Home Original Content Funny Pictures Funny GIFs YouTube Funny Text Funny Movies Channels Search

hide menu

fragman

Rank #1146 on Comments
no avatar Level 310 Comments: Wizard
Online
Send mail to fragman Block fragman Invite fragman to be your friend
Last status update:
-
Personal Info
Date Signed Up:10/03/2010
Last Login:12/19/2014
Funnyjunk Career Stats
Content Ranking:#5453
Comment Ranking:#1146
Highest Content Rank:#1376
Highest Comment Rank:#583
Content Thumbs: 10562 total,  13730 ,  3168
Comment Thumbs: 12593 total,  15253 ,  2660
Content Level Progress: 49% (49/100)
Level 201 Content: Comedic Genius → Level 202 Content: Comedic Genius
Comment Level Progress: 88.6% (443/500)
Level 310 Comments: Wizard → Level 311 Comments: Wizard
Subscribers:21
Content Views:448725
Times Content Favorited:1449 times
Total Comments Made:2671
FJ Points:21813
Favorite Tags: it (2) | Lost (2) | the (2)

latest user's comments

#35 - That's a good start. So if you're serious about it I'd recomme…  [+] (3 new replies) 09/21/2014 on Holy fucking shit +2
User avatar #36 - peanutbraddle (09/21/2014) [-]
I'll brush up on my knowledge of Linux/Bash, and get to it, then. It's been a while, actually.
User avatar #103 - createdjustnow (09/21/2014) [-]
you can also find a university course on the subject, theres a college near me that offers a class in cyber security that ranges from how to ghost a harddrive to how to block ghosting put a nail through it
User avatar #105 - peanutbraddle (09/21/2014) [-]
Neato Burrito
#27 - on the other hand, if you're serious about it that's a differe… 09/21/2014 on Holy fucking shit 0
#26 - uh. don't. Look if you just wanna piss some people off, yo…  [+] (5 new replies) 09/21/2014 on Holy fucking shit +3
User avatar #32 - peanutbraddle (09/21/2014) [-]
Actually, I know a little bit of bash. Nothing extensive, but still, I'm sure it helps. Even if I was just looking to piss some people off, it's not like I'm ever going to forget this stuff. I want to learn it for possible job openings.
#35 - fragman (09/21/2014) [-]
That's a good start. So if you're serious about it I'd recommend studying the firewall/routing/switching side first before diving into the whole hacking thing. The knowledge you gather there makes it much easier to comprehend the other stuff. Once you've got the fundamentals on those topics down and are comfortable using Linux/Bash you can start looking into penetration testing. Because let's be real... there are only 3 reasons for a DDoS: pranking (this includes pseudo-activism), blackmail or diversion/using resources as part of a bigger attack.

The thing is, if you aim for a job in that field, you better not be caught doing shit like that beforehand (or during), unless you are that one in a million genius who's so good everyone will want you due to the notoriety. Having a record of cybercrime doesn't help in a job interview.
User avatar #36 - peanutbraddle (09/21/2014) [-]
I'll brush up on my knowledge of Linux/Bash, and get to it, then. It's been a while, actually.
User avatar #103 - createdjustnow (09/21/2014) [-]
you can also find a university course on the subject, theres a college near me that offers a class in cyber security that ranges from how to ghost a harddrive to how to block ghosting put a nail through it
User avatar #105 - peanutbraddle (09/21/2014) [-]
Neato Burrito
#24 - Thanks. And that's probably my main issue here. I am a securit…  [+] (1 new reply) 09/21/2014 on Holy fucking shit 0
User avatar #41 - teranin (09/21/2014) [-]
Nice to meet another person on this site that understands the vagueries of netsec
#15 - Ok look. Sure, in theory it's possible. But noone in their…  [+] (26 new replies) 09/21/2014 on Holy fucking shit -10
#82 - neokun (09/21/2014) [-]
User avatar #19 - teranin (09/21/2014) [-]
I'm impressed with your knowledge (although I think you might be giving these "hackers" too much credit). Do you work in net sec/admin?
#24 - fragman (09/21/2014) [-]
Thanks. And that's probably my main issue here. I am a security engineer with focus on firewalls and reverse proxies. This is why I apparently seem to overthink things.

