Korra returns... kinda of.. temporarily
#1
Posté 09 février 2015 - 03:50
funny thing is, jerk of my friend decided to screw me around with my computer after i warned him to not screw around with my stuff. so it was mean joke on me, but it also backfired on him. his phones got screwed up by my computer's defenses. it resulted in massive loss of data for him. while my computer self-screwed itself by shutting down.
fortunately, no data was lost but the computer is still down. i'm lucky lol
aside that, how is everyone?
- DeathScepter et Zekka aiment ceci
#3
Posté 09 février 2015 - 03:57
I thought you were gonna give us news of the next Avatar series.
i would have if it was real news. but.. i needed t let others know i'm not gone
#4
Guest_TrillClinton_*
Posté 09 février 2015 - 03:57
Guest_TrillClinton_*
funny thing is, jerk of my friend decided to screw me around with my computer after i warned him to not screw around with my stuff. so it was mean joke on me, but it also backfired on him. his phones got screwed up by my computer's defenses. it resulted in massive loss of data for him. while my computer self-screwed itself by shutting down.
How? Did he have his phone synched up somehow to your computer? Explain this defense mechanism because this is the first time I have heard it being used in the mainstream
#5
Guest_mikeucrazy_*
Posté 09 février 2015 - 04:00
Guest_mikeucrazy_*
so i get the joke now, the title of the post is korra returns.you dub'd yourself korra and this is kind of a return for you....

Modifié par Chief Reload, 09 février 2015 - 04:02 .
#6
Posté 09 février 2015 - 04:03
How? Did he have his phone synched up somehow to your computer? Explain this defense mechanism because this is the first time I have heard it being used in the mainstream
he did, actually. he synced with my computer's network and tried to access my restricted private files. this action actually activated my computer's defenses to tap into his phone and ripped it apart from within digitally. that defense was one of my computer's defenses that protects computer from unauthorized access. you could say i had some sort of digital monster like digimon that screwed up his phone
- DeathScepter aime ceci
#7
Guest_TrillClinton_*
Posté 09 février 2015 - 04:05
Guest_TrillClinton_*
he did, actually. he synced with my computer's network and tried to access my restricted private files. this action actually activated my computer's defenses to tap into his phone and ripped it apart from within digitally. that defense was one of my computer's defenses that protects computer from unauthorized access. you could say i had some sort of digital monster like digimon that screwed up his phone
What phone did he have? What operating system do you have? Is this a public software or did you customize it and make it on your own?
#8
Posté 09 février 2015 - 04:08
so i get the joke now, the title of the post is korra returns.you dub'd yourself korra and this is kind of a return for you....
actually, Korra is also my nickname that others on this forum knows. it's being said everywhere by my friends on sites or forums i use/visit.
for example, i'm called Korra on IMVU often. so it stuck, i also accepted it as part of my many nicknames.
#9
Posté 09 février 2015 - 04:12
he did, actually. he synced with my computer's network and tried to access my restricted private files. this action actually activated my computer's defenses to tap into his phone and ripped it apart from within digitally. that defense was one of my computer's defenses that protects computer from unauthorized access. you could say i had some sort of digital monster like digimon that screwed up his phone
That's ... that's not how computer security works. Sounds more like you had a nasty virus that triggered and he got it too when he connected to your PC's network.
#10
Guest_mikeucrazy_*
Posté 09 février 2015 - 04:15
Guest_mikeucrazy_*
Handles eh(canuck edition).word i use different ones for different sites.although i barley go to them anymore more like just two now.anyhow i was right, im a.......
#11
Guest_TrillClinton_*
Posté 09 février 2015 - 04:16
Guest_TrillClinton_*
That's ... that's not how computer security works. Sounds more like you had a nasty virus that triggered and he got it too when he connected to your PC's network.
I was trying to catch her this is a tall tale.
