Search found 127 matches

by Chad Mulligan
Sat Oct 26, 2002 4:21 am
Forum: General
Topic: Diggin up Dirt!
Replies: 8
Views: 424

*snort* See your local politician's campaign staff(+), private investigators, or your friendly neighborhood tabloid.  All may have experience in this sort of thing -- which will almost certainly /not/ be online.  You're talking about pouring over county records esp. court papers, newspaper...
by Chad Mulligan
Sat Oct 26, 2002 4:11 am
Forum: General
Topic: Diablo 2?
Replies: 8
Views: 367

Buy it used and cheap from somebody who's sick of it -- it's been out long enough that it's probably on Ebay for that reason... although some might argue that Angband, which is free if rather ugly due to lack of a massive budget for graphic artists, has far superior gameplay if you're looking for a ...
by Chad Mulligan
Sat Oct 26, 2002 4:05 am
Forum: General
Topic: Diggin up Dirt!
Replies: 8
Views: 424

Given the nature of his other posts, I suspect that he meant in real life.  In many jurisdictions, that sort of information is deliberately /not/ public in readily accessible form, on the grounds that if you paid your fine and did your time, that's enough without adding public announcements aim...
by Chad Mulligan
Fri Oct 25, 2002 2:58 am
Forum: General
Topic: Verification Codes
Replies: 20
Views: 1245

Virulent Virus -- It's not like it's exactly obscure information... or, for that matter, helpful.  The answer -- "go contact Introversion and see about getting a replacement*" -- would remain the same even if somebody gave the size and weight of the black card. (*) Which they might we...
by Chad Mulligan
Wed Oct 23, 2002 10:12 pm
Forum: General
Topic: Verification Codes
Replies: 20
Views: 1245

No, because you have no hard evidence that the e-mail address shown actually belongs to the poster.
by Chad Mulligan
Thu Oct 17, 2002 3:53 am
Forum: General
Topic: Cleaning your OWN criminal record
Replies: 6
Views: 719

Try looking through the software descriptions on the Uplink main machine, as well as the files in the help section -- particularly the bit on security systems.
by Chad Mulligan
Tue Oct 01, 2002 3:51 pm
Forum: General
Topic: Tool required
Replies: 19
Views: 1172

It's a one-way hash, not an encryption scheme. It maps an infinite space (the space of all binary strings, essentially) to a finite space (MD5 hashes are of strictly limited length).  It's obviously many-to-one and hence there is no algorithm which can always produce a unique string that could ...
by Chad Mulligan
Sun Sep 22, 2002 1:43 am
Forum: General
Topic: Reply from Microsoft
Replies: 8
Views: 548

I'd be only mildly surprised if there were a week when somebody weren't trying to DOS them.  They're not exactly a low-profile company, after all. Now, if you told them that there was a maniac raving about how he was going to steal a tank from the Washington National Guard and drive it smack in...
by Chad Mulligan
Sun Sep 22, 2002 1:38 am
Forum: General
Topic: not all warez is bad
Replies: 21
Views: 2590

Hobbies and vocations usually can be arbitrarily expensive.  Take a trip to B&H Photo/Video in NYC, for instance, and you can easily drop well over $10K for a camera and a few good lenses (e.g. Canon EOS D60 {$2200}, 14mm/2.8L USM AF ($1950), 50mm/1.0L USM AF ($2600), 70-200mm/2.8L IS USM A...
by Chad Mulligan
Sat Sep 21, 2002 3:12 am
Forum: General
Topic: The Warez War
Replies: 13
Views: 1262

-1, Troll.
by Chad Mulligan
Sat Sep 14, 2002 8:15 pm
Forum: General
Topic: Wot is the thing u can download
Replies: 5
Views: 458

ITYM "SubSeven", which is a Trojan horse program designed to allow somebody else to manipulate your computer.  Try F-Secure for information on what it does and how to remove it.  It'd be better to find out for yourself than assume it's simply a spurious warning.
by Chad Mulligan
Sat Sep 14, 2002 5:10 pm
Forum: General
Topic: AIM was written in C++!
Replies: 15
Views: 776

Yeah, on any shadowed-password system (which would include all modern Unix setups, I'd think) it's pretty pointless without root.  Even then, it's not going to be that useful if the administrator has set up a combination of cracklib (which checks user-submitted passwords for a variety of weakne...
by Chad Mulligan
Fri Sep 13, 2002 3:15 am
Forum: General
Topic: help
Replies: 10
Views: 313

Jet -- A bit ambitious, are we?  First learn your tools, and then your limits, unless you enjoy starting projects that'll never get finished.  You wouldn't try to enter professional racing before you know how to drive a stick-shift, would you? THEN decide if you've got what it takes, inclu...
by Chad Mulligan
Fri Sep 06, 2002 3:32 pm
Forum: General
Topic: Does anyone know Batch code.
Replies: 11
Views: 714

Look into the copy command.  If memory serves, you can do something like "copy alpha + baker charlie" and the file "charlie" will contain the contents of "alpha" followed by the contents of "baker".  You'd probably need to toss in a /B if you want to...
by Chad Mulligan
Sun Sep 01, 2002 3:11 pm
Forum: General
Topic: Monitor bypass: to what extent does it work?
Replies: 4
Views: 3222

Yeah.  A nice ordering is: - Bypass monitor. - Bypass/disable proxy, firewall. - Go through Voice Authentication, if any. - Go through Elliptic Curve, if any. - Crack password. At this point, no active trace has started.  Without the bypasser, doing /any/ of voice, elliptic or password sta...

Go to advanced search