Thing is, the method mentioned by you works for let's say... horrible systems or targets where the hoster has no incident response team on call. Looking at the technical contact in the whois for escapistmagazine.com makes this seem... plausible. lol
I've dealt with DDoS of that level, meaning incoming mass HTTP requests from a few 10s up to maybe a hundred sources and that shit is just way too easy to end. Usually you'll simply grab a list of publically available proxies and use that in a custom geoblocking setup and the attack fades away more quickly than the ethics in game journalism. Properly executed DDoS on the other hand is probably the single biggest pain when working in this field and will keep you up at night...
User avatar #41 - teranin (09/21/2014) [-]
Nice to meet another person on this site that understands the vagueries of netsec
User avatar #18 - teranin (09/21/2014) [-]
sorry, and SMTP. dur.
User avatar #17 - teranin (09/21/2014) [-]
I say that, by the way, as a person who does network administration for a company, and who has configured the firewall of that company to deny all incoming requests from all but 6 ports, and even then only SIP and RDP protocols.
User avatar #16 - teranin (09/21/2014) [-]
DDOS attacks come in many forms. The goal of this attack was to shut down the forums, which is why they targeted them specifically, probably because they are amateur as fuck and didn't realize that Escapist does not host on a cloud. When it brought down the whole site shit hit the fan hard.

I agree that it was an impractical, amateurish move. I also agree with pretty much everything else you said, although I think you might be ignoring the variability in policy setups and firewall systems/subscription services. It's possible that they tried a SYN or ICMP strike first, but found the firewall to be ready for it.
User avatar #110 - cuntism (09/21/2014) [-]
You are correct sir. DDoS means Distributed Denial of Service, and that covers so many things.

Just because one way is inefficient doesn't mean it's not effective. Also, they won't be using manual commands, just like most DDoS's they'll be using an automated tool to send commands.
#77 - tmgrskat (09/21/2014) [-]
User avatar #20 - peanutbraddle (09/21/2014) [-]
Where can you learn shit like this?
I feel like actually doing something for a change.
User avatar #111 - cuntism (09/21/2014) [-]
I have 15 years of network and system administration under my belt and I'm still out of the loop on current trends. Getting into it is one thing, it's keeping up with it that's the problem. From 98 until 2007 I controlled a large portion of the world's warez servers (topsites), and this meant not only skills in server and network maintenance, but also scripting (bash, PHP&mySQL, C) and extensive firewalling and encryption skills. But I didn't keep up with current trends and it didn't take long for me to lose my abilities.


Technology moves so fast, unless you're really interested in it, possibly as a career, I wouldn't waste the time learning it all unless you have a practical reason to.
#102 - alexanderh (09/21/2014) [-]
If you're discovered, you will be charged with terrorism. Just letting you know.
User avatar #104 - peanutbraddle (09/21/2014) [-]
I guess the way I worded that makes it sound as if I'm going to fuck with the SJWs.
I'm not.
#106 - alexanderh (09/21/2014) [-]
Yeah, I read the rest of the discussion after posting that.
But seriously, getting caught doing DDoS attacks will get you charged with terrorism.

It's an interesting subject, and I expect that I'll probably specialize in that field when that time comes. I'm doing computer science, and I find IT security to be an interesting topic.
#27 - fragman (09/21/2014) [-]
on the other hand, if you're serious about it that's a different story mate.
#26 - fragman (09/21/2014) [-]
uh. don't.
Look if you just wanna piss some people off, you most likely either won't be secure enough not to get caught and buttraped or not successful enough to have an impact in the first place.

I've spent the last 5 months learning the basics of hacking/penetration testing after 4 years working in the network security field, simply because I want to expand my skillset and at some point switch to doing more of an offensive security and system audit kind of work. It's highly complex and in order to be successful I'd say you need at least good knowledge of TCP/IP, Linux, Windows, some sort of scripting/programming language (having more than one is very beneficial such as python, bash and C) and how network security appliances such as firewalls and IDP systems work. And then you start learning this stuff.

