Blogs

360 Dashboard Update: More like a downgrade!

Figured I have a brief moment so I should mention this. First, apparently the new 360 Dashboard is chucking stupid ads at people left and right. The dethroning moment of suck in particular is that I actually saw it playing an ad for World of Warcraft, which is NOT a 360 game so that's kind of self defeating. With that in mind.... use http://kotaku.com/5866681/how-to-block-xbox-360s-newest-feature-dashboar... to kill that crap. Now comes the bigger issue.

Apparently, Microsoft has decided to put a no suing clause in the EULA for this version of live. What makes this one worse though is that there is NO opt-out clause. I already know that some members of the SX Crew have vowed to JTAG their consoles as a direct result and vowed to never use live again. If it wasn't for the fact that there isn't a way to JTAG the fat models that have post-2009 firmware I'd probably do the same thing myself.

Making Plastic Explosives from Bleach

by The Jolly Roger

Potassium chlorate is an extremely volatile explosive compound,
and has been used in the past as the main explosive filler in
grenades, land mines, and mortar rounds by such countries as
France and Germany. Common household bleach contains a small
amount of potassium chlorate, which can be extracted by the
procedure that follows.

First off, you must obtain:

[1] A heat source (hot plate, stove, etc.)
[2] A hydrometer, or battery hydrometer
[3] A large Pyrex, or enameled steel container (to weigh
chemicals)
[4] Potassium chloride (sold as a salt substitute at health and
nutrition stores)

Take one gallon of bleach, place it in the container, and begin
heating it. While this solution heats, weigh out 63 grams of
potassium chloride and add this to the bleach being heated.
Constantly check the solution being heated with the hydrometer,
and boil until you get a reading of 1.3. If using a battery

Credit Card Fraud:

-----------------

For most of you out there, money is hard to come by. Until now:

With the recent advent of plastic money (credit cards), it is
easy to use someone else's credit card to order the items you have
always desired in life. The stakes are high, but the payoff is
worth it.

Step One: Getting the credit card information

First off, you must obtain the crucial item: someone's credit
card number. The best way to get credit card numbers is to take
the blue carbons used in a credit card transaction at your local
department store. These can usually be found in the garbage can
next to the register, or for the more daring, in the garbage
dumpster behind the store. But, due to the large amount of credit
card fraud, many stores have opted to use a carbonless transaction
sheet, making things much more difficult. This is where your
phone comes in handy.

First, look up someone in the phone book, and obtain as much

Counterfeiting Money

Before reading this article, it would be a very good idea to get a
book on photo offset printing, for this is the method used in
counterfeiting US currency. If you are familiar with this method
of printing, counterfeiting should be a simple task for you.

Genuine currency is made by a process called "gravure", which
involves etching a metal block. Since etching a metal block is
impossible to do by hand, photo offset printing comes into the
process.

Photo offset printing starts by making negatives of the currency
with a camera, and putting the negatives on a piece of masking
material (usually orange in color). The stripped negatives,
commonly called "flats", are then exposed to a lithographic plate
with an arc light plate maker. The burned plates are then
developed with the proper developing chemical. One at a time,
these plates are wrapped around the plate cylinder of the press.

by JRoger

Security Warning: Comcast Toolbar

I figure I would drop a line since I encountered this issue on a laptop that belonged to somebody in my major. Apparently, Comcast has released their own security suite in an attempt to make things more secure. Unfortunately, their software is extremely buggy and the uninstall leaves ComcastAntiSpy.exe on the computer and a registry entry exists for it. As a result, this file will max out one of the cores of a processor when it actually isn't doing anything. With that in mind, I suggest that those with this issue do the following.

1. Look in Add/Remove Programs and remove the program called "CA Realtime Protection." (This name is extremely shady to say the least since this is supposed to be a Comcast program.)
2. If it is still there, go to C:\Program Files\comcasttb\ (or whatever drive letter is acting as the root directory) and remove everything inside of it, then make sure that the startup for this program is fully removed manually.

Amp Blasts: Kinect!

The following is Amp's Opinion only. By reading this, you agree that he cannot be held liable for it.

It's no secret that I play videogames on a regular basis. However, in recent years the whole Motion Control fad in gaming has gotten out of control. This all started with Wii's battery chomping remotes, which get forced upon whoever buys the system. Then Sony decides to ape them and make their own rendition. The one motion control system that I hate the most though is the Kinect.

To me, the Kinect represents the idiocracy of videogames. The overwhelming majority of games that use it are subpar titles at best and the only halfway decent one is actually hindered by requiring a Kinect for the best experience. (Cough, Child of Eden) Furthermore, the Kinect really is not friendly with regard to those who are physically handicapped or have limited mobility. This is only one reason for my strong hatred for this high tech toy.

God damn I love cheese

Nom

Common new programming errors

In the course of the past year, I have seen quite a few good and bad habits pertaining to programming. One reason for the bad habits is sadly, some of the subpar entry level books that really don't have good programming practices. As a result, I figure that I should mention a few tips for an object oriented programming language that may make programs more readable and more beneficial.

1. Do not make methods bigger than your head. Seriously, a good method should really never exceed 15 lines of code unless it absolutely has to. If need be, split it into smaller methods to handle various aspects of the task if it is more beneficial. If this cannot be done, then refactor the program or possibly restart from scratch on the method.

Eclipse and Java: Using the Debugger

Before I proceed with my planned entry, I figure I should apologize for my recent absence. As RaT and some of the other SX members will mention, since the start of 2010 I have been going to school full-time with very short summer breaks. Hopefully though I can contribute something on a weekly basis even if it is something short.

Get off my lawn - and stop posting bullshit.

As of recently I have noticed a horrendous trend on the forums that I would like to see disappear.

For some reason, just about every forum thread of recently has regarded Computer Repair, Virus Removal, Help me do this, etc.

I WANT TO BE CLEAR - LMGTFY posts about computer repair will put you on my ignore list for the forum.

I've pretty much blacklisted several forum members for posting non-stop garbage threads about crap they could goggle.

This is my personal warning to all forum members (may or may not reflect other Crew/High Council):

This is a forum for security concious individuals, operated by said individuals, for like minded people.
I do not care to help you with your Windows Install, Virus Removal or fixing your fucking printer.
I come to this forum in search of additional knowledge, if you are posting threads that do not relate to security I will promptly ignore you, not just your thread.

Syndicate content