Jump to content

SoftPoison

Member
  • Posts

    28
  • Joined

  • Last visited

Awards

This user doesn't have any awards

Profile Information

  • Gender
    Male
  • Location
    New Zealand
  • Biography
    I need to stop lurking.

System

  • CPU
    Intel Core i3 4160
  • Motherboard
    Gigabyte BDSM (B85M) D3H
  • RAM
    2x4GB Corsair LP DDR3 1600MHz
  • GPU
    EVGA GTX 750Ti SC
  • Case
    Red NZXT H440
  • Storage
    2x 128GB Corsair Force GS; 1TB Seagate SSHD
  • PSU
    Seasonic M12-II Evo 750w
  • Display(s)
    ViewSonic VX2253; ASUS VW193T
  • Cooling
    Stock Intel Cooler FTW!
  • Keyboard
    CMStorm Quickfire Stealth (MX Browns)
  • Mouse
    Corsair Vengeance M65
  • Sound
    HyperX Cloud II Gunmetal Black
  • Operating System
    Windows 7 Professional 64-bit

SoftPoison's Achievements

  1. It's only a matter of time until the PSP gets exploited too. The only safe thing now is to build a computer from scratch, purely out of transistors.
  2. I think some people are missing the point here. The IME is a terrifying thing, having complete control over the entire system, and the fact that some researchers were able to get into it (again) is worrisome. Once someone gains access to it they can do whatever they like, for example install a rootkit that is completely undetectable by an antivirus, that can't be removed. Here is a proof of concept doing just that, created back in 2015 for pre-2013 processors. Exploitation can be automated so that it can be integrated into conventional malware. USB devices can be emulated fairly easily, meaning that the exploit in question could possibly appear in the wild sometime in the future.
  3. A judge extorting the defendants for phone passwords with the threat of jail time in an extortion case. Well isn't that ironic...
  4. No problem! Good luck with your project
  5. This is likely the functionality you want right here:
  6. Are you actually defining what argc and argv[] are? You have int main() but what you really need is int main(int argc, char* argv[]). Here's an example of it working (note argv[0] is the command which I ran the program with):
  7. I'm going to go out on a limb and assume that your program will have to be run via command line, and in that case the "flags" are really just parameters you pass to the program, such as "program.exe -d Some random phrase". As such, these "flags" are just strings. Here's an article on how to use them: http://www.cplusplus.com/articles/DEN36Up4/
  8. They say that their goal is to make it "the most secure phone in the world." That would mean competing with the Blackphone 2, therefore removing from this version of Windows all backdoors (NSA junk that more than likely exists), telemetry junk, Cortana, etc. I heavily doubt that they would actually do this.
  9. I don't see how this would help to track down criminals. All they are really doing is inconveniencing the masses.
  10. If you still have the files, try uploading them to VirusTotal. It should give you a good idea whether or not the files are safe.
  11. I think that POWER SPONGE is a more appropriate name for this.
  12. I can't wait for Samsung to data mine my fridge and microwave usage patterns...
×