Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

How To Tell if Your Hotel Guest Is a Terrorist

S414m4n63r wow (2 comments)

thats just about every thing i do at when i go to a hotel i mean come on why would i use their wifi when the guy in the next room is sniffing their net work

about 2 years ago
top

Big Bro series: You CAN'T delete a skype account...

S414m4n63r you really cant do any thing (1 comments)

to think things get deleted any more is a myth from ever search, email and txt you send it will all be stored and archived heck i still messages on facebook i got 4 years ago i thought i deleted untell thy decided to let people see them with the archive sec thy just put in

about 2 years ago
top

Valve: Half-Life 3 Will Be Linux-Only

S414m4n63r seems to be fake (5 comments)

the only thing that looks true is the win8 remark

about 2 years ago
top

Moonshiners TV Show How to Make Moonshine at Home Video

S414m4n63r im sorry have you checked this with atf (1 comments)

the last time heard moonshine was illegal in any form as it is highly combustible, also most of your sites not working like the TERMS OF SERVICE link PRIVACY POLICY, CONTACT US you just them little ones

about 2 years ago
top

the worlds first anonymous general purpose operating system

S414m4n63r good question (2 comments)

as far as i can see it looks pretty solid but its only been out for a month or something like that, so i wouldn't do any thing illegal on it

about 2 years ago
top

US Offers New Plans 1 Month Before UN Meeting To Regulate Web

S414m4n63r here comes the darknets (128 comments)

all this law is going to is create things much much worst then the internet we have right now, im sure most of us have seen free-net imagine that 100x bigger because crap laws like this force people to move there

about 2 years ago

Submissions

top

the rise of darknets

S414m4n63r S414m4n63r writes  |  about 2 years ago

S414m4n63r (2765269) writes "as the internet is increasingly becomes under government surveillance http://tinyurl.com/asacby5 / http://tinyurl.com/75edr6u but only to their disappointment thy seem to be finding out how sharp are teeth are http://tinyurl.com/d64cwaw but is this all about p2p sharing seemingly not as all other US administrations have never used a espionage act but only two time since it was born in the 1900's the new and current one has used it 6 times so far"
top

chinese goverment attacks the white house and trys to steal nuclear launch codes

S414m4n63r S414m4n63r writes  |  about 2 years ago

S414m4n63r (2765269) writes "on October 1st 2012 Chinese hackers gain access to white house's computers though a phishing attack when a unnamed staff member clicks on a link sent by email from the attackers the hackers targeted the white house military office to try and steal the launch codes but the computers that were infected were quickly isolated and the white house reports no sensitive data was leaked"
Link to Original Source
top

firestorm never was just a silly movie idea

S414m4n63r S414m4n63r writes  |  about 2 years ago

S414m4n63r (2765269) writes "we have all seen them movies some one piss's of that wrong hacker and the next thing you know the world is falling to its knees street lights are going out power plants are blowing up you cant visit you favorite porn site and its being done by 2 or 3 people in a van, well im afraid to inform you that thy dont even need the van to pull most of that stuff heck who are we kidding a lot of it can probably be done with a smart phone as Mr. tentler aka viss explains and deminstraits a little bit, in one of his wonderful and frighting speeches at defcon, all to sadly their is a constant flow of news articles coming out about are blatant lack of security with in are infrastructure http://tinyurl.com/csl3j4m and as the world continues to become more and more dependent technology their will just be more flaws in the systems we need for are every day lives or we start putting time money and COMMON SENSE "im mean come who puts a web server on a industrial power generate" in to the things we build."
Link to Original Source
top

failure that we all seen coming, electronic voting

S414m4n63r S414m4n63r writes  |  about 2 years ago

S414m4n63r (2765269) writes "as the flood of reports start coming in it comes to no surprise it was a bad idea to begin with, electronic voting machines are failing all over the country and are casting the wrong votes,im sure the conspiracy theories will start flying next, but in reality its much more likely to be the work of incompetent programers"
Link to Original Source
top

T.E.M.P.E.S.T passive spying

S414m4n63r S414m4n63r writes  |  about 2 years ago

S414m4n63r (2765269) writes """the late 50s & early 60s a time of love life and free minds, while most of are country men and woman were busy trying to live their life's to the fullest though mind altering drugs and 30 minute guitar solos the good old boys at the nsa were busy and hard at work fighting the ruskies and that fight like many fights were for information and so the T.E.M.P.E.S.T device was born a device made for capturing low radiation emitted from mostly any device that would emit such radiation tv computers microchips microwaves you name it, strangely for a 60 year old spying device many still dont know about it or that it even exist so very much of the civilian world is still open to such a old attacks, in a nut shell the tempest is basically a modified ham radio some what easy and cheap to construct the link iv provided will give any one that is interested the knowledge to defend against and build one of their own little spying box's have fun and be safe"""
top

T.E.M.P.E.S.T passive spying

S414m4n63r S414m4n63r writes  |  about 2 years ago

S414m4n63r (2765269) writes ""the late 50s & early 60s a time of love life and free minds, while most of are country men and woman were busy trying to live their life's to the fullest though mind altering drugs and 30 minute guitar solos the good old boys at the nsa were busy and hard at work fighting the ruskies and that fight like many fights were for information and so the T.E.M.P.E.S.T device was born a device made for capturing low radiation emitted from mostly any device that would emit such radiation tv computers microchips microwaves you name it, strangely for a 60 year old spying device many still dont know about it or that it even exist so very much of the civilian world is still open to such a old attacks, in a nut shell the tempest is basically a modified ham radio some what easy and cheap to construct the link iv provided will give any one that is interested the knowledge to defend against and build one of their own little spying box's have fun and be safe""
Link to Original Source
top

sex, drugs, rock and roll & Espionage

S414m4n63r S414m4n63r writes  |  about 2 years ago

S414m4n63r (2765269) writes "the late 50s & early 60s a time of love life and free minds, while most of are country men and woman were busy trying to live their life's to the fullest though mind altering drugs and 30 minute guitar solos the good old boys at the nsa were busy and hard at work fighting the ruskies and that fight like many fights were for information and so the T.E.M.P.E.S.T device was born a device made for capturing low radiation emitted from mostly any device that would emit such radiation tv computers microchips microwaves you name it, strangely for a 60 year old spying device many still dont know about it or that it even exist so very much of the civilian world is still open to such a old attacks, in a nut shell the tempest is basically a modified ham radio some what easy and cheap to construct the link iv provided will give any one that is interested the knowledge to defend against and build one of their own little spying box's have fun and be safe"
Link to Original Source
top

the worlds first anonymous general purpose operating system

S414m4n63r S414m4n63r writes  |  about 2 years ago

S414m4n63r (2765269) writes "Whonix (called TorBOX or aos in past) is an anonymous general purpose operating system based on Virtual Box, Debian GNU/Linux and Tor. By Whonix design, IP and DNS leaks are impossible. Not even malware with root rights can find out the user's real IP/location.

This is because Whonix consists of two (virtual) machines. One machine solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other machine, which we call Whonix-Workstation, is on a completely isolated network. Only connections through Tor are possible."

Link to Original Source

Journals

S414m4n63r has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>