Jump to content

RedWulf

Member
  • Posts

    1,736
  • Joined

  • Last visited

Everything posted by RedWulf

  1. Ubuntu to me, but mint is abit lighter and some people like it better when they first come from windows. But as said, you need a deeper understanding of distros as no distro is better than the other, they just have different uses and target users.
  2. Same reason for a hot deals section and a classifieds sections
  3. So nothing like THIS So is light until it gets near something attractive enough
  4. Exactly It says it will teach C++ so try it and (at least for 30 days) work at it hard to see if you'll be able to catch on without a C background. If not, get a refund, if so it seems like a good deal
  5. Even though it took three days to download, Nuance Dragon is a really great program. This post was typed using it, I even taught it to say "fuck"!

  6. Only the last link is really depend on VR. http://www.3deaspacesys.com/ - this is a closer 3d UI with VR though, which is interesting. But aside from zorin and the link about what a 3dOS is, no, simply because motion tracking and holograms/3d projection isn't strong enough or popular enough. A 3d UI is pointless if you can interact with it in 3 dimensions.
  7. What is a 3dOS Maybe,kinda, at least for users I like zorin, but honestly I'm happier with ubuntu and windows. I'm sure this isnt what you mean by far, but its a nice look thats still practical. Ofcourse VR is involved . 1) You mean user-interface (UI) which is what we see and do, its not necessarily fixed to the OS. Looks at the UIs for ubuntu alone(server, xfce,mate,gnome). Now given that for this the OS would need a decent tweak to support 3d functions, but its still just a GUI not an OS. 2) until we get stronger VR or a tony-stark style interface which is well beyond current motion tracking and holograms, then any 3d UI will simply be a novelty. 3)Why? I mean it looks cool, but aside from games and modeling, a 3d ui would just be a large desktop since we only really see a 2d projection of what we look at.
  8. https://www.shodan.io At this point I am no pen-tester and have no legitimate need for the above search engine, yet. Though I have been considering changing my major to cyber security. My only question is: Does anyone know if having an account with shodan has any drawbacks? I could care less about emails, I'm more concerned about if the company sells emails or will be making me a substantially larger target on "the internet of things".
  9. If you must you can use free 'tools' that google will turn up, minitools partition wizard free has the option. But don't do it as cloning tends not to end well.
  10. Many of the bots hit in groups or only post 2-3 post in a few minutes, which could easily be a person who posted in the test section or the wrong section or edited/quoted/moved a post. If it was more like this recent on or spam bots in email, where its many posts or a flood, then it would work, but would slip under easily.
  11. 4th day of downloading one 3gb program...

  12. https://support.microsoft.com/en-us/kb/3166553 Have you looked at this?
  13. I think its self explanatory, the repos cant be accessed Check to see if you can get to the repo sites on your browser. If so then the issue is likely with your setting/config. If not they may be down or you're having an odd network issue. You can also try the apt-get update command, though that will only work if its an issue with the program youre using.
  14. Its in the country(well out of town limits) so I don't country laws would be tight enough to cover run off as anything more than an act of god. Either way, this is easier and cheaper. Its no real damage, just a horribly and unnecessarily muddy driveway. 4-20!! ohhhh only 290 more pages to go Hi lesbian, I'm dad
  15. So, awhile back my neighbor refused to fix his ditch and run-off kept washing into my drive way...t Today I decided that, since I'm awake anyways, I'll start mowing my yard and listening to loud music at 6am until he fixes it. The small wars in life
  16. I think it should be made an "exploratory" as many schools already do. A short partial semester class that students take to see if they have an interest in it, then switch to another field such as art, then something like shop, etc I do however think that if a school or state requires students to have an art credit then they should require a technical credit as well or allow the two to be interchangeable as a "technical art". No reason the computer nerd should have to paint if the artist mustn't code.
  17. @colonel_mortis Thank you, I had a serious blond moment, I added hashing the passwords with sha256
  18. There are some programs designed to audit phones as well as break encrypted or "unblock" phones etc https://en.wikipedia.org/wiki/Mobile_device_forensics Similar to any digital forensics/hacking/snooping I'm not sure where ltt draws the line of piracy and hacking in "broad" terms so I refer you to google for anything deeper. Even if white hat, hacking is hacking.
  19. Did you add contacts to the file first? Its working for me The only other thing I can think of is to check that you can write to the directory and that the file isn't being used in another program. Perhaps check that [For future reference] Don't name a list "list" as it can create issues with the list function in python
  20. fml fuck my internet

    Capture2.JPG

  21. Looking through the sites agreements/terms it seems that the main issue or threat comes in that they pretty much scream that they will not make any promise about the service/performance, you're responsible for any costs or legal matters that occur to your server or service even if involuntary or due to their negligence, and when legal action occurs you have to their approval for counsel and the sketchy part to me(though I'm not legal expert) " You agree that we may assume control of the defense and settlement process at any time." which to me means they can throw you under the bus if they try.
  22. Most ways to stop this would piss your cat off as well, like certain repellents or a sprinkler. Get a water gun or small air soft and shoot the trouble maker a few times, not enough to hurt the animal, enough to use the ideas of negative reinforcement. You could also adopt it or just get it fixed, I'm assuming it is most likely starts fights because its the same sex as your cat, but even if its not it'll still calm down when fixed. That may be costly and if it has an owner, they may be mad. If you're a real dick you could catch it and move it to a new area, though even with a feral cat thats mean.
  23. Python 3.5 windows x64 and up-to-date libs I'm having an issue passing an AES key. When its generated from os.urandom and set as a variable it works OR when its set as a variable directly(a = b'\x65'). But, when I try to enter it/get it from an input I get an error about "AES key must be 16,24,32 bytes". I've tried entering it in the form of and both return the same error, at this point I assume it has to do with the python input function. Any ideas for a work around or some modification to the input line? Heres the bit that causes the problem import os from Crypto import Random from Crypto.Cipher import AES def pad(s): return s + b"\0" * (AES.block_size - len(s) % AES.block_size) def encrypt(mes, passphrase, key_size=256): mes = pad(mes) iv = Random.new().read(AES.block_size) cipher = AES.new(passphrase, AES.MODE_CBC, iv) return iv + cipher.encrypt(mes) def decrypt(ciphertext, passphrase): iv = ciphertext[:AES.block_size] cipher = AES.new(passphrase, AES.MODE_CBC, iv) plaintext = cipher.decrypt(ciphertext[AES.block_size:]) return plaintext.rstrip(b"\0") def encrypt_file(file_name, passphrase): with open(file_name, 'rb') as fo: plaintext = fo.read() enc = encrypt(plaintext, passphrase) with open(file_name + ".enc", 'wb') as fo: fo.write(enc) def decrypt_file(file_name, passphrase): with open(file_name, 'rb') as fo: ciphertext = fo.read() dec = decrypt(ciphertext, passphrase) with open(file_name[:-4], 'wb') as fo: fo.write(dec) passphrase = os.urandom(32) print("Passphrase:",passphrase) encrypt_file('foo.txt', passphrase) input("Press enter to decrypt") passphrase = input("Enter passprase:") decrypt_file('foo.txt.enc', passphrase)
  24. Its as safe as any public ran or user based network, its a different set of threats than "direct internet". Nothing online is safe, but the tor network is arguably as safe as anything. Just not as safe as it claims.
×