Aller au contenu

Photo

Korra returns... kinda of.. temporarily


  • Veuillez vous connecter pour répondre
25 réponses à ce sujet

#1
Cassandra Saturn

Cassandra Saturn
  • Members
  • 4 205 messages
hello, i'm back online for little while on my playstation 3. my computer is completely down since december. i've been BUSY alot on a site while i'm trying to fix my computer.

funny thing is, jerk of my friend decided to screw me around with my computer after i warned him to not screw around with my stuff. so it was mean joke on me, but it also backfired on him. his phones got screwed up by my computer's defenses. it resulted in massive loss of data for him. while my computer self-screwed itself by shutting down.

fortunately, no data was lost but the computer is still down. i'm lucky lol

aside that, how is everyone?
  • DeathScepter et Zekka aiment ceci

#2
Guest_simfamUP_*

Guest_simfamUP_*
  • Guests

I thought you were gonna give us news of the next Avatar series.


  • spirosz, Heimdall, DeathScepter et 11 autres aiment ceci

#3
Cassandra Saturn

Cassandra Saturn
  • Members
  • 4 205 messages

I thought you were gonna give us news of the next Avatar series.


i would have if it was real news. but.. i needed t let others know i'm not gone

#4
Guest_TrillClinton_*

Guest_TrillClinton_*
  • Guests

funny thing is, jerk of my friend decided to screw me around with my computer after i warned him to not screw around with my stuff. so it was mean joke on me, but it also backfired on him. his phones got screwed up by my computer's defenses. it resulted in massive loss of data for him. while my computer self-screwed itself by shutting down.
 

 

How? Did he have his phone synched up somehow to your computer? Explain this defense mechanism because this is the first time I have heard it being used in the mainstream



#5
Guest_mikeucrazy_*

Guest_mikeucrazy_*
  • Guests

so i get the joke now, the title of the post is korra returns.you dub'd yourself korra and this is kind of a return for you....

aB42UoS.gif


Modifié par Chief Reload, 09 février 2015 - 04:02 .


#6
Cassandra Saturn

Cassandra Saturn
  • Members
  • 4 205 messages

How? Did he have his phone synched up somehow to your computer? Explain this defense mechanism because this is the first time I have heard it being used in the mainstream


he did, actually. he synced with my computer's network and tried to access my restricted private files. this action actually activated my computer's defenses to tap into his phone and ripped it apart from within digitally. that defense was one of my computer's defenses that protects computer from unauthorized access. you could say i had some sort of digital monster like digimon that screwed up his phone
  • DeathScepter aime ceci

#7
Guest_TrillClinton_*

Guest_TrillClinton_*
  • Guests

he did, actually. he synced with my computer's network and tried to access my restricted private files. this action actually activated my computer's defenses to tap into his phone and ripped it apart from within digitally. that defense was one of my computer's defenses that protects computer from unauthorized access. you could say i had some sort of digital monster like digimon that screwed up his phone

What phone did he have? What operating system do you have? Is this a public software or did you customize it and make it on your own?



#8
Cassandra Saturn

Cassandra Saturn
  • Members
  • 4 205 messages

so i get the joke now, the title of the post is korra returns.you dub'd yourself korra and this is kind of a return for you....
aB42UoS.gif


actually, Korra is also my nickname that others on this forum knows. it's being said everywhere by my friends on sites or forums i use/visit.
for example, i'm called Korra on IMVU often. so it stuck, i also accepted it as part of my many nicknames.

#9
Fidite Nemini

Fidite Nemini
  • Members
  • 5 739 messages

he did, actually. he synced with my computer's network and tried to access my restricted private files. this action actually activated my computer's defenses to tap into his phone and ripped it apart from within digitally. that defense was one of my computer's defenses that protects computer from unauthorized access. you could say i had some sort of digital monster like digimon that screwed up his phone

 

 

That's ... that's not how computer security works. Sounds more like you had a nasty virus that triggered and he got it too when he connected to your PC's network.



#10
Guest_mikeucrazy_*

Guest_mikeucrazy_*
  • Guests

Handles eh(canuck edition).word i use different ones for different sites.although i barley go to them anymore more like just two now.anyhow i was right, im a.......