Don't get me wrong, to me it's a ton of fun and a very interesting topic. But it's huge and takes a lot of work to get somewhere.
User avatar #32 - peanutbraddle (09/21/2014) [-]
Actually, I know a little bit of bash. Nothing extensive, but still, I'm sure it helps. Even if I was just looking to piss some people off, it's not like I'm ever going to forget this stuff. I want to learn it for possible job openings.
#35 - fragman (09/21/2014) [-]
That's a good start. So if you're serious about it I'd recommend studying the firewall/routing/switching side first before diving into the whole hacking thing. The knowledge you gather there makes it much easier to comprehend the other stuff. Once you've got the fundamentals on those topics down and are comfortable using Linux/Bash you can start looking into penetration testing. Because let's be real... there are only 3 reasons for a DDoS: pranking (this includes pseudo-activism), blackmail or diversion/using resources as part of a bigger attack.

The thing is, if you aim for a job in that field, you better not be caught doing shit like that beforehand (or during), unless you are that one in a million genius who's so good everyone will want you due to the notoriety. Having a record of cybercrime doesn't help in a job interview.
User avatar #36 - peanutbraddle (09/21/2014) [-]
I'll brush up on my knowledge of Linux/Bash, and get to it, then. It's been a while, actually.
User avatar #103 - createdjustnow (09/21/2014) [-]
you can also find a university course on the subject, theres a college near me that offers a class in cyber security that ranges from how to ghost a harddrive to how to block ghosting put a nail through it
User avatar #105 - peanutbraddle (09/21/2014) [-]
Neato Burrito
User avatar #22 - teranin (09/21/2014) [-]
Also, if interested in netsec, this right here is very useful www.blackhat.com/
User avatar #21 - teranin (09/21/2014) [-]
Everyone learns in different ways. Best way I've found is experience. Use virtual box to test operating systems. Buy a used firewall, mess with the configurations, read the help files, download or buy books on the subject and read them.

It can be pretty tedious to learn, best way is not to overplay it. Much like exercise. I imagine fragman likely also has tips, his knowledge is impressive.
User avatar #25 - peanutbraddle (09/21/2014) [-]
I've never heard of black hat, actually.
Are they a network security enthusiast group or something?
User avatar #112 - cuntism (09/21/2014) [-]
Black hat is the term to mean the ones who do it for illegal purposes, white hat are the "good guys" grey hats are the inbetweens, but it's changed over the years, black hat tends to mean now the more cutting edge guys (because the guys who do it illegally and for fun tend to be the best at it)
User avatar #40 - teranin (09/21/2014) [-]
Yeah, basically. They're the top of the line people on this sort of thing.
#13 - not sure if you're trolling or just really really misinformed.  [+] (28 new replies) 09/21/2014 on Holy fucking shit -20
User avatar #14 - teranin (09/21/2014) [-]
I'm not sure why you don't know that the best way to make a firewall blacklist a port is to spam that specific port, and the best way to do that is to send a refresh command over and over again through proxies. Yes, simple DDOS attacks tend to be IP attacks and generally sniff an open port other than 80 (often using a SIP port like 5060) but that doesn't mean this method does not exist.
#15 - fragman (09/21/2014) [-]
Ok look.
Sure, in theory it's possible. But noone in their right fucking mind with the skillset to pull it off would ever do it. The reasoning is simple:
The actually easiest way to make a target system unavailable is usually to cap out the active sessions on the firewall. Because no properly configured firewall will blacklist a port based on incoming requests. Ever.
In order to open all sessions the firewall can handle concurrently you need to send lots of requests. And I mean lots. Due to that, forging HTTP requests containing a specific target URL (which would be necessary in order to target a forum thread) is unfavorable since any given client can send out less of those per second than the much smaller SYN packets you'd generally use for a SYN flood.

HTTP requests might be beneficial if the firewall session limit is not the bottleneck of the target system, but rather the server resources. But due to load balancers, reverse proxies and dedicated front-end webservers this is rarely the case.

I mean, we are talking about DDoS. Not 20 faggots spamming Shift + F5.
#82 - neokun (09/21/2014) [-]
User avatar #19 - teranin (09/21/2014) [-]
I'm impressed with your knowledge (although I think you might be giving these "hackers" too much credit). Do you work in net sec/admin?
#24 - fragman (09/21/2014) [-]
Thanks. And that's probably my main issue here. I am a security engineer with focus on firewalls and reverse proxies. This is why I apparently seem to overthink things.

