Update 2024-03-27: Greatly expanded the "Samples" page and renamed it to "Glossary".
Update 2024-04-04: Added 5 million mid-2011 posts from the k47 post dump. Browse (mostly) them here.
Update 2024-04-07: Added ~400 October 2003 posts from 4chan.net. Browse them here.

Welcome to Oldfriend Archive, the official 4chan archive of the NSA. Hosting ~170M text-only 2003-2014 4chan posts (mostly 2006-2008).

Threads by latest replies - Page 9

[1384106063] Decoding Cyber Attacks

No.25669 View ViewReplyOriginalReport
Types of attacks

• Website defacement: Hacker changes the appearance of a Web page, typically done by breaking into a Web server and replacing the hosted Web page with another one. Cross-site scripting is a form of defacement.

   This form of electronic graffiti is done to spread messages by cyber protesters or hacktivists. But it can sometimes be used as a cover-up for sinister actions such as uploading spying malware or deleting essential files from the server.

• Distributed Denial of Service (DDoS) attack: Attacker creates a network using thousands of infected computers worldwide, which are then made to overwhelm a targeted site with a huge spike in traffic. While such attacks may cause inconveniences by slowing down website access for users, they do not usually result in a loss of data or information.

• Domain name system (DNS) spoofing or DNS poisoning: Attacker introduces wrong routing information into an organisation's DNS server, which translates a human readable domain name (such as example.com) into a numerical IP address for website access.

   The wrong routing information stored in the DNS server may lead to wrong IP address translation, causing Internet traffic to be diverted to another website, often the attacker's. This may then lead to Web users unknowingly downloading malicious programs that steal passwords.

• Password cracking: Computer programs can be automated to run permutations to crack the easy-to-guess passwords of a user or system administrator to gain unauthorised access to personal accounts or networks.


Amorphous, unpredictable and Anonymous

WHEN the hacker known as "the Messiah" identified himself as part of the global cyber activism group Anonymous, he raised the stakes.

   After all, the amorphous and unpredictable group of cyber vigilantes has, in the last few years, succeeded in bringing down global credit card websites, defeating an anti-online piracy Bill in the US, and unearthing evidence to convict rapists.

   In the process, the self-described "legion" that organises itself through Internet Relay Chat (IRC) has become a little less anonymous: Several of its members have been arrested and jailed in the United States, the United Kingdom and Ireland for hacking.

   Judges in these countries have treated Anonymous's hacking activities as purely criminal, noted McGill University's expert Gabriella Coleman, rather than "entertaining the idea that the actions may have been principled dissent".

   But members of Anonymous view the distinction as crucial to their raison d'etre. What they do, they have said, is to campaign for a cause in a disruptive and dramatic fashion designed to bring media and public attention to an issue.

   It is worlds apart from cyber terrorism, their defenders believe, which is hacking with the intention of causing grave harm such as the loss of life or severe economic damage.

   But it has extracted its share of human cost and ruined many lives in the process. Anonymous specialises in circulating private data and photos of chosen targets whose only crimes were to provoke the hacktivists. Sometimes this was in being a "symbol" of censorship, other times, it was just by publicly questioning the technological know-how of Anonymous.

   Its first-known "operation", a full-fledged pranking campaign against the Church of Scientology, encapsulated its founding goal of irreverent disruption in the name of freedom of information.

   In 2008, in response to the Church's legal attempts to get websites to remove an internal recruitment video that had gone viral, Anonymous faxed images of nude body parts to the Church's offices, ordered unpaid pizzas and escorts to be delivered, and tied up its hotline with phone calls. It also launched Distributed Denial of Service (DDoS) attacks to take down its website.

   In early 2010, another DDoS campaign aimed at Paypal, MasterCard and Visa - reprisal for their refusal to accept donations for WikiLeaks chief Julian Assange - catapulted the group to a new level of notoriety.

   Since then, Anonymous has gone after targets as disparate as the San Francisco transit system (for blocking phone service to thwart the organisation of street protests), and some high school students in a small US town for raping their classmate.

   The group itself is not formalised or organised; there are many, constantly changing factions and splinter groups among Anonymous, with operations usually sparked almost accidentally. Someone issues a virtual "call to arms" and others respond, or not.

   In fact, some major factions of Anonymous reject the use of hacking and DDoS attacks in their campaigns, preferring to stick to classic trolling tactics such as jamming phone lines.

   As one of its taglines goes: "Anonymous is not unanimous."

   Still, members have made it clear that their aim is always to target the symbols of corporations, rather than the corporations themselves - in the WikiLeaks reprisal attacks, for example, the firms' websites went down but not their internal processes, databases and ability to conduct business.

   Anonymous has also roundly dismissed reports that it could - or would - hack into the US power grid or worse, as some fear.

   That would be cyber terrorism, its members say, and would hurt ordinary citizens, the very people whose interests it wants to defend against the onslaught of fat cat corporations and greedy governments.

   It remains to be seen whether the Messiah can really summon this fearsome and capricious band of hacktivists to his cause.

   There is no Anonymous head honcho or headquarters to verify if the Messiah is indeed one of them. This sort of hierarchy and barriers to entry seen in mainstream organisation are anathema to the cyber anarchists.