CS, you don't have to lie. Security mechanism that has that capability probably wouldn't be cheap. A few things about exploits, they are system dependant and your exploit apparently works on phones, how many operating systems does this have to be triggered for? Do they all share the same vulnerabilities? What version of the OS was he using? Another thing, That seems like a short time for minimal port scanning.
Also, phone networks change their IP addresses frequently, was he using a WIFI or phone? was it connected through bluetooth. I'm sorry CS but this kind of sounds like bullshit. You do not have to lie everytime,just tell the truth and everything will be good.
#12
Posté 09 février 2015 - 04:18
What phone did he have? What operating system do you have? Is this a public software or did you customize it and make it on your own?
his were samsung model, my own being HP model. it's public software, not many people knows how to protect their ow computer. i have several layers of defenses on my computer. so it's impossible to destroy the operating system. any device like phones without authorized access also makes them as an threat to the computer, they have command program that tells them to destroy those without authorized access.
#13
Guest_TrillClinton_*
Posté 09 février 2015 - 04:21
Guest_TrillClinton_*
his were samsung model, my own being HP model. it's public software, not many people knows how to protect their ow computer. i have several layers of defenses on my computer. so it's impossible to destroy the operating system. any device like phones without authorized access also makes them as an threat to the computer, they have command program that tells them to destroy those without authorized access.
What android was he using? Are you telling me right now that your antivirus, finds vulnerabilities in a system and it is able to respond back to to any phone device with an attack of it's own? It is also very possible to crash an operating system. They have just gotten better at protecting that. The OS has to run in kernel mode sometime.

Some systems run on a single ccontiguousmodel. In some instances it was possible to overwrite the operating system thus crashing it.
#14
Guest_Sienna_*
Posté 09 février 2015 - 04:21
Guest_Sienna_*
I think the two of us live on different planets...... xD
Welcome back, anyway!^^
#15
Guest_mikeucrazy_*
Posté 09 février 2015 - 04:26
Guest_mikeucrazy_*
I think the two of us live on different planets...... xD
Welcome back, anyway!^^
well Man are from
and Woman are from
#16
Posté 09 février 2015 - 04:27
that's what i'm trying to say. it was first time it actually happened. his phone got wiped while my computer crashed itselfWhat android was he using? Are you telling me right now that your antivirus, finds vulnerabilities in a system and it is able to respond back to to any phone device with an attack of it's own? It is also very possible to crash an operating system. They have just gotten better at protecting that. The OS has to run in kernel mode sometime.
also, please do not call me a liar. it's rude and offensive to me
thanks! ~_^I think the two of us live on different planets...... xD
Welcome back, anyway!^^
#17
Guest_TrillClinton_*
Posté 09 février 2015 - 04:29
Guest_TrillClinton_*
that's what i'm trying to say. it was first time it actually happened. his phone got wiped while my computer crashed itself
also, please do not call me a liar. it's rude and offensive to me
You have done this numerous times CS. HAHAHAHAHHAHA his phone got whiped? I am seriously out. You should direct the next watchdogs.
#18
Posté 09 février 2015 - 04:39
How temporarily?
#19
Posté 09 février 2015 - 04:50
You have done this numerous times CS. HAHAHAHAHHAHA his phone got whiped? I am seriously out. You should direct the next watchdogs.
Technically it should be possible to use a virus as a defensive mechanism if it's properly coded to not attack your own system. But something like that wouldn't be a system you'd connect to a network, because the defensive worth would be exactly that the virus would jump to and wreck any device that's not protected against it and any device that's authorized to access a network is an inherent attack vector.
That aside, for a virus or any other alike mechanism to actually be useful as an offensive countermeasure, it would need to be both compatible with all the different systems that could connect with a PC aswell be able to exploit the innumerable access points. There's a reason that malware usually only targets very specific backdoors or security exploits, which is that it's not easy to find and exploit those defensive gaps, let alone find and exploit all the different systems, with its different versions and update the whole thing to keep on par with plugged loopholes and masks to avoid THEIR anti-viruses. All in all, I would consider something like this a physical impossibility, because you couldn't possibly keep up locating new attack vectors for all those different systems as fast as they would routinely plug them. This isn't PC security, this would be fullblown cyberwarfare.
