Slavi 94 Master Poster Featured Poster

What I am saying is that you can perform the pertition before installing your openSuse. As to begin with, you mentioned you have no idea what pertitions you really have as you think that your windows os is on a pertition 75GB however, you don't get that 1 listed. Using GParted you'll see all existing partitions and you won't be in doubt what/where exists or not. As from there if you have a partition as mentioned earlier 400-somethin GB, you can separate it and then install SUSE on already existing partition instead of making 1 while installing it

Slavi 94 Master Poster Featured Poster

Run linux on bootable flash drive and use GParted to see your actual partitions. You can use GParted to create a partition for Linux only or anything you want, a separated one

Slavi 94 Master Poster Featured Poster

@Xlphos, Kali linux = Backtrack 5

Slavi 94 Master Poster Featured Poster

I've read stories of peoples'houses being robbed while they've gone on vacations, of course, notifying Facebook that they will be gone for a certain period ..

Slavi 94 Master Poster Featured Poster

Ha , nice story but still just a story =)

Slavi 94 Master Poster Featured Poster

Hello

Slavi 94 Master Poster Featured Poster

Try to make a maze solver, will keep you busy for a bit and you'll get quite some experience with it I hope ( Should be able to do after watching those vids) such as , S = start position, G = goal , X = no wall , W = wall and in a maze like this

WXXWX
SXWWG
WXXXX

and print out the correct path :) Also be more creative on the maze once you get it right :D

Slavi 94 Master Poster Featured Poster

I think if they are doing what they are with survelliance cameras, they should be used ONLY on purpose, such for crime investigation etc and noting else. I don't feel like people knowing where and when I go, not because I have something to hide just because I don't like it personally

Slavi 94 Master Poster Featured Poster

What programming language are you using @Mike? I've had some experience with robots, the so called line followers, which was pretty basic project to do but for that I was using C, just wondering what is used in dynamics simulations and robot control

Slavi 94 Master Poster Featured Poster

this can help you get started

Slavi 94 Master Poster Featured Poster

Click Here

I've really seen some documentaries of what is coming in the future and it kinda scares me. Also, I hear often that google tracks and records all data they get such as browsing history, gmail uses, phone gps tracking etc, and they give information to agencies if asked for, is that true?

Slavi 94 Master Poster Featured Poster

@Rubber, does debian have advantage over other distros in connection with embedded systems? :o

@Mike, I actually changed the desktop environment to xfce of my Kali os as I didnt really like the default look. Also, elementary os has really seem to have grown quite a bit. Have you watch the statistics from Linux sucks 2014

Slavi 94 Master Poster Featured Poster

Fixed it using this

Slavi 94 Master Poster Featured Poster

Here is what I get for existing JRE's , it says unbound for 1.8? Also java -version returns this

Slavi 94 Master Poster Featured Poster

It's been a few days since I had the time to dig into java, now I went to eclipse and all I see is errors .. Here is a picture. Any ideas how to fix it? That is just weird because it says no build path was found while i've been using it for long time ..

Slavi 94 Master Poster Featured Poster

How is ur system performance? CPU/RAM/Disk/Network

Slavi 94 Master Poster Featured Poster

Do you know if there is a work around for java(and not only) browser extension for chromium/chrome? Since last(or was when I had the problem) update I heard that google stopped support for those plugins(can't remember the name(NPAPI?)) and I had hard times trying to check my online banking, windows was needed ...

Slavi 94 Master Poster Featured Poster

Me personally, I used to have ubuntu before, then I switched to Elementary os(Ubuntu based) as my home os. I am pretty satisfied with it as for normal use on home pc. On my laptop I am using Kali os(Debian) mainly because I am doing Msc in Computer and Cyber security, and Kali comes with preinstalled tools, which is aimed at pentesters. I've heard that black arch linux is about the same but haven't tried it out yet.

Slavi 94 Master Poster Featured Poster

Um, do you actually see any light at all when pressing it? Does anything start working or its completely dead?

Slavi 94 Master Poster Featured Poster

It sounds more of a hardware problem rather than software to me. Is it a new laptop or has it worked before? If we follow logic, if it doesnt turn on either from the battery nor the plug, then the problem should be located after the power supply and not in it. That leads me to the motherboard :( What if the power button itself won't work? Could you test that or your laptop still has warantee and you are not opening it?

Slavi 94 Master Poster Featured Poster

I used Click Here as my first tutorial of JavaFX, gave me basic understanding of it

Slavi 94 Master Poster Featured Poster

The second example

Slavi 94 Master Poster Featured Poster

I've seen few "guides" of how to reset the pw due to a vulnerability in the system. There is a way to get cmd and basically remove/change the pw using it. I am not sure whether DaniWeb rules would allow me to link it but if you just google around u'll get it pretty quick

Slavi 94 Master Poster Featured Poster

I am just wondering, how do browsers actually keep/save usernames and passwords? Is it in plaintext? or encrypted somewhere and then decrypted when a specific page is visitted?

