452 Posted Topics
Hey guys, I've got an AES encrypted file that my task is to decrypt knowing that it used gcc PRNG to generate the key and I know in which week it happened ... So I made a script and it works great except for that fact that .. well there's … | |
Re: Hey Grib, I was actually looking into json files a couple of days ago and I came across a problem that I really was looking forward to address to you. The file that I was generating was bigger than my memory so loading it all at once is basically a … | |
Re: Would be sweet if there was volatility#2, that contains scripts per malware family | |
| |
Re: You can use a hashmap, where you have pairs of key->value For example, you can set the key to be the nickname and because key's cannot exist more than once, that will restrict users to have unique nicknames( as you'd expect it to be). Here's an example of what it … | |
Re: String x= JOptionPane.showInputDialog("Please input x: "); int xCorFromUser = Integer.parseInt(x); | |
Re: By erasing them from bash_history, but if you want to delete a folder called "myFolder" and everything in it, just use sudo `rm -rf myFolder` then even if you recall the command later on, it will just give an error that the folder was not found | |
[Google's new look](https://com.google/) Microsoft announced that they are making their own Linux OS [MSDOS mobile](http://www.windowsphone.com/en-gb/store/app/ms-dos-mobile/8573c4a8-b9df-4409-90a6-dad2dc0b6b26) | |
![]() | Re: About the design? I can't afford a mac so I have elementary os on my home pc, kind of gives me the feeling of having a mac but at the same time is Linux, win win :D |
Re: What exactly is your question, how to calculate numbers that have a percentage? Here's an example Decrease the salary by 25% salary = salary - (salary * (25/100)) It would evaluate to: (for the example say that the salary is 100 salary = 100 - (100*0.25) salary = 100 - … | |
Hey guys, I am debugging some random files trying to get into gdb and I came accross a question how many machine instructions are used for this : `double x, dx, ans;` I guess I could see based on memory addresses and the size of double that 3 variables are … | |
Re: Seems nice but it only has generic widges available. Are you planning on adding further stuff? | |
Re: [Click Here](http://www.vlsm-calc.net/ipclasses.php) | |
Re: or instead you could `from __future__ import division` =)) | |
Hey guys, I am making a few gui programs and I was wondering on this code .. class PaintChart(wx.Panel): def __init__(self, parent, data): self.data = data.split() wx.Panel.__init__(self, parent) self.SetBackgroundColour('BLACK') self.Bind(wx.EVT_PAINT, self.drawChart) def drawChart(self, e): dc = wx.PaintDC(self) dc.SetDeviceOrigin(30, 240) dc.SetAxisOrientation(True, True) dc.SetPen(wx.Pen('RED')) dc.DrawRectangle(1, 1, 300, 200) Here I set the … | |
Re: the temporary file is in memory (RAM) so that you can make modifications of. Once the file is closed (saved) the new version will be written on the hard disk and the temporary file will be removed as in the memory that was occupied by it will be free'd | |
Re: base64 although that one doesn't mean anything.(first guess on those is always base64 as its using '=' as padding value). It should be 6 characters becahse base64 is 6 bits, ascii are 8 bits. Thus your 8 characters are equal to 48 bits, putting that in ascii(8 bits each) ends … ![]() | |
It got released today -> [Enjoy](http://elementary.io/) | |
Re: I haven't been into Android for awhile but I am pretty sure [Click Here](https://github.com/Trinea/android-open-project/tree/master/English%20Version) will be able to help you out | |
Re: xp has so many exploits out there .. many of which are freely available. If you still use XP as your OS you deserve to be punished and banned from the internet :D | |
Re: Oh, this is a good one. I remember it when my high school teacher was telling us the story! | |
Hey guys, not sure how but my conky manager pretty much just dissapeared earlier today and I had to download the package and reinstall it again. However upon installation some dependancies were not met .. //I had apparently fixed this issue in the passed but I can't find nor remember … | |
Re: - No reason for it not to be able to work with 8TB one - what do u mean by transfer memory? Speed with which you can write to a hard drive? | |