Thing is, the method mentioned by you works for let's say... horrible systems or targets where the hoster has no incident response team on call. Looking at the technical contact in the whois for escapistmagazine.com makes this seem... plausible. lol
I've dealt with DDoS of that level, meaning incoming mass HTTP requests from a few 10s up to maybe a hundred sources and that shit is just way too easy to end. Usually you'll simply grab a list of publically available proxies and use that in a custom geoblocking setup and the attack fades away more quickly than the ethics in game journalism. Properly executed DDoS on the other hand is probably the single biggest pain when working in this field and will keep you up at night...
User avatar #41 - teranin (09/21/2014) [-]
Nice to meet another person on this site that understands the vagueries of netsec
User avatar #18 - teranin (09/21/2014) [-]
sorry, and SMTP. dur.
User avatar #17 - teranin (09/21/2014) [-]
I say that, by the way, as a person who does network administration for a company, and who has configured the firewall of that company to deny all incoming requests from all but 6 ports, and even then only SIP and RDP protocols.
User avatar #16 - teranin (09/21/2014) [-]
DDOS attacks come in many forms. The goal of this attack was to shut down the forums, which is why they targeted them specifically, probably because they are amateur as fuck and didn't realize that Escapist does not host on a cloud. When it brought down the whole site shit hit the fan hard.

I agree that it was an impractical, amateurish move. I also agree with pretty much everything else you said, although I think you might be ignoring the variability in policy setups and firewall systems/subscription services. It's possible that they tried a SYN or ICMP strike first, but found the firewall to be ready for it.
User avatar #110 - cuntism (09/21/2014) [-]
You are correct sir. DDoS means Distributed Denial of Service, and that covers so many things.

Just because one way is inefficient doesn't mean it's not effective. Also, they won't be using manual commands, just like most DDoS's they'll be using an automated tool to send commands.
#77 - tmgrskat (09/21/2014) [-]
User avatar #20 - peanutbraddle (09/21/2014) [-]
Where can you learn shit like this?
I feel like actually doing something for a change.
User avatar #111 - cuntism (09/21/2014) [-]
I have 15 years of network and system administration under my belt and I'm still out of the loop on current trends. Getting into it is one thing, it's keeping up with it that's the problem. From 98 until 2007 I controlled a large portion of the world's warez servers (topsites), and this meant not only skills in server and network maintenance, but also scripting (bash, PHP&mySQL, C) and extensive firewalling and encryption skills. But I didn't keep up with current trends and it didn't take long for me to lose my abilities.


Technology moves so fast, unless you're really interested in it, possibly as a career, I wouldn't waste the time learning it all unless you have a practical reason to.
#102 - alexanderh (09/21/2014) [-]
If you're discovered, you will be charged with terrorism. Just letting you know.
User avatar #104 - peanutbraddle (09/21/2014) [-]
I guess the way I worded that makes it sound as if I'm going to fuck with the SJWs.
I'm not.
#106 - alexanderh (09/21/2014) [-]
Yeah, I read the rest of the discussion after posting that.
But seriously, getting caught doing DDoS attacks will get you charged with terrorism.

It's an interesting subject, and I expect that I'll probably specialize in that field when that time comes. I'm doing computer science, and I find IT security to be an interesting topic.
#27 - fragman (09/21/2014) [-]
on the other hand, if you're serious about it that's a different story mate.
#26 - fragman (09/21/2014) [-]
uh. don't.
Look if you just wanna piss some people off, you most likely either won't be secure enough not to get caught and buttraped or not successful enough to have an impact in the first place.

I've spent the last 5 months learning the basics of hacking/penetration testing after 4 years working in the network security field, simply because I want to expand my skillset and at some point switch to doing more of an offensive security and system audit kind of work. It's highly complex and in order to be successful I'd say you need at least good knowledge of TCP/IP, Linux, Windows, some sort of scripting/programming language (having more than one is very beneficial such as python, bash and C) and how network security appliances such as firewalls and IDP systems work. And then you start learning this stuff.