#11
Guest_TrillClinton_*

Guest_TrillClinton_*
  • Guests

That's ... that's not how computer security works. Sounds more like you had a nasty virus that triggered and he got it too when he connected to your PC's network.

I was trying to catch her this is a tall tale.

 

CS, you don't have to lie. Security mechanism that has that capability probably wouldn't be cheap. A few things about exploits, they are system dependant and your exploit apparently works on phones, how many operating systems does this have to be triggered for? Do they all share the same vulnerabilities?  What version of the OS was he using? Another thing, That seems like a short time for minimal port scanning.

 

Also, phone networks change their IP addresses frequently, was he using a WIFI or phone? was it connected through bluetooth. I'm sorry CS but this kind of sounds like bullshit. You do not have to lie everytime,just tell the truth and everything will be good.



#12
Cassandra Saturn

Cassandra Saturn
  • Members
  • 4 205 messages

What phone did he have? What operating system do you have? Is this a public software or did you customize it and make it on your own?


his were samsung model, my own being HP model. it's public software, not many people knows how to protect their ow computer. i have several layers of defenses on my computer. so it's impossible to destroy the operating system. any device like phones without authorized access also makes them as an threat to the computer, they have command program that tells them to destroy those without authorized access.

#13
Guest_TrillClinton_*

Guest_TrillClinton_*
  • Guests

his were samsung model, my own being HP model. it's public software, not many people knows how to protect their ow computer. i have several layers of defenses on my computer. so it's impossible to destroy the operating system. any device like phones without authorized access also makes them as an threat to the computer, they have command program that tells them to destroy those without authorized access.

 

What android was he using? Are you telling me right now that your antivirus, finds vulnerabilities in a system and it is able to respond back to to any phone device with an attack of it's own? It is also very possible to crash an operating system. They have just gotten better at protecting that. The OS has to run in kernel mode sometime. 

 

img21.png

 

Some systems run on a single ccontiguousmodel. In some instances it was possible to overwrite the operating system thus crashing it.



#14
Guest_Sienna_*

Guest_Sienna_*
  • Guests

I think the two of us live on different planets...... xD

Welcome back, anyway!^^



#15
Guest_mikeucrazy_*

Guest_mikeucrazy_*
  • Guests

I think the two of us live on different planets...... xD

Welcome back, anyway!^^

 

well Man are from 

Spoiler

 

and Woman are from 

Spoiler



#16
Cassandra Saturn

Cassandra Saturn
  • Members
  • 4 205 messages

What android was he using? Are you telling me right now that your antivirus, finds vulnerabilities in a system and it is able to respond back to to any phone device with an attack of it's own? It is also very possible to crash an operating system. They have just gotten better at protecting that. The OS has to run in kernel mode sometime.

that's what i'm trying to say. it was first time it actually happened.  his phone got wiped while my computer crashed itself
 also, please do not call me a liar. it's rude and offensive to me

I think the two of us live on different planets...... xD
Welcome back, anyway!^^

thanks! ~_^

#17
Guest_TrillClinton_*

Guest_TrillClinton_*
  • Guests

that's what i'm trying to say. it was first time it actually happened.  his phone got wiped while my computer crashed itself
 also, please do not call me a liar. it's rude and offensive to me
 

You have done this numerous times CS. HAHAHAHAHHAHA his phone got whiped? I am seriously out. You should direct the next watchdogs.



#18
Angry_Elcor

Angry_Elcor
  • Members
  • 1 673 messages

How temporarily?



#19
Fidite Nemini

Fidite Nemini
  • Members
  • 5 739 messages

You have done this numerous times CS. HAHAHAHAHHAHA his phone got whiped? I am seriously out. You should direct the next watchdogs.

 

Technically it should be possible to use a virus as a defensive mechanism if it's properly coded to not attack your own system. But something like that wouldn't be a system you'd connect to a network, because the defensive worth would be exactly that the virus would jump to and wreck any device that's not protected against it and any device that's authorized to access a network is an inherent attack vector.