Re: You should get on to [Click Here](http://www.speedtest.net/) and test your connection. If you get 60-70 mbps/down and 10mbps up, won't really require you to change it. But try it once with wifi, try it then again with an ethernet cable and comapre the results. Pretty sure you can judge by … | |
Re: @Reverend , IP addresses in 2015 ... least thing they could do is use Tor if they wanted to be keep anonimity against the ABUSIVE mods !! | |
Re: It is wrong to say that there is no way to find the key, in reallity it is just practically impossible(Currently) to do so.Just be aware for next time, randomware has significantly increased as cyber criminals see it as an easy payday because quite some people would actually pay the … | |
Re: Could be dependnt on quite some things .. even Man In the Middle attack. The red thing basically says this identity with the provided public key associated with it could not be verified or does not have public audic records. I've neve heard of Bitdefender, I would advice you to … | |
Re: My choice for python is Sublime Text 3 with additional plugins such as Anaconda, it all makes the text editor a complete IDE for python, nice highlihting and its highly customizable, love it | |
Re: Have you tried with a different browser? Also when you tried with your phone, was it from the same IP address?-> this will give info whether it is IP issue or something related to that specific device that you are using | |
Re: Can you give an example of the text or if you want to split it by every occurance of "?" then you can use the split method of String | |
| |
Re: I've never installed that but looking into 'incorrect function' makes me think that there is something wrong with the installation file itself, well the integrity of it. Try checking MD5 checksum of the file on your pc and the server that you downloaded it from(They must've provided one there) | |
Re: System restore before those updates | |
Re: What I've done is install unix commands to CMD, i think the packet is called gnu commands for windows or something similiar, and as far as I remember I actually made a post about it in the geeks lounge some time ago(I am a terminal kind of guy, that pack … | |
Re: Technically what he said ^ is one of the reasons why 64 bit computing is needed, in increases the linear space, systems such as Windows XP cannot address more than 4GB ram 2^32, although that was increased by using a 'hack' on 32 bit systems of the following operating systems … | |
Re: `int average = ((sum of Numbers)/lengthOfNumbers) ` Example: (1+2+3+4+5)/5 = 15/5 = 3 | |
Re: I wouldn't say Linux doesn't get such stuff but the probability of that happening is significantly lower. Although, if you think about it userland 'nasties' would definitely increase if the amount of Linux users increases xD | |
Re: I think what Rubben said will work out, and just to add, if you are not comfortable with `dd` , boot from live Linux like ubuntu and run gparted, it is a graphical tool for formatting etc | |
Re: Separate each line by spaces into words, then run each word against english dictionary | |
Re: Fun fact it wasn't vulnerable to ms15-034 like sever2k8 and 2k12 lol | |
Re: Out of the blue my guess would be `manage-bde -status (Drive Letter):` , this should include bitlocker version in the response (don't have windows nearby to test it right now but you can and get back if doesn't work) Example: `manage-bde -status C:` | |
Re: I do agree with Rubber and Mike, we cannot choose for you but if you really want to dive into this study, you can really get as much as you can from both. Daniweb is a great place to start at, trust me you can learn A LOT in here | |
Hey guys, It's not exactly trouble with coding that I am facing more like trouble with understanding what I have to implement .. Quick background .. I am trying to implement statistical-saturation attack on block ciphers. The piper that describes the attack has the following algorithm that is used against … | |
![]() | Re: which drivers do you have listed under "Drivers" ? |
Re: I think you just print out all the keys in the dictionary and not those with lowest occurance in your display results | |
Re: They either don't understand the risks or they just don't care about protecting sensitive data. Think heartbleed is ranked #1 critical flaw for 2014 followed by shellshocker | |
Re: I am just wondering why do you want to do that, truecrypt is already pre-installed on kali? |
The End.