Don't get me wrong, to me it's a ton of fun and a very interesting topic. But it's huge and takes a lot of work to get somewhere.
User avatar #32 - peanutbraddle (09/21/2014) [-]
Actually, I know a little bit of bash. Nothing extensive, but still, I'm sure it helps. Even if I was just looking to piss some people off, it's not like I'm ever going to forget this stuff. I want to learn it for possible job openings.
#35 - fragman (09/21/2014) [-]
That's a good start. So if you're serious about it I'd recommend studying the firewall/routing/switching side first before diving into the whole hacking thing. The knowledge you gather there makes it much easier to comprehend the other stuff. Once you've got the fundamentals on those topics down and are comfortable using Linux/Bash you can start looking into penetration testing. Because let's be real... there are only 3 reasons for a DDoS: pranking (this includes pseudo-activism), blackmail or diversion/using resources as part of a bigger attack.

The thing is, if you aim for a job in that field, you better not be caught doing shit like that beforehand (or during), unless you are that one in a million genius who's so good everyone will want you due to the notoriety. Having a record of cybercrime doesn't help in a job interview.
User avatar #36 - peanutbraddle (09/21/2014) [-]
I'll brush up on my knowledge of Linux/Bash, and get to it, then. It's been a while, actually.
User avatar #103 - createdjustnow (09/21/2014) [-]
you can also find a university course on the subject, theres a college near me that offers a class in cyber security that ranges from how to ghost a harddrive to how to block ghosting put a nail through it
User avatar #105 - peanutbraddle (09/21/2014) [-]
Neato Burrito
User avatar #22 - teranin (09/21/2014) [-]
Also, if interested in netsec, this right here is very useful www.blackhat.com/
User avatar #21 - teranin (09/21/2014) [-]
Everyone learns in different ways. Best way I've found is experience. Use virtual box to test operating systems. Buy a used firewall, mess with the configurations, read the help files, download or buy books on the subject and read them.

It can be pretty tedious to learn, best way is not to overplay it. Much like exercise. I imagine fragman likely also has tips, his knowledge is impressive.
User avatar #25 - peanutbraddle (09/21/2014) [-]
I've never heard of black hat, actually.
Are they a network security enthusiast group or something?
User avatar #112 - cuntism (09/21/2014) [-]
Black hat is the term to mean the ones who do it for illegal purposes, white hat are the "good guys" grey hats are the inbetweens, but it's changed over the years, black hat tends to mean now the more cutting edge guys (because the guys who do it illegally and for fun tend to be the best at it)
User avatar #40 - teranin (09/21/2014) [-]
Yeah, basically. They're the top of the line people on this sort of thing.
#10 - > DDoS > Targeting a forum thread  [+] (32 new replies) 09/21/2014 on Holy fucking shit +46
#12 - teranin (09/21/2014) [-]
User avatar #28 - killerliquid (09/21/2014) [-]
I think it's basically overloading the server
User avatar #11 - teranin (09/21/2014) [-]
They were using a page refresh DDOS. That is a thing, you know.
#13 - fragman (09/21/2014) [-]
not sure if you're trolling or just really really misinformed.
User avatar #14 - teranin (09/21/2014) [-]
I'm not sure why you don't know that the best way to make a firewall blacklist a port is to spam that specific port, and the best way to do that is to send a refresh command over and over again through proxies. Yes, simple DDOS attacks tend to be IP attacks and generally sniff an open port other than 80 (often using a SIP port like 5060) but that doesn't mean this method does not exist.
#15 - fragman (09/21/2014) [-]
Ok look.
Sure, in theory it's possible. But noone in their right fucking mind with the skillset to pull it off would ever do it. The reasoning is simple:
The actually easiest way to make a target system unavailable is usually to cap out the active sessions on the firewall. Because no properly configured firewall will blacklist a port based on incoming requests. Ever.
In order to open all sessions the firewall can handle concurrently you need to send lots of requests. And I mean lots. Due to that, forging HTTP requests containing a specific target URL (which would be necessary in order to target a forum thread) is unfavorable since any given client can send out less of those per second than the much smaller SYN packets you'd generally use for a SYN flood.

HTTP requests might be beneficial if the firewall session limit is not the bottleneck of the target system, but rather the server resources. But due to load balancers, reverse proxies and dedicated front-end webservers this is rarely the case.