It's not like you can just code the equivalent of a can full with maple syrup on top of a door that will fall onto unsuspecting burglars ...
#20
Guest_TrillClinton_*
Posté 09 février 2015 - 04:52
Guest_TrillClinton_*
Technically it should be possible to use a virus as a defensive mechanism if it's properly coded to not attack your own system. But something like that wouldn't be a system you'd connect to a network, because the defensive worth would be exactly that the virus would jump to and wreck any device that's not protected against it.
That aside, for a birus or any other alike mechanism to actually be useful as an offensive countermeasure, it would need to be both compatible with all the different systems that could connect with a PC aswell be able to exploit the innumerable access points. There's a reason that malware usually only targets very specific backdoors or security exploits, which is that it's not easy to find and exploit those defensive gaps, let alone find and exploit all the different systems, with its different versions and updated the whole thing to keep on par with plugged loopholes and masks to avoid THEIR anti-viruses. All in all, I would consider something like this an impossibility, because you couldn't possibly keep up locating new attack vectors for all those different systems as fast as they would routinely plug them. This isn't PC security, this would be fullblown cyberwarfare.
It's not like you can just code the equivalent of a can full with maple syrup on top of a door that will fall onto unsuspecting burglars ...
I am laughing because in this situation it is highly unlikely. Need to head out will write why when I return
#21
Posté 09 février 2015 - 04:57
No offence to the OP but I was expecting something else entirely when entering this thread and left disappointed. :I
#22
Guest_TrillClinton_*
Posté 09 février 2015 - 05:16
Guest_TrillClinton_*
Technically it should be possible to use a virus as a defensive mechanism if it's properly coded to not attack your own system. But something like that wouldn't be a system you'd connect to a network, because the defensive worth would be exactly that the virus would jump to and wreck any device that's not protected against it and any device that's authorized to access a network is an inherent attack vector.
That aside, for a virus or any other alike mechanism to actually be useful as an offensive countermeasure, it would need to be both compatible with all the different systems that could connect with a PC aswell be able to exploit the innumerable access points. There's a reason that malware usually only targets very specific backdoors or security exploits, which is that it's not easy to find and exploit those defensive gaps, let alone find and exploit all the different systems, with its different versions and update the whole thing to keep on par with plugged loopholes and masks to avoid THEIR anti-viruses. All in all, I would consider something like this an impossibility, because you couldn't possibly keep up locating new attack vectors for all those different systems as fast as they would routinely plug them. This isn't PC security, this would be fullblown cyberwarfare.
It's not like you can just code the equivalent of a can full with maple syrup on top of a door that will fall onto unsuspecting burglars ...
You can definitely use a virus as a defense mechanism But here is the thing. This supposed vulnerability attacked her system and the friend's system. These are two different platforms, one is running a Linux kernel and the other is running a windows kernel. This is just not any kernel, an android kernel. While it is possible to write multiple platform exploits, it is only possible when the two systems share the same holes. Like the openssl bug that was discovered sometime back. My problems comes to mind with 1) Op's track record of skewing the truth 2) if such a system was written how would it be able to keep up with the different versioning of the android kernel. Let's not forget how quick large open source projects are patched by the community.
It sounds like a tall tale to me
#23
Posté 10 février 2015 - 12:34
the point of this thread is about what happened. so i'm talking about my experience that day in december.
if you don't like it, deal with it.
#24
Posté 10 février 2015 - 12:55
I visited for Korra news, now I get to learn about Computer security.
- Cassandra Saturn aime ceci
#25
Posté 10 février 2015 - 01:29





Retour en haut