 

That aside, for a virus or any other alike mechanism to actually be useful as an offensive countermeasure, it would need to be both compatible with all the different systems that could connect with a PC aswell be able to exploit the innumerable access points. There's a reason that malware usually only targets very specific backdoors or security exploits, which is that it's not easy to find and exploit those defensive gaps, let alone find and exploit all the different systems, with its different versions and update the whole thing to keep on par with plugged loopholes and masks to avoid THEIR anti-viruses. All in all, I would consider something like this a physical impossibility, because you couldn't possibly keep up locating new attack vectors for all those different systems as fast as they would routinely plug them. This isn't PC security, this would be fullblown cyberwarfare.

 

It's not like you can just code the equivalent of a can full with maple syrup on top of a door that will fall onto unsuspecting burglars ...



#20
Guest_TrillClinton_*

Guest_TrillClinton_*
  • Guests

Technically it should be possible to use a virus as a defensive mechanism if it's properly coded to not attack your own system. But something like that wouldn't be a system you'd connect to a network, because the defensive worth would be exactly that the virus would jump to and wreck any device that's not protected against it.

 

That aside, for a birus or any other alike mechanism to actually be useful as an offensive countermeasure, it would need to be both compatible with all the different systems that could connect with a PC aswell be able to exploit the innumerable access points. There's a reason that malware usually only targets very specific backdoors or security exploits, which is that it's not easy to find and exploit those defensive gaps, let alone find and exploit all the different systems, with its different versions and updated the whole thing to keep on par with plugged loopholes and masks to avoid THEIR anti-viruses. All in all, I would consider something like this an impossibility, because you couldn't possibly keep up locating new attack vectors for all those different systems as fast as they would routinely plug them. This isn't PC security, this would be fullblown cyberwarfare.

 

It's not like you can just code the equivalent of a can full with maple syrup on top of a door that will fall onto unsuspecting burglars ...

 

I am laughing because in this situation it is highly unlikely. Need to head out will write why when I return 



#21
TheChris92

TheChris92
  • Members
  • 10 642 messages

No offence to the OP but I was expecting something else entirely when entering this thread and left disappointed. :I



#22
Guest_TrillClinton_*

Guest_TrillClinton_*
  • Guests

Technically it should be possible to use a virus as a defensive mechanism if it's properly coded to not attack your own system. But something like that wouldn't be a system you'd connect to a network, because the defensive worth would be exactly that the virus would jump to and wreck any device that's not protected against it and any device that's authorized to access a network is an inherent attack vector.
 
That aside, for a virus or any other alike mechanism to actually be useful as an offensive countermeasure, it would need to be both compatible with all the different systems that could connect with a PC aswell be able to exploit the innumerable access points. There's a reason that malware usually only targets very specific backdoors or security exploits, which is that it's not easy to find and exploit those defensive gaps, let alone find and exploit all the different systems, with its different versions and update the whole thing to keep on par with plugged loopholes and masks to avoid THEIR anti-viruses. All in all, I would consider something like this an impossibility, because you couldn't possibly keep up locating new attack vectors for all those different systems as fast as they would routinely plug them. This isn't PC security, this would be fullblown cyberwarfare.
 
It's not like you can just code the equivalent of a can full with maple syrup on top of a door that will fall onto unsuspecting burglars ...


You can definitely use a virus as a defense mechanism But here is the thing. This supposed vulnerability attacked her system and the friend's system. These are two different platforms, one is running a Linux kernel and the other is running a windows kernel. This is just not any kernel, an android kernel. While it is possible to write multiple platform exploits, it is only possible when the two systems share the same holes. Like the openssl bug that was discovered sometime back. My problems comes to mind with 1) Op's track record of skewing the truth 2) if such a system was written how would it be able to keep up with the different versioning of the android kernel. Let's not forget how quick large open source projects are patched by the community.

It sounds like a tall tale to me

#23
Cassandra Saturn

Cassandra Saturn
  • Members
  • 4 205 messages
if it sounds like tall tale to you, it doesn't matter what it sounds like to others, if you believe it or not.

the point of this thread is about what happened. so i'm talking about my experience that day in december.

if you don't like it, deal with it. :D

#24
Kantr

Kantr
  • Members
  • 8 727 messages

I visited for Korra news, now I get to learn about Computer security.


  • Cassandra Saturn aime ceci

#25
DEUGH Man

DEUGH Man
  • Members
  • 640 messages
I am usually the indifferent to these types of posts. The false expectations you created have angered me. You shall never receive internet cookies from me.