I mean, we are talking about DDoS. Not 20 faggots spamming Shift + F5.
#82 - neokun (09/21/2014) [-]
User avatar #19 - teranin (09/21/2014) [-]
I'm impressed with your knowledge (although I think you might be giving these "hackers" too much credit). Do you work in net sec/admin?
#24 - fragman (09/21/2014) [-]
Thanks. And that's probably my main issue here. I am a security engineer with focus on firewalls and reverse proxies. This is why I apparently seem to overthink things.

Thing is, the method mentioned by you works for let's say... horrible systems or targets where the hoster has no incident response team on call. Looking at the technical contact in the whois for escapistmagazine.com makes this seem... plausible. lol
I've dealt with DDoS of that level, meaning incoming mass HTTP requests from a few 10s up to maybe a hundred sources and that shit is just way too easy to end. Usually you'll simply grab a list of publically available proxies and use that in a custom geoblocking setup and the attack fades away more quickly than the ethics in game journalism. Properly executed DDoS on the other hand is probably the single biggest pain when working in this field and will keep you up at night...
User avatar #41 - teranin (09/21/2014) [-]
Nice to meet another person on this site that understands the vagueries of netsec
User avatar #18 - teranin (09/21/2014) [-]
sorry, and SMTP. dur.
User avatar #17 - teranin (09/21/2014) [-]
I say that, by the way, as a person who does network administration for a company, and who has configured the firewall of that company to deny all incoming requests from all but 6 ports, and even then only SIP and RDP protocols.
User avatar #16 - teranin (09/21/2014) [-]
DDOS attacks come in many forms. The goal of this attack was to shut down the forums, which is why they targeted them specifically, probably because they are amateur as fuck and didn't realize that Escapist does not host on a cloud. When it brought down the whole site shit hit the fan hard.

I agree that it was an impractical, amateurish move. I also agree with pretty much everything else you said, although I think you might be ignoring the variability in policy setups and firewall systems/subscription services. It's possible that they tried a SYN or ICMP strike first, but found the firewall to be ready for it.
User avatar #110 - cuntism (09/21/2014) [-]
You are correct sir. DDoS means Distributed Denial of Service, and that covers so many things.

Just because one way is inefficient doesn't mean it's not effective. Also, they won't be using manual commands, just like most DDoS's they'll be using an automated tool to send commands.
#77 - tmgrskat (09/21/2014) [-]
User avatar #20 - peanutbraddle (09/21/2014) [-]
Where can you learn shit like this?
I feel like actually doing something for a change.
User avatar #111 - cuntism (09/21/2014) [-]
I have 15 years of network and system administration under my belt and I'm still out of the loop on current trends. Getting into it is one thing, it's keeping up with it that's the problem. From 98 until 2007 I controlled a large portion of the world's warez servers (topsites), and this meant not only skills in server and network maintenance, but also scripting (bash, PHP&mySQL, C) and extensive firewalling and encryption skills. But I didn't keep up with current trends and it didn't take long for me to lose my abilities.


Technology moves so fast, unless you're really interested in it, possibly as a career, I wouldn't waste the time learning it all unless you have a practical reason to.
#102 - alexanderh (09/21/2014) [-]
If you're discovered, you will be charged with terrorism. Just letting you know.
User avatar #104 - peanutbraddle (09/21/2014) [-]
I guess the way I worded that makes it sound as if I'm going to fuck with the SJWs.
I'm not.
#106 - alexanderh (09/21/2014) [-]
Yeah, I read the rest of the discussion after posting that.
But seriously, getting caught doing DDoS attacks will get you charged with terrorism.

It's an interesting subject, and I expect that I'll probably specialize in that field when that time comes. I'm doing computer science, and I find IT security to be an interesting topic.
#27 - fragman (09/21/2014) [-]
on the other hand, if you're serious about it that's a different story mate.
#26 - fragman (09/21/2014) [-]
uh. don't.
Look if you just wanna piss some people off, you most likely either won't be secure enough not to get caught and buttraped or not successful enough to have an impact in the first place.