Slavi 94 Master Poster Featured Poster

Don't think that buying a new laptop will be necessary, in the work case you will probably just have to restore your system. Can you give us some more details about ur laptop's performance? Open task manager and do different stuff and check how resources change. Would be pretty much if you could report back - CPU usage, RAM, Network, Disk, etc, could you check it on start up and after maybe an hr after it's been working?

Another thing in the meanwhile, you could check the processes running in the background and check the file names on google whether they have been reported as malicious or not

Slavi 94 Master Poster Featured Poster

By using a personal computer, your brain and a compiler?

Slavi 94 Master Poster Featured Poster

Thanks Hiroshe, very well explained and detailed! I hope this helps more fellow members with their questions about RC4

Slavi 94 Master Poster Featured Poster

When I had a static IP back in the days, I had to call the ISP to locate my connection before they activate it. If it's a static IP you have to enter the details manually, otherwise with dynamic should be just plug and go but make sure you have selected that it is in the properties @ IPv4 - properties

Slavi 94 Master Poster Featured Poster

I only have windows because I couldn't ever make skype to run on my Kali Linux 64 bit (debian distro) ... first thing i ever do on it other than skype and already makes me go back to linux :D

Thanks for your answer mike, I just hope there isn't anything that I wouldn't want to have available on my system. Didn't detect unknown background processes either but was a bit confused of the crap ware, usually when I do custom installs I only get the program itself without BONUSware :)

Slavi 94 Master Poster Featured Poster

So earlier today I found a course in wireshark, downloaded a .bin image and decided to install powerISO to run the file and see what is inside. As soon as I installed powerISO, I noticed a new software program "Seach project" was installed as well, my immediate action was to re install it from the control panel. Then I checked the web and I am not sure whether to worry or not, apparently it downloads/installs files or programs by itself. It was on my pc less than 1 minute but still it could've done quite some things .. i realized it because my default search engine was changed on my browser. So after resetting back to default settings and removing it, + avast doesnt find any malicious software on my pc, should I be worried about search engine being on my pc? Also, i deleted powerISO right away as well ... and I am pretty sure than I did customized installation, and there was nowhere mentioned about search project being installed ...

Slavi 94 Master Poster Featured Poster

Pretty cool tbh, web pages really need to be more secure and shouldnt communicate in plain text(sending passwords/usernames)

Slavi 94 Master Poster Featured Poster

Or you could download an ISO image(for free for all linux distros) and burn it to a usb stick, known as bootable usb stick. Ubuntu has a full, detailed guide on how to make a bootable usb stick with ubuntu(should be the same for other distributions)

Slavi 94 Master Poster Featured Poster

Hey Hiroshe! Thanks for responding and clarifying!

So, I was way off thinking that there are 2 S arrays, however, it turns out that it is the same array but 2 elements in it exchange their positions?

For example, if i = 10, for j we get some value lets say 50. Then j is pointing and is located at position 50 in the S array, then they swap their locations such as on position 10, now it will be 50 and on position 50, it will be 10, correct? Just wondering here, how do you even manage to keep track of which value is i and which is j in the resulting S array or eventually it is only j values?

And 1 more question about decrypting the key in the example you gave.

1) Get the password from the user.
2) Hash/KDF the password into an n-bitstring.
3) Generate a n-bit randon number.
4) xor the number with the n-bitstring to get the key.
5) The first n-bits of the ciphertext are the random number.

In here, n-bitstring and n-bit random number are with different size correct? So it would be n-bitstring and m-bit random number, where the number is shorter than the hashed string. Then the first m bits of the cipher text are the random number?

To decrypt:

1) Get password from the user.
2) Hash/KDF the password into a n-bitstring.
3) Read the first n-bit's of the ciphertext.
4) xor the n-bitstring with the …
Slavi 94 Master Poster Featured Poster

this? assuming windows is used for the executable files

Slavi 94 Master Poster Featured Poster

how about if (yon == "yes")||(yon =="no")||(yon=="Yes")||(yon =="No")

Slavi 94 Master Poster Featured Poster

I have my Bachelors in Electronics and computer engineering. It will be really hard for you to do some of the projects as we were given, provided with most of the hardware we needed for our projects such as robot, line follower, where you start at the very begining and you have to make the hardware and the software yourself. But away, here is partly my education

Semester 1

Digital electronics, getting into VHDL and making a project with a small elevator. We had to make the software to move the elevator to different floors with some spesific reqs such as if the door is opened do not move and wait until it is closed.

