Blogs

Cryptography anyone!?

I am making this available to anyone that has some free time on their hands, i enjoyed it! (post is also on HACKTHISSITE under Cryptography). Enjoy!

BY (T3hR34p3r)

http://www.hackthissite.org/forums/viewtopic.php?f=28&t=954&sid=fb18e13d...

So you think you're hot stuff do you? We'll see about that.
The code breakers in World War I didn't have supercomputers to do their work for them; they had to think for themselves. In today's modern world it's simple to write a script that does the work for you, but do you truly understand the script itself? Sure, you know how it works, what it does. But... take away the computer, could you still do that script? In this article I'm going to show you how to decrypt a basic sentence that has been run through the XECryption Algorithm. All you're going to need is a pen, a notepad, a calculator, and a hell of a lot of patience.

-------

For our example I've encrypted a small sentence, a little note to myself:

Google searching etc.

Searching Google - Advanced Guide

This How-To will be highly pragmatic and will focus on the hows and not the
wherefores of the various search strings.

Index
----------------------------------------------------------------------
0) Key
1) Directories
2) Xitami Servers
3) Directory Listing
4) Andromeda Servers
5) Zina Artists
6) Apache mp3 Servers
7) Individual Songs

----------------------------------------------------------------------
Section 0 - KEY
----------------------------------------------------------------------

You this are just some definitions I will use below.

[Directory String] can be any of the following :
1) "index of"
2) "last modified"
3) "parent of"

[file type] can be any of the following :
1) "mp3"
2) "shn"
3) "wma"

[mp3 name] can be any of the following :
1) the name of the album in quotes
2) the name of the artist in quotes
3) be daring and leave it blank and have lots of links
4) be creative!

[limitors]

need help of computer masters......

hie guys
i am looking for some genius computer masters who can help me to explain about networking, hacking,linux and their tips and tricks and also about the batch file and auto run file
you can also contact me on
[email protected]
or
www.facebook.com/sushant.soma
thanx a lot guys......

Amp Blasts: BenOwns AGAIN!

Note: Like always, these are only the views and opinions of Amp and not of SoldierX. By reading this, they agree to this and that if they cannot be respectful of the opinions of another, their only option is to cease reading this blog.

I was going to give this just one post and move on, but since he's decided to be a bitch I'm going to call BenOwns out. Apparently he decided on my first blasts post to leave a comment talking smack and act like he has real skills. In addition, he tried to make wild statements saying he has everybody's information. As a result, I'm going to make a quick rebuttal.

If this fat pile of shit was so talented, then explain why the "business site" he has is broken as hell? We go on there and half of the links are dead. Also, there aren't very many people on the forum. For what is supposed to be a business, it just feels like a vanity project designed to boost his unwarranted self importance.

I need a challenge. So someone give me one!

So I love having a challenge, its how I learn. I am still new but I would like someone to give me a challenge for a legitimate need that they have that can be used widely across the community for many uses. I will then begin writing a software program that will then fulfill that need. But it needs to be a legit need. I am considering building the base platform for OFACE in Windows 7 with andLinux configured with it allowing a multi-OS Fix tool. I all ask is for people to shoot me a challenge and some ideas to point me in the correct direction.

Future hacks

" I like the hacks of the future better than the past hacks"

Linux's Downfall.....

I know this post may anger some people, but I have a good reason for it. The lack of addressing security issues in Linux has reached ridiculous levels. So ridiculous in fact that I'm seeing Android cell-phones getting whooped and despite a promise of better security from Google, the reality is that their plan is not enough. There's also the fact that they have no concept of handling graphics cards correctly given the abnormally higher temperatures I keep seeing. With that in mind, I may have to try to hunt down a better OS for my PCs.

Funny Jokes

An Investment Banker was at the pier of a small coastal Indian village when a small boat with just one fisherman docked. Inside the small boat were several large yellow fin tuna.

The Investment Banker complimented the Fisherman on the quality of his fish and asked, “How long does it take to catch them?” The Fisherman replied: “Only a little while.”

ATM

Used the deep Web to get the ATM manuals to no avail.can you help

METRO PCS HACK

One month free service. System flaw, system fowards prepaid monthly bill to next month. *228 follow steps / prompts in activation(between 12:00pm-10pm activate) at 7:00am-9:00am lower plan from $50 a month to $40 dollars a month plan and phone stays on for 1 month. NOTE WHEN FIRST ACTIVATING PHONE AND NUMBER IS GIVEN TO YOU, HANG PHONE UP, TURN OFF, DIAIL *228 phone will update automatically. TURN OFF AND TURN BACK ON. ONLY AFTER ACTIVATION. NOT WHEN CHANGING PLAN..*611 or mymetro icon to change plan. Do not forget Name and 8 digit pin..(date format example (06-04-1982)

Syndicate content