Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Topics - SiliconCactus

Pages: [1]
Off Topic / Outbox broken for banned users, while Inbox isn't?
« on: May 30, 2016, 05:47:41 AM »
I've been reading through the stupid stuff I said on my old (banned) account for kicks, but it's kinda one-sided. I can't see my outbox, and it says something about "not being allowed to use this feature" which makes me assume that it's got some sort of loophole that allows banned users to PM (??).

So I guess PM me stuff I sent you as Darkness ZXW between like 2010-2013 for a trip through time

edit: here's the error:

An Error Has Occurred!
You are not allowed to send personal messages.


I think it's a pretty good rule to cut down on spam topics about things already answered. What do you guys think?


Off Topic / Season 4 of Arrested Development is out!
« on: May 26, 2013, 03:21:37 AM »
Just noticed it, it's up on Netflix!

General Discussion / SiliconCactus's Creeper Arena Server -- Up now!
« on: April 20, 2013, 06:09:52 PM »
Over the span of an hour, I made a quick creeper setup. It uses a default build. Here's a picture.

That's pretty much it. It's needed to be manually controlled, so it's going to be locked and unlocked quite a bit.

The rate is currently $27.50 per ounce of silver.

I'm moderately rich in terms of the amount of money I had before!

General Discussion / SpeedKart gamemode now default, as of Revision 1806
« on: February 04, 2013, 10:21:31 PM »
The same "SpeedKart" gamemode from Badspot's server is now default. Rejoice and celebrate.

EDIT: As are terrain bricks. And camera control.

Off Topic / Cyber Security Megathread
« on: January 20, 2013, 09:00:21 PM »
Computer Security Megathread
In the time of the internet, there are millions of different viruses and exploits used by internet hackers and criminals. In this Megathread, I will be going over the different types of viruses and ways hackers infect people with them, and later how to remove and protect against viruses. Enjoy!

Types of Viruses

Remote Access Tools
A Remote Access Tool is, basically, a program that lets a host (the "hacker") control a computer (the "slave") either consensually or unknowingly to the "slave". Although there are many different types of RATs, most have a few common features, such as screen/camera capture or image control, file management, shell control, computer control, and registry management. Though some RATs are made by hand, most are premade; including Cybernet, Darkcomet, Blackshades, and Blackhole.

Keyloggers, as the name suggests, log keys pressed by the infected party and send the logs to the hacker, either by FTP or by email. The main program used to create keyloggers is Project Neptune, though most keyloggers are made by hand, as they are quite basic--all it has to do is copy some text and send it through FTP.

Adware is a type of virus that promotes products by showing ads or highlighting text on webpages, as some users have experienced. It is usually the easiest virus to remove, as it usually comes with free program installers, and can be removed by simply removing the program via Add or Remove Programs--some viruses, however, are not so easy to remove, which brings us to..

Ransomware is a type of virus that locks down a victim's computer until they pay some amount of money, usually $150-$500, usually under the guise that the FBI/Police/Government has locked down their computer. Most of the time, even if the user pays the ransom the computer is still locked.

Types of Infections

Silent Java Drive By
The Silent Java Drive By is an exploit in Java that enables a hacker to infect a user with a virus through the user's browser. They are almost always made from scratch.

Trojan Horse
Like its name suggests, a Trojan horse infection is basically a legitimate looking program that is either completely a virus or binded to a virus. They are usually something along the lines of fake antiviruses, pirated games, or game hacks; fooling victims into installing a virus.

Another method that hackers use with Trojan horses is E-Whoreing. E-Whoreing is basically a hacker pretending to be a internet whore, who gives out nude or suggestive pictures, research shows, and other types of research. They usually bind viruses to video or picture files.
A worm is a virus that spreads itself between computers, usually from computers on the same internet network or through instant messaging. Most worms are set in action unknowingly by already infected computers. They are usually coded by hand.

General Discussion / disregard
« on: January 13, 2013, 10:45:10 PM »
stuff wrong forum entirely

Pages: [1]