There are still many questions on the web when it comes to RFCOMM connections. In this tutorial i will explain some of the basic methods to get you up and running with RFCOMM connection to an external bluetooth GPS and read NMEA data.
First, switch on the GPS and identify the BT address.
hcitool scan hci0
Now, edit /etc/bluetooth/rfcomm.conf
to appear like the image above.
Restart your BT services:
You should now be able to bind your GPS to /dev/rfcomm0
, like this:
root@ronnieflip:~$ rfcomm bind 0
Confirm your connection:
....watch the NMEA strings coming from your GPS:
SAIC School Network is protected by home land security
SAIC is School Of The Art Institute of Chicago
More often than not they will let you in and track you down while you celebrate.
Info came from a good friend of mine who works as administration there.
You too can attach a virus to any jpeg and send it, but what I want to know is there a way to attach a "rootkit" to a photo? This of course only possible with "Photo-shop CS3 and CS4" so that when some unsuspecting fool goes to enlarge or download the said photo the virus and rootkit are executable, now anyone have any ideas let us know. Thankx
Well i'm testing the security on my friends site... (Via Sql injection)
But i got the hash.. i need to check if it's correct +_+
0bfd3afdab4a11dea1584bee8cf7ad83 i've tryed everything to crack this......
if you find that my tutorial is a bit too hard or you need something simpler visit this site:
http://linuxwireless.org/en/users/Download
it is called Compat Wireless very easy way to patch drivers using a shell script.
I'm looking for a list with every number letter combination possible between 5 - 12 characters. Please email. Portwolf if you read this -- I know you have one
So, I just set my own FTP server using Filezilla Server edition and have not even had the thing up for 2 days. Now some dude at the IP 121.10.160.178 was trying to log into my server as the administrator. I trace this IP and it comes to some random small place just outside of Hong Kong. I was just wondering if there was anything that you guys suggest doing to help prevent this. I already banned his IP, but I am sure that will not be enough to keep the good people out. I am a little ticked off at the moment because, as I stated earlier, I haven't even had this thing up for more than 2 days, and now someone is already trying to hack in. Let me know if any of you guys have any suggestions on making this thing more invisible and more secure. Thanks in advance.
I am trying to use a server program called EVOLight (http://www.evogreen.org/evolight::license_42.html) It has an annual fee to run the server, and even then only lets 20 people be in meetings at once. The entire system is Java based. I was hoping someone here can help me crack it (I may not be much help myself as I do not know Java at all). I am willing to provide as much of a donation as I can once I see proof that the server is cracked. Thanks
Ok, I see you guy's are all about, Reversing, Exploiting systems. Etc. But would you guy's know of exploiting the web (Forums)... If this is not allowed please remove my thread. I did not see any rules about this though..
Thank you.
A login page has 2 input fields.
1. Username
2. Password
1 button that will post the form back to itself.
The code on the login page is as follows:
?php
if(isset($_POST["clicked"]))
{
$hostname = "localhost";
$database = "mydb";
$username = "me";
$password = "";
$dbcnx = mysql_connect($hostname, $username, $password) or die(mysql_error());
mysql_select_db($database, $dbcnx);
$query = "SELECT * FROM User WHERE Username = '" . $_POST["username"]. "' AND Password = '" . $_POST['password'] . "' ";
$result = mysql_query($query) or die(mysql_error());
while($row = mysql_fetch_assoc($result))
{
$_SESSION["User"] = $row["UserId"];
header("Location: /Admin/Default.php")'
die();
}
$error = true;
}
?>
What's wrong with this?
What do you type into the username or password field to login as anyone you want without knowing a password.
---------------------