Jump to content

DePhoegon

Member
  • Posts

    43
  • Joined

  • Last visited

Awards

This user doesn't have any awards

1 Follower

About DePhoegon

  • Birthday Dec 18, 1982

Contact Methods

Profile Information

  • Gender
    Male
  • Location
    Utah
  • Biography
    Furry, Gamer, Computer lover
  • Occupation
    Respite Care
  • Member title
    Junior Member

System

  • CPU
    i7-960
  • Motherboard
    Sabertooth X58
  • RAM
    12GB Triple Channel 1600Mhz
  • GPU
    GTX 950
  • Case
    CM 920
  • Storage
    RAID0 - 4TB (2x2TB)
  • PSU
    Ultra x4 850w Modular
  • Display(s)
    1080p samsung - HDMI
  • Cooling
    CM V8
  • Keyboard
    http://ecx.images-amazon.com/images/I/41Pg2dm5FML.jpg
  • Mouse
    onn wireless mouse
  • Sound
    onboard realtek
  • Operating System
    Windows 8.1 Enterprise

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

DePhoegon's Achievements

  1. I'll be honest with you.. Your video does you zero favors. 1. You spend the first 5+ minutes, trying to get people to not only question their own views to the point of being placid, but you also avoid mentioning it directly. -- No, We don't know who the f you are.. you are not your real self online (and more power to you for it), you are not honest with your audance, and you operate so far in the dark when it comes to anything with 'drama' or 'conflict' that you could easily be the kind of petty person who would do such things... We just do not know. ---- the fake stage beef that you have with others is for entertainment .. and as cool as that is, it is not who you are. 2. While you think 'Drama free' to the point of aboslutely none to exist, is a virtue.. it isn't. -- I acknowledge that it's smarter to not get dragged into a fight, but it's quite another & as bad as to operate completely in the dark and not even address the issues at hand, then blame those who are 'reacting' instead of .. having a response to it. 3. TB (I feel for his family, to no end), has always been that douche level extreme prick. He's never once appologized or retracted anything past 'professional' mistakes, and only minor ones that were not agenda driven. -- saying that, the fact that he would hold you accountable for your users.. because he was a special snowflake is nothing short of typical for him. 4. Perhaps.. you know .. the problem is on you... or your highered hand. The automated system is with how flawed it is, only responding to how you or your authorized agents set it. 5. Maybe instead of blaming the audiance for being appauled on the system using your approved rule set against others, you appologize and promise to fix what is a mistake on your or your agents hands. This is not their (the ones who got claimed), or the users faults. it is YOURS. 6. You literally tossed someone under the buss, and assuming the internet isn't OCD enough to find the claimed person who went public, that also failed to get hired by you isn't a far stretch. -- bad form... for someone who doesn't want drama. I suspect that most .. who watch you.. while holding no ill against you, could tolerate being around you for longer then a day.. and if I am honest, I respect you and what you built.. but I geniunely can not see myself tolerating you in person for too long either, and yes it's the fact that you'll go passive aggressive, and 'dark' if conflict comes up.
  2. https://www.microsoft.com/en-us/software-download/windows10 Should be the official image.
  3. In huh... Unless you're developing a 3rd party tool that knows how to call accounts on a system, then what's your point? You also know that basic methods could just employed right? like only retrieving a list of accounts are easily visible or have files on the system. My method the account is still there, but unless you know the 'name' of the account directly, & how to efficiently use the "power Shell", or some other external tool... you're not getting to it. That said.. I didn't go for massive secrecy I did it to provide another layer of protection, and if MS were to do this.. they could completely mask the account and hide it from all but the most detirmened and even then other security practices could completely mask it. It'd be dumb to assume they'd go half ass in a thing like this. Come on.. Look at what it can do NOW for end users & power users, imagine what more coding would do for it if they where to go that 'eye on the inside' kind of route.