I've spent the last 5 months learning the basics of hacking/penetration testing after 4 years working in the network security field, simply because I want to expand my skillset and at some point switch to doing more of an offensive security and system audit kind of work. It's highly complex and in order to be successful I'd say you need at least good knowledge of TCP/IP, Linux, Windows, some sort of scripting/programming language (having more than one is very beneficial such as python, bash and C) and how network security appliances such as firewalls and IDP systems work. And then you start learning this stuff.

Don't get me wrong, to me it's a ton of fun and a very interesting topic. But it's huge and takes a lot of work to get somewhere.
User avatar #32 - peanutbraddle (09/21/2014) [-]
Actually, I know a little bit of bash. Nothing extensive, but still, I'm sure it helps. Even if I was just looking to piss some people off, it's not like I'm ever going to forget this stuff. I want to learn it for possible job openings.
#35 - fragman (09/21/2014) [-]
That's a good start. So if you're serious about it I'd recommend studying the firewall/routing/switching side first before diving into the whole hacking thing. The knowledge you gather there makes it much easier to comprehend the other stuff. Once you've got the fundamentals on those topics down and are comfortable using Linux/Bash you can start looking into penetration testing. Because let's be real... there are only 3 reasons for a DDoS: pranking (this includes pseudo-activism), blackmail or diversion/using resources as part of a bigger attack.

The thing is, if you aim for a job in that field, you better not be caught doing shit like that beforehand (or during), unless you are that one in a million genius who's so good everyone will want you due to the notoriety. Having a record of cybercrime doesn't help in a job interview.
User avatar #36 - peanutbraddle (09/21/2014) [-]
I'll brush up on my knowledge of Linux/Bash, and get to it, then. It's been a while, actually.
User avatar #103 - createdjustnow (09/21/2014) [-]
you can also find a university course on the subject, theres a college near me that offers a class in cyber security that ranges from how to ghost a harddrive to how to block ghosting put a nail through it
User avatar #105 - peanutbraddle (09/21/2014) [-]
Neato Burrito
User avatar #22 - teranin (09/21/2014) [-]
Also, if interested in netsec, this right here is very useful www.blackhat.com/
User avatar #21 - teranin (09/21/2014) [-]
Everyone learns in different ways. Best way I've found is experience. Use virtual box to test operating systems. Buy a used firewall, mess with the configurations, read the help files, download or buy books on the subject and read them.

It can be pretty tedious to learn, best way is not to overplay it. Much like exercise. I imagine fragman likely also has tips, his knowledge is impressive.
User avatar #25 - peanutbraddle (09/21/2014) [-]
I've never heard of black hat, actually.
Are they a network security enthusiast group or something?
User avatar #112 - cuntism (09/21/2014) [-]
Black hat is the term to mean the ones who do it for illegal purposes, white hat are the "good guys" grey hats are the inbetweens, but it's changed over the years, black hat tends to mean now the more cutting edge guys (because the guys who do it illegally and for fun tend to be the best at it)
User avatar #40 - teranin (09/21/2014) [-]
Yeah, basically. They're the top of the line people on this sort of thing.
#4 - > nor about the personal lives of people involved … 09/20/2014 on For those that want to... 0
#40 - > be me > buying groceries > mom calls &g… 09/20/2014 on Where were you? +3
#13 - > 6 months hue 09/20/2014 on First person to buy an... 0
#15 - sakujo 09/20/2014 on Take notes 0
#6 - >source >eatliver right... 09/19/2014 on Garfeel 0
#410 - Yeah, moot is a ginormous faggot and we're lucky to have based…  [+] (1 new reply) 09/19/2014 on Gamergate/SJW discussion... 0
User avatar #423 - joshwontwon (09/19/2014) [-]
NOTICE ME ADMIN SENPAI!
#280 - So moot is actually clever enough to spin his censorship faggo…  [+] (6 new replies) 09/19/2014 on Gamergate/SJW discussion... +7
User avatar #392 - joshwontwon (09/19/2014) [-]
since when the hell has that stopped him from censoring other people?! Hello Jessi Slaughter got death threats and a lot of her personal information out... idiot moot.
#410 - fragman (09/19/2014) [-]
Yeah, moot is a ginormous faggot and we're lucky to have based admin senpai.
User avatar #423 - joshwontwon (09/19/2014) [-]
NOTICE ME ADMIN SENPAI!
#298 - thewulfman (09/19/2014) [-]
>implying /v/ is only for video games


