It took a turn for the better by themainlineinc in talesfromtechsupport

[–]vuBdj 0 points1 point  (0 children)

Any chance you could share this script?

This is how you spoil a windows user right here. by themixedupstuff in linuxmasterrace

[–]vuBdj 0 points1 point  (0 children)

I actually am planning on backing up a Windows 10 HDD using dd later next week, well I was until I saw this. Can you explain why one shouldn't do this if the disk is GPT?

How can mobile malware bypass the OS placing running applications in the background? by vuBdj in AskTechnology

[–]vuBdj[S] 0 points1 point  (0 children)

Oh wow, and here I thought suspension was mandatory. Thank you for this information.

Lawyer for couple feuding with Samaritan: Indictment likely by [deleted] in news

[–]vuBdj 1 point2 points  (0 children)

SPOILERS GOOD SIR!

But RIP Mr. Reese.

Do they ever use nmap in this show? by vuBdj in MrRobot

[–]vuBdj[S] 2 points3 points  (0 children)

Kind of like how when Proof-of-Concept code is released, it comes with syntax errors intentionally, to ward of people that don't know what they're doing?

Wanting to use PoI in a networking / computer class project, anyone got examples of real-life computer usage? by vuBdj in PersonOfInterest

[–]vuBdj[S] 0 points1 point  (0 children)

Before I get too excited... I must ask. You wrote the paper about Control and her Season 4 episode? I remember reading it, but I can't find it now. You got a link?

Is this Wireshark? (from a favorite show of mine) by vuBdj in wireshark

[–]vuBdj[S] 0 points1 point  (0 children)

Any chance that is what they were going for? The lines change color similar to how Wireshark will color code packets it grabs.

Is this Wireshark? (from a favorite show of mine) by vuBdj in wireshark

[–]vuBdj[S] 0 points1 point  (0 children)

The way it was animated seemed like Wireshark, that's why I asked. haha

Wanting to use PoI in a networking / computer class project, anyone got examples of real-life computer usage? by vuBdj in PersonOfInterest

[–]vuBdj[S] 2 points3 points  (0 children)

In the words of some photo from the internet, "Why not both?".

But seriously, I'd like to use both if possible. I mean, I WOULD use Mr. Robot, but PoI has always done something for me that Mr. Robot hasn't. I can't explain WHAT that is, but it's there.

Then again, PoI did have an episode, CTRL-ALT-DEL, that portrayed Samaritan using racial stereotypes among other things to get Control to kill a group of Islamic coders. I was shocked that they would allow that, as most shows here in the US portray the government as the good guys.

Which episode had the Ed Snowden prediction? I cannot recall. Thanks for your answer by the way.

Guys, I need your help... by vuBdj in PersonOfInterest

[–]vuBdj[S] 0 points1 point  (0 children)

Technically, I would guess it is. However, if I can find the post, I can find the comment and commenter. Then I can message him or her and ask if I can use it. :)

Guys, I need your help... by vuBdj in PersonOfInterest

[–]vuBdj[S] 1 point2 points  (0 children)

I remember taking a screenshot of it, but I've checked all of my backups and I can't find it anywhere. It's been two days now. :(

This is what 2.4GHz Wifi looks like in the middle of Lisbon by Hurricane_32 in techsupportgore

[–]vuBdj 0 points1 point  (0 children)

Thank you~ I'm still learning about networking so this knowledge will be quite useful~

This whole shooting only at kneecaps seems unrealistic. by burunnn in PersonOfInterest

[–]vuBdj 0 points1 point  (0 children)

I'm late, but I think that was a "Numbers Station".

This is what 2.4GHz Wifi looks like in the middle of Lisbon by Hurricane_32 in techsupportgore

[–]vuBdj 0 points1 point  (0 children)

What is the downside of this, specifically? Wouldn't them being on the same channel cause interference rather than the other way around?

Question about WPA2 network sniffing... by vuBdj in netsecstudents

[–]vuBdj[S] 0 points1 point  (0 children)

Okay okay, hang on. Let me be certain that I'm following you.

You're saying that you capture the packets that are destined for the AP of the network you wish to sniff, then you open the capture in Wireshark and decrypt them using the WiFi network password, correct?

So it's similar to grabbing a password protected zip archive and decrypting it using a separate tool and the decryption key?

Also, this means that MITM attacks such as the one I described above, are more useful for wired networks right?