Jump to content

l4t3nc1

Member
  • Posts

    9
  • Joined

  • Last visited

Awards

This user doesn't have any awards

About l4t3nc1

  • Birthday Feb 13, 1980

Contact Methods

  • Twitter
    https://twitter.com/TTw1t

Profile Information

  • Gender
    Male
  • Location
    South Africa
  • Interests
    1110000110000111111111111110000
  • Biography
    Problem solver. Introvert. Professional student. Travel specialist. Extreme code expert. Professional analyst.
  • Occupation
    1110000110000111111111111110000

Recent Profile Visitors

539 profile views
  1. Try uploading the file to VirusTotal to see the results. If VirusTotal says it's malicious then https://docs.microsoft.com/en-us/sysinternals/ Sysinternals should be able to check if the process is in use or currently running, you can use pskill to kill that process and delete the file. Or, it might be as simple as right-clicking on the file and making sure that you have all the permissions you need to delete the file. If VirusTotal gives you a slap in the face (so to speak) as in a seriously infected file, I would recommend a format.
  2. Evil = Nonsense = 0 I am not trying or implying to get some evil going here, I have enough as it is. Evil leads to 0, I would like to be a 1. I have written software, that in theory, as far as I know (haven't tested it yet), would be able to fry the CPU and everything connected to it (physically). If the payload is big enough. It can spin up threads in a whim to execute queries and generate reports, alerts of system stability checks etc. I think I have created a monster, not thinking about hardware, just to return results to clients asap. I have an old Motherboard which I could possibly check, even throw away if fried. I want to do some research first. Since creating the above piece of code, I am almost done with CEH. It scares me to think that I could've created something that could be used for evil. I'll give it a go and keep you updated. Thank you for the guidance delivered.
  3. I have a lot to learn. Thank you Marius! Thank you for taking the time to properly answer this topic/query. Please note: I am not trying to blow things up around here or anywhere for that matter. This question/query relates to the technical side of being able to "fry" something using a port. If I understand you correctly, then being able to run some kind of software on a network would in theory be able to fry all nic's/wireless on that network? If so, this seems like a huge security issue. Thanks again for the details, it makes sense.
  4. I'll rather pay $30 per month than having to install another addon.
  5. Nope, this supposed to guide us into a more protocol like discussion that like for ex http which uses 8080 for instance: Could then in theory do the same thing or something like upnp? No device/peripherals specified.
  6. My thought's exactly, just throwing stones to see what sticks. tx!
  7. USB uses a certain port to communicate to the pc/mac/;car/hairdryer... HTTP also uses a certain port to communicate to the "above" list, should someone be able to allow for the same result through the most congested protocol on the internet. OR Am I toggling the switch here?
  8. Hi There, We have all seen the USB device called "USBKILL" - check here - https://www.google.co.za/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=0ahUKEwiC6eTugufVAhVMKMAKHdqNBjkQFggmMAA&url=https%3A%2F%2Fusbkill.com%2F&usg=AFQjCNGmBB8346oK64oOWvWq2hlHT_2S9A Do we have one for http for example? Regards, I<3C
  9. Hi There, How much does it cost to upgrade, I assumed (again), paying the subscription fee did not free me from displaying Freshbooks to me every second. ,.....] Any ideas, without hurting code? Regards, I<3C
×