Jesus christ, Moot is such a faggot.
User avatar #461 - schmuxy (09/19/2014) [-]
what else is it for then?
User avatar #552 - thewulfman (09/20/2014) [-]
It's primarily for video games yes, but the idea is that you can if you want talk about other things with the same kind of people you usually talk about video games with. A lot of people stick to only a couple boards and know only the people on that specific board.
#156 - Picture 09/19/2014 on feeding laxatives to seagulls +3
#53 - Ok I ****** will.  [+] (1 new reply) 09/19/2014 on Pull-apart pepperoni garlic... +8
User avatar #75 - heeveejeevees (09/19/2014) [-]
fucking subscribed
#52 - Honestly dude? Measure your water (lukewarm, not hot), put… 09/19/2014 on Pull-apart pepperoni garlic... +2
#48 - I've recently found my passion for cooking which is why I real…  [+] (3 new replies) 09/19/2014 on Pull-apart pepperoni garlic... +6
User avatar #49 - rockergamer (09/19/2014) [-]
fuckin do it bro
#53 - fragman (09/19/2014) [-]
Ok I fuckin will.
User avatar #75 - heeveejeevees (09/19/2014) [-]
fucking subscribed
#45 - 5 minutes is too low. 8-10 minutes actual work with proper…  [+] (2 new replies) 09/19/2014 on Pull-apart pepperoni garlic... +1
User avatar #46 - fables (09/19/2014) [-]
maybe I'm just slow as fuck, but the whole mixing ingredients thing takes me probably that long- 10 mins.
but the point is, a packaged crust takes a few minutes, no kneading required
a home made crust takes muuuch longer
#52 - fragman (09/19/2014) [-]
Honestly dude?
Measure your water (lukewarm, not hot), put the yeast in there (I prefer fresh over dry) and add a tbsp of sugar (or a bit less depending on the amount of dough you're making), let that sit while you sift flour into a mixing bowl, add salt and mix it up a bit, stir up the yeast so it dissolves completely, make a little well in the flour, pour in the water & yeast. Start mixing it together adding a couple of tablespoons of olive oil as you go. Up to this point, it should take about 3-4 minutes once you get the hang of it. Then you can keep kneading it until it's smooth which should result in a total time of about 10 minutes.

Seriously man, it's totally worth doing that... the pizza is just that much more delicious
#20 - Thank you, ****************  [+] (1 new reply) 09/18/2014 on Japanese Culture Shocks +109
#88 - rdnyan (09/19/2014) [-]
#104 - That's just... exactly what I'm saying. You can turn the table…  [+] (1 new reply) 09/18/2014 on powerful ad against speeding 0
User avatar #110 - malific (09/18/2014) [-]
Yes, read my comment #78, it's a reply to #68.
#26 - Maybe you could just realize that there is no "best count… 09/18/2014 on too awesome +1
#25 - Picture  [+] (1 new reply) 09/18/2014 on What the iWatch will... 0
User avatar #26 - fuzzyballs (09/18/2014) [-]
JACK SAID IT WAS THE APPLE WATCH
that motherfucker....
#48 - mfw final don't be a lying **** now... 09/18/2014 on the final awesome inventions 0
#49 - The problem I have with this is it can be put the other way as…  [+] (3 new replies) 09/18/2014 on powerful ad against speeding 0
User avatar #100 - malific (09/18/2014) [-]
If you watch the vid, after it goes black it says "other people make mistakes slow down"

Researching New Zealand speed limits, that area looks to be a 70 km/h zone.
#104 - fragman (09/18/2014) [-]
That's just... exactly what I'm saying. You can turn the tables easily. Regardless of the position you're in, you are responsible to some extent. If you're unable to properly assess a situation you shouldn't be driving.
User avatar #110 - malific (09/18/2014) [-]
Yes, read my comment #78, it's a reply to #68.
Show:
Sort by:
Order:

items

Total unique items point value: 2050 / Total items point value: 2100

Show All Replies Show Shortcuts
Per page:
Order:
What do you think? Give us your opinion. Anonymous comments allowed.
User avatar #39 - myitems (07/04/2014) [-]
I've been advertising your channel skipper a lot lately, and someone suggested uploading a content for it. I did