   Rather, as Ms Coleman writes, "to be part of Anonymous, one simply needs to self-identify as Anonymous".

[1383004030] Using RFID / Geocache tags to trace child?

No.25645 View ViewReplyOriginalReport
A friend's husband absconded with their child, and I've been trying to help her find him.  She thinks that if the father's parents were given or found a toy containing a trackable tag--like RFID or Geocache or something similar--that they'd secretly send it to the child, and that could be tracked. She is totally heartbroken and desperate.  I don't think that such a tag could be traced remotely across country, possibly even out of the country, unless you were in the immediate vicinity of the tag.  I guess that maybe even a short distance might help if the police were investigating a tip and wanted to make sure it was him, and they had some app that tracked the tag. 

This isn't a case where there's any issues about abuse--it just seems to be about jealousy and possessiveness, and my friend has already agreed not to prosecute the father if he'll just bring the child back and agree to shared custody.   Is there anyone who can explain what kind of tag would work in a situation like this?  I'm also a little worried that the father might scan the toy through his GPS and find the tag.
1 post omitted

[1382886980] ­

No.25644 View ViewReplyOriginalReport
If I want to use GUI apps such as GTK Glade remotely, I could use SSH+X11, but when the SSH session closed all applications I was running died, so I wanted to instead use GDM and login to the same session I'm logged in to locally. XDMCP is old and GDM is refusing to provide access via that protocol (whether remotely or via Xephyr -query localhost from a local session), so I wanted to use a different one, but the only thought in my mind was a VNC server and all of the VNC servers I can find for my GNU distro REQUIRE XDMCP ACCESS (at least to localhost). FOR GOD'S SAKE, I CAN'T USE XDMCP!

[1382219917] help please

No.25628 View ViewReplyOriginalReport
hiii
can somebody help me
do i need to set something for the internet to work?

because i have been connecting the internet cable to a desktop i took to my dad's house but it doesnt recognizes the internet or something

here in my dad's house the internet works different i think... a guy that lives a block from this house gives internet to my dad by a box on an antenna, the internet cable comes from there, i guess its wireless? idk... how can i make it work

[1316976894] How fucked am I?

No.22377 View ViewReplyOriginalReport
>BOOTMGR is missing
>No CD drive to run recovery disk
>Try to boot another OS (Ubuntu) from flash drive
>fails

Wat do? :S
14 posts omitted

[1191962287] can't post

No.8946 View ViewReplyLast 50OriginalReport
i'm using firefox in fedora core 7 and when i try to post on an imboard it pops up a message saying imgboard.php and asks me to open or save but it doesn't post my message.  help?
107 posts omitted

[1382340702] Software Dev in trouble, needs your help

No.25635 View ViewReplyOriginalReport
Brian Patterson is one of the best software developers I have ever known. On September 18 he was arrested and charged with three counts of burglary. He maintains he is completely innocent of these crimes. There are many 'fishy' circumstances surrounding his investigation and arrest, and it seems like his real crime may have been getting on the wrong side of an FBI Agent.

We need to get Brian out of jail so that he can have a fair chance to prepare for his trial and get on with his life. Would you please consider making a donation to help him in this time of immense need? All money raised will go toward getting Brian out of jail and back to his children, where he belongs.

https://www.wepay.com/donations/help-brian-patterson

[1382339663] Tech From Nature

No.25634 View ViewReplyOriginalReport
TECH FROM NATURE

Many innovative solutions and designs, such as the recently unveiled armadillo-inspired 'foldable' car, are derived from our knowledge of the natural world. We look at the unique, unusual and jaw-droppingly brilliant ideas borrowed from nature's designs.


COMING TO A FLOWER NEAR YOU

AT A GLANCE

• Weight : 80mg

• Wingspan : 3cm

• Wings flap at 120 times per second

(A paperclip next to a life-size RoboBee.)

WHAT: RoboBee - an insect-scale, flapping-wing robot for possible rescue missions

INVENTOR: Scientists at Harvard University

PROJECT PHASE: Prototype/development

PROJECT TYPE: Miniature robotics

DESIGN INSPIRATION

Bee and fly

• Bees can fly for hours and perform amazing aerobatics using only their tiny wings and brains.

• They can maintain stable flight in windy conditions - even with heavy payloads.

DESIGN FEATURES

POWER

• Artificial muscles, in the form of ceramic strips, expand and contract when electricity is applied.

Now: Thin powwer cable tethered to the robot.

Future: Compact high-energy cells for autonomous flight.

Brain

Now: Control is wired from a computer

Future: Onboard artificial brain that helps direct flight and identify targets.

Body

• Fabricated using revolutionary "pop-up" manufacturing process.

• Made up of layers of various laser-cut materials that are compressed into a thin, flat plate.

• Fabrication process is quick, robust and precise.

WHAT NEXT?

• Perform more difficult flight moves and land properly.

• More durable robots. Current material wears out and fails after 15 minutes of use.

• Real bees in a colony rely on one another to plan, scout and forage.

• Complex algorithms need to be developed to replicate this intricate behaviour in thousands of RoboBees.