  4. Let me share a few* things with you that would invalidate this 'exploit' 1. Windows is built to support multiple account & levels accounts (There just are not 2) 2. Windows accounts can be hidden from view completely 3. The only real methods for viewing the registry are MS programs 4. That updaters like Nvidia use to have accounts that allowed for file modifications, that were able to run along side any other account used for updates. (GPU related) Let me explain what I do to help service computers I happen to regularly deal with. 1. I create an administrative account. 2. I use the registry to tell the system to hide it from view, -- leaving it accessible to being logged into remotely via client & 'text entry' The pot shot of this is that they literally are unable to see, delete or disable my account (which is used to service the computer), and unless they or a malware goes into the registry to the flag to unmask the account, it's not accessible via gui or folder. Now let me tell you how easy it'd be to setup a method that most would never notice or ever see used. 1. They setup the registry editors to ignore a flagged key 2. They setup a key that hides an account completely, & disables (or moves them to a deep file hidden away in some crowded area in the system files under unassuming names, and remember Windows is fully capable to mounting files as drives on demand) any personal files for it. 3. They place that key with a flagg so it's hidden, and nestle it in some absurd part of the registry that's just swamped by other entries that no one cares about, but are needed otherwise. 4. They create a super admin account that has rights to bypass the UAC completely not even prompting it, and share the encrypted name/password setup to the local governments 5. the place that superadmin account as the completely hidden one. No need for a damn exploit what so ever.. & mind you .. Windows is 1000% capable of doing this NOW. Why in the world would they even bother doing an exploit that could be driven by a virus (turning it into a worm) I call it paranoid because ... frankly windows already had better ways to share access in quicker, easier, & better means that would provide miles less risk then what this exploit is doing.
  5. 1. Where is this 'said document' that proves any of that? -- outside on a site that uses more clickbait then I've seen in a while 2. Where is this 'said document' -- Outside a very clickbaity & ad driven view site. 3. Invalidated by the first one. Though you're missing the point entirely as well.. because None of those 'partnerships' if you're paranoid enough to believe them (and to be clear true or not, it doesn't matter) is that... they NEVER REQUIRED AN EXPLOIT TO BE DEVELOPED. --as in there never was an exploit in any of these stories, and honestly .. these are the click baitest things I've seen in a long long time. again, If they where in bed with each other.... THERE WOULD BE NO NEED FOR AN EXPLOIT TO HAVE BEEN DEVELOPED, the NSA would have 'annon' access to the systems to execute code, without any need for development on their part.
  6. In short 'Open source software is best' or did I miss your subtle Linux point? Though you tend to miss how for a 'closed source system' easily their base source is available to everyone. MS knows this, and so does anyone who thinks for a few moments. Isn't that the very point of 'rolling updates' within a system? Though that said.. it's not the fault of MS when companies introduce month+ long update review cycles for their company. It's like blaming Toyota because someone refused to replace a 'sketchy' door lock, after a mass recall, and their truck gets stolen and it had loads of sensitive 'stuff' in there.
  7. No, just... no. Do you REALLY think that MS would be allowed to ship an OS with that exploit when EVERY country that it's allowed to be sold in, their government has a copy of that source code. Why in the world would they(MS) even need this? They seriously have system access as is, and if they were truly in bed with the NSA (Which is just ... dumb & paranoid), they'd just hand over the path to that access.
  8. Right.. because they totally developed the holes in the source code they give to every nation. *coughs* Pretending MS knows all... and can plan for all day 1.. is some what silly. -This is why there is 'Windows Updates', to patch Exploits & problems that they didn't know about, & the fact that it was fixed asap & rolled out in updates is literally the best that anyone could reasonably expect from any OS developer/maintainer. This is more a credit on NSA developers that were able to see an exploit within the Source code that MS missed, and if we are honest... They aren't bad really. They(NSA) developed the exploit.. They didn't just find it in the code. Which part of the reason I would lay the blame on those that actually developed the exploit & those refusing to patch security related patches on the OS (for what ever reasons they have)
  9. even though this 'exploit' that this worm uses, was created by the NSA itself? -The only reason MS knew about the exploit to patch it, was that the NSA told them about the 'leaked' exploits. [It's that kinda deep] Not saying governments shouldn't have access to source code (cuz security yo) but... in this case.. it's all on the NSA for all the damage done.
