* Posts by Enigma9

11 publicly visible posts • joined 10 Feb 2009

Spooks' favourite IT firm tells Reg readers to grow up

Enigma9
WTF?

Idiot

I had a Job offer from these idiots, RFID and it's security applications.. Telling me to grow up, how about you grow up first, RFID has never been nor will it ever be a secure medium.

w.wired.com/gadgetlab/2008/08/mit-students-ge/

The comic-book guide to SIM hacking

Enigma9
Linux

No Crypto

Surprised to read you can clone the SIM. I so need to go an buy a SIM reader.

Two people on the same cloned cell answering the same call at the same time.. Classic

I thought Cloning a phone was cloning the MIN and EPN, I didn't know you just needed a SIM reader, I feel enlightened...

Microsoft knew of nasty IE bug a year before attacks

Enigma9
Gates Horns

Internet Exploiter

Internet Exploiter, Internet Exploder.... Oh wait no it's crappy Explorer, lets have a moment to reflect on how many explorers went into the Jungle only to be eaten by the natives.

Feds: Hospital hacker's 'massive' DDoS averted

Enigma9
Boffin

Idiot

Another Skiddiot Bites the Dust...

I am not surprised he was leaving the Job of security officer, some security officer, hack your own work places machine's, dude if I had done that 6 years ago when I worked for a court house as a security guard I would be in Jail right about now being anally raped repeatedly.

Police headcams burst into flames

Enigma9

Exploding Bobby

Hahaha, it's against regulation to be smoking on duty!

Police may have had a duty to notify phone-hacking victims

Enigma9
FAIL

Would they???

Would people be willing to pay for and buy a cell phone if they realized that device is nothing more than a glorified tracking device?

GPRS.. or GPS in short, it's built into every 2G and 3G handset, one manufacturer has made it a huge selling point, Samsung Mobile Tracker. It's very scary the way they slowly eroded peoples privacy rights by offering them all picture and video messaging.

I've always hacked my phones and will continue to do so, if it upsets the manufacturer that I can turn off that feature and still be in possession of a tri-band handset that is not locked to any network, then tough beans!

Enigma9
Thumb Up

Fones h4ck3d

If it's illegal to hack a phone why do the manufacturers sell phones to companies that then lock that phone to their network and insist on having there branding placed onto the device?

Have those companies not therefore hacked the phone?

Causing everyone to pay £10 to someone with an unlocker to re-flash the phones firmware.

Pfft...

Texas cop tasers gobby granny

Enigma9
IT Angle

Disgraceful

Thats terrible a little old lady being shoved out the way, then Tarazed, but then again if she was arguing with the long arm of the law, then no surprises really. But still shocking that a Granny would resort to trying to get physical with a very large and by the looks of it, intolerant police man.

New-age cyber-attack inflicts major damage with modest means

Enigma9
Linux

Russians

The article mentioned this being the work of the BlackEnergy toolkit, so how do PC's get BotNets, the simple answer, people with infected windows machines and that leads me to my next question how often does your internet provider go that one step further and provide the home user with a firewall to go with their new ADSL modem, the answer to that, never!

So you've got all these machines with no firewall being stolen off their owners and turned into a Bot-Net.

The BlackEnergy Toolkit was written by a Russian hacker by the name of Crash (Cr4sh) if your looking for someone to blame, I suggest we turn our attention in his direction.

I even found his website, where he uploads, trojans and more bot kits for windows machines.

I can only close by saying I hope the FSB and KGB go knocking on his door!

Enigma9
Linux

Examples

If people that released these kind of BotNet toolkits got made an example of and kids where educated better as to why its illegal to go cracking machines they dont own, then the whole internet would be a better experience for us all.

Enigma9
Linux

hilarious

So the DDoS attacks that are being targeted at some of the bigger names in the security industry also appear to be targeting transvestite sites. Now theirs a botnet owner who appears to have serious issues with regards to their own sexuality!