or some other criteria.
Bandwidth management
Support for Bandwidth Request, Confirm and Reject messages, or a null function that accepts all requests for bandwidth changes.
Zone management
The Gatekeeper provides the above functions for terminals, MCUs, and Gateways, which are registered in its Zone of control. 2.3  IP Telephones
These are devices, which replace the existing telephones by providing enhanced services suited to VOIP. At the same time they should retain the capabilities of the original phones to keep the user comfortable.

2.4  PC Software phones
This arrangement consists of a microphone connected to a PC  interfaced by a card and running a software which permits voice and multimedia transfer over the Internet. Microsoft NetMeeting is an example.


Share this post


Link to post
Share on other sites

All I can say, is what a surprise. People can be so careless to do crap like that, what did the people whose numbers have just been revealed do to deserve this BS?I just get really pissed off at idots like this. I also really enjoy to have crapheads like that arrested. I really wish some times that I was a cyber crimes detective, so I could take care of this scum..Okay, enough of my rant, now, someone please send me those numbers :) J/K

Share this post


Link to post
Share on other sites

Even if we did give you the numbes, they won't work anymore... They changed their numbers! Security breaches are fairly serious crimes... Hope they get jailed soon!

Share this post


Link to post
Share on other sites

They did get jailed. that was quite a while ago.this is old news :)

Share this post


Link to post
Share on other sites

Well, I hate to sound bad, but fame and fortune do have their toll, and the fans are an advantage *and* disadvantage. Yes, fans are what makes a star (and talent, but that's a whole different topic :)). I mean, can you picture uhm Stevie Nicks without fans? SHe wouldn't be so famous... (For those of you who know Stevie - nope, I am only 21 LOL)Of course some fans go over the edge, and turn into stalkers etc. I am sure most of us know the film/movie "The Bodyguard", which is fiction, but those things happen in real life. Of course I am naming the extremes here, but that's just how it is... Everything has a good side and a bad side. To some extend, you choose to be a star, and the fans, no private life etc are also a part of that. Just my 2 cents...Now about the hacker of t-mobile, I think the guy proved a point too, and served a purpose. Even though you *think* it is safe and secure, it isn't. Some paranoia is healthy. (I am paranoid about puter security..and it has proven to be a good paranoia)EDIT because I realized I am sounded pretty nasty here, which wasn't my intention.I am not saying these stars do deserve this, I wouldn't wish the breaching of ones privacy upon my worst enemy. But it is a part of being a star, sadly. It's a risk that basically comes with the job... And I do agree with the fact that these acts have to be punished harshly, even though I fear it won't do much good.

Share this post


Link to post
Share on other sites
Guest
This topic is now closed to further replies.
Sign in to follow this  

×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.