  10. I personally just have to wonder if these 'tools' had never leaked, would that have been worse then it leaking & the wannna make me cry malware getting it. Though I will point this out... The exploits (while not clearly stated on the wan show) .. allowed execution of external code w/o user permissions needed. -Of which the NSA had access to for a long time. The major problem that was skirted around or missed is that.. 'Is it really smart for businesses to not keep on the updates, when the NSA is often known to have exploits to all the major OS's' When is it no longer MS fault, and it lays on the feet of those who actively choose to not update? How much data, & how many times has the NSA exploited this... and Just why is it acceptable to blame MS for not being clear about their updates.... (because announcing that they patched XYZ exploits just seems like a morbidly horrible idea... because it lets the ones know about it, that exploiting it.. and giving them some notice to counter/work around it) Though, Is it one to wonder if this 'leak' was purposeful to a bs group to create a FU worm.to see how many actually patch... and how likely their exploits will continue to work against their targets (businesses & targets with a large amount of personal data) & just when they will need to redevelop exploits & such. That windows Source code isn't to hard to get (for those that truly look for it) and every country Windows is sold in, their government has the source code. (and every government would likely have developers looking for exploits) With that... Mind you that they still have the same teams, and the source code for Linux is available to them, and that those teams get paid Major dollars to find exploits & bugs, and is it to much to think that 'defense' orginazations would find a way to weaponize them for their own ends. I personally would like to know what Linus reply would be, in regards to the fact that... if these leaks were never known... & that the exploits allowed execution of code... do you really think that 'telemetry data'(to MS) is really the problem that should be focused on, and if recommending a hard stance against updates is smart.
  11. Honestly, when it comes to budget systems. I worry about ..durability honestly. I would love to see these tested with thermal conditions. Reasoning being, that if you're going to argue budget system, aren't those the kind of people who'd be as likely to not have even a half decent a/c system & at best maybe a heater + fans for summers? What about rooms where it's 90-100+ F' before the computer is turned on? What about Rooms where it's 40-55 F' or lower, before the system is turned on? What about rooms where it's Freezing temperatures, even with some areas near snap freezing? What about Boards that have to go through a yearly cycle of near freezing room temperature, to 100+ F'? Though While budget boards may preform similar with optimal setups for a room, what about confined spaces, computers forced near heating vents, or consistently moved around (while not being a laptop), a failing just barely functional power supply? You talk budget, but don't include the factors that someone working on such a tight budget would also have to work with, and be tempted to save money on (power supplies, very bad to no room thermal changing [aka, no a/c or just fans], restrictive computer placement, geographical issues [temperature & for some locations varied pressures, and for some still the pressure changes from sea level to mountain top changes). Is the Motherboards you demonstrate robust enough for those who can't afford to ensure an optimal performance environment.
  12. I said mixed, but I would honestly suspect that there isn't enough collectable toys or even interesting toys or toy like items to even support a new channel. Though I'd rather not see such cut & dry takes on the games either. It was good, but honestly Slick made trine 2 sound dull. while it's a great game that I honestly just can't get into *have access to the PS3 version*, Slick made it seem.... more modular then it was and for some reason failed to convey the sense of flow it has, or just what kind of game it was and to that point what kind of people should avoid it, because the game would just annoy or bore them to much.
  13. You sure, you are not using an older SSD that's had problems with windows footprints and filled up faster then it should have? What settings does your server use to allow clients to connect to it? You sure you've gone over all your starting programs & removed any program that may not be compatible with windows 8.
  14. If you bought it digitally, you should be able to DL the disk image & burn it. to do a clean install. Though Make sure the image is clean & from MS. From what I can tell they have a full disk image to do a clean install from. Though If you keep having the errors, then You should contact MS as windows is clearly thinking you are using invalid keys and is deactivating it self. I'd Never suggest to use any image for a windows disk that doesn't come directly from a physical disk you can verify is the real deal, or from MS servers directly. *Not trusting any 3rd party servers or hosting to DL the OS disc image to avoid problems*
×