POTENTIAL APPLICATIONS

• Search-and-rescue operations

• High-resolution weather and climate mapping.

• Autonomous robotic bees to assist with crop pollination.

Ultralight airfoil wings

• Controlled independently in real-time

• Attached to the body-frame by fine plastic hinges

Motion-tracking markers

Artificial muscles:

control the wings' flapping and rotational motion

Power and control signals sent through wire tether

UV targeting sensors:

Mimics bees' ability to see a broader spectrum of light

Photo receptors:

Detect changes in light intensity and direction

Power source

Pollination and docking appendages

Flight stabilisers:

Act as gyroscopes during flight


CLEAN, GREEN & FOLDABLE

WHAT: Armadillo-T - a small, foldable experimental electric car

INVENTOR: Engineers from Korea Advanced Institute of Science and Technology

PROJECT PHASE: Prototype/development

PROJECT TYPE: Small and light car for urban commute

DESIGN INSPIRATION

Three-banded armadillo
(Genus Tolypeutes)

Only two species of armadillos - the Southern and Brazilian three-banded armadillo - have the ability to roll up like a jigsaw into a tight ball for protection.

DESIGN FEATURES/BENEFITS

The two-seater car has no rear-view or side mirrors. Digital cameras show the back and sides of the car on a dashboard screen.

AT A GLANCE

• Length: 2.8m

• Weight: 450kg

• Top speed: 60kmh

Self-parking can be performed by clicking on a smartphone app.

Able to execute 360-degree turns.

Front-mounted lithium-ion battery pack powers four separate wheel motors. A 10-minute electrical charge allows the car to travel up to 100km.

How the "little armoured one" does it

The body has two domed shells with three armoured bands in between joined by flexible skin.

When in danger, its body bends in the middle. It tucks in its ears, head and tail, curling itself into a tight, defensive sphere.

Voila - a hard "ball"

Its body shells are often left slightly open, waiting to shock and injure probing predators by forcefully snapping shut on them.

How the Armadillo-T tucks its rear body away

Travelling position

The golf cart-sized car in its travelling configuration.

Movable, shell-like rear section folds forward and up.

Folded position

The car takes up only one-third of a 5m parking lot space, freeing up space in crowded cities.

POTENTIAL APPLICATIONS

• Urban transit transfers.

• Golf resorts and tourist zones such as amusement parks.

• Strict road safety standards and crash-resilience requirement have to be met before it debuts on public roads.

• Serves as a useful reference for future city-travel designs.


LESS PAIN, MORE GAIN

WHAT: "Painless" quill-inspired injection needles

INVENTOR: Researchers at Harvard University and Massachusetts Institute of Technology

PROJECT PHASE: Prototype/development

PROJECT TYPE: Injection needle

DESIGN INSPIRATION

North American porcupine
(Erethizon dorsatum)

Its 30,000 quills - tipped with microscopic backward-pointing barbs - are used for self-defence.

Magnified view of a quill's conical black tip

Barbed quill

Penetration depths with similar force

Backward-facing barbs

• Resembles serrated knife edges.

• Up to 800 barbs are found on the first 4mm of the tip.

• Feature reduces penetration force but increases extraction force.

• Less tissue damage compared with barbless quills.

DESIGN FEATURES/BENEFITS

• A prototype injection needle with barbs needs 80 per cent less force to penetrate skin than a regular barbless one.

• This result in greater placement accuracy, less pain and less chances of breakage.

POTENTIAL APPLICATIONS

• Injection needles with degradable barbs that enable both easy penetration and removal.

• Biodegradable adhesive patches that could replace staples or sutures.

• Wound dressings with tiny barbed points to hold drug delivery systems in place.


SURF'S UP, SUIT UP!

WHAT: "Shark-proof" wetsuits and watersport products

INVENTOR: Shark Attack Mitigation Systems and Oceans Institute, University of Western Australia

PROJECT PHASE: Available

PROJECT TYPE: "Shark-deterrent" suits

DESIGN INSPIRATION

• Research claims that sharks see in shades of black and white.

• They are believed to reply on vision in the final moments prior to an attack.

• The designs resulted from studies on how some large sharks perceive objects at various depths, distances and at different times of the day.

DESIGN FEATURES/BENEFITS

Stave off or lower the chances of shark attacks by confusing their visual system and rendering the wearer "invisible" in the water.

For surfers

• Bold, navy blue-and-white stripes mimic the coloration on the pilotfish, one of the fish that live alongside predatory sharks.

• Suit presents the wearer as non-prey, noxious or "dangerous".

For divers and swimmers

• Suit blends in with the surrounding water, making it difficult for sharks to see the wearer.

Sources: HARVARD UNIVERSITY, KOREA ADVANCED INSTITUTE OF SCIENCE AND TECHNOLOGY, PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES, SHARKMITIGATION.COM

[1382221607] Windows 8.1

No.25631 View ViewReplyOriginalReport
I have windows 8 but I am unable to update to 8.1 because I have a cracked copy that was activated by KMS. I was wondering if there is way I can update to 8.1 without performing a clean install of 8.1..,