Java Introduction with Blue J - Any java book would give you the basics, especially this forum. People in here are really skilled and I find the support extremely helpful for myself not only in programming. Also, google is your best friend but don't cheat yourself, try to write all the code yourself

Mathematics(Can't remember the exact name of the course nor any of the subjects)

Semester 2
Digital Electronics 2 - Getting into C language

Java 2, intro to Android

Project combined - we had to make a system that keeps tract of medical equipment, such as a knife, or anything. The idea is to have an rfid card that represents an item and rfid readers on each door so when an item is moved around the reader will send a data to …

Slavi 94 Master Poster Featured Poster

Again it depends on how many is almost all? 9/10? Also the implementation of the last one, how long does it take for the compiler. I guess you could try and do so but its not a good practice especially if time/efficiency is crutial for your project. And then again in big projects almost all might be 900 out of 1000, will be pointless to really recompile the rest and in my opinion it might make the code itself confusing especially if you work with multiple people. I rather keep things clear and in multiple file so I always only implement what I need

Slavi 94 Master Poster Featured Poster

Hey guys, I have some questions about the structure of KSA. The way that I find it being explained is as follows:

The first step of this algorithm consist in initializing the S table with the
identity permutation: the values in the array are equal to their index.
Once the S array is initialized, the next step consist in shuffling the array
using the key to make it a permutation array. To do so, we simply iterate 256
times the following actions after initializing i and j to 0:
• compute j = j + S[i] + key[i mod keylength]
• swap S[i] and S[j]
• increment i

So, the way I understand it

Create an array with 256 items, each of the indexes in the array contains value = index , save it as S of i
For i = 0 to 256 (Random number or sequenced numbers?) compute j = j + S[i] + key[i mod keylength] and on for S[j] save the result S of j.

finally swap values of S of i and S of j (All values or just some) - this doesnt make sense in this way, like why would u swap same values on same indexes and that S of i is simple all numbers from 0 to 255

Also, where/how is the key itself generated?

Slavi 94 Master Poster Featured Poster

and if you are still confused after that ^ very detailed explanation, 1 byte = 8 bits, thats how you get 8 numbers 0s or 1s

Slavi 94 Master Poster Featured Poster

I think what Mike is trying to explain is that if you have a file that contains 10000 functions inside and you use only 1 or 2 of them, it will be pointless to include the file and compile all functions all the time when they are not needed.

yes, it is possible to do and the answer to your question - yes it is poor convention

Slavi 94 Master Poster Featured Poster

Oh, I see, Thanks @Hiroshe

Slavi 94 Master Poster Featured Poster

Much appreciated guys, thank you

Slavi 94 Master Poster Featured Poster

Thanks

Slavi 94 Master Poster Featured Poster

Please before you answer NOTE , I am not trying to implement a keylogger, this is just a QUESTION.

So, It just randomly happened that I started thinking about this and I figured that in java if you want to have a keyEventListener the key should be entered in a GUI/Application right? Therefore, if a person want to create a keylogger that has to catch key events outside of the application, he or she won't be able?

Slavi 94 Master Poster Featured Poster

Ok, I am asking this because I was attending a Crypto lecture, when the Randomware was mentioned in there, it was said that for example in those programs if you try to shut down your pc, everything will be deleted and if you don't pay everything will be deleted as well. What confuses me is the state of your system when infected with it, what I thought was that everything is locked and the only thing you can do is basically nothing other than looking to a pop up on your pc saying you have been compromised and a textfield where you are supposed to enter the private key to unlock your pc files. Apparently I am wrong, ye? Because in the case of you being able to access everything, well obviously not open/use it, then yeah that free decryptor seems really good tool to have

Slavi 94 Master Poster Featured Poster

Hey James, I am sorry that i am asking in here but don't want to spam the forum with new thread for a question that came up now concerning XMLEncoder. I started looking around to find out more about it and came accross this article. What I see there is that XMLEncoder is writing information in plain text to an XML file, is that true?

It is probably my fault that i haven't mentioned it yet, i am using XStream to write to an xml file, I already got it, i can create new/modify existing/ delete items in the xml file. The problem that i am facing was that my data was in plain text inside the xml file. What I would like to do is to have in encrypted so that the only way to view the data is inside the application and in the xml file everything inside would be shown as "unrecognizable" text. Did I understand the idea behind XMLEncoder wrong, or could you point me to a different direction?

Slavi 94 Master Poster Featured Poster

I came accross this article. And I am wondering now, how would you upload a file from your system if all files have been encrypted? I have 0 experience with randomwares but as far as I've heard your desctop is showing only a pop up window asking you to pay some amount of money or are you able to browse through your pc but not able to open files?

Slavi 94 Master Poster Featured Poster

Kk, gonna take a look at XMLEncode, thanks :)

Slavi 94 Master Poster Featured Poster

you can start by asking the user to enter 5 letters not only 1. To do so you can use a for loop and save it into an array of chars

Slavi 94 Master Poster Featured Poster

Hey James,
I've already read it as I am doing Masters in computer security. I've read couple similiar as well but my point here was that I want to implement these stuff with main goal java practicing. If I hash the passwords I won't be able to go backwards and show them back to me as I want to keep them in such a way that at any time I would like to check what was my password for a specific web page I would do it.

I do understand that passwords in databases should not be kept in plain text or simple hashing function such as MD5(from the point of view that with brute force or dictionary it is possible to find out what the password is), with different salt for each password, thats how people should do it so even if sqli(for example) is successful the acquired passwords won't be possible ( well to some extend practically) to be guessed.

So yeah, what I want is to encrypt information to store it in(Still i have no idea where thats why I am doing it in an XML file, and it is in plain text but empty of course still) and then when I select an item from the web page column, it would decrypt the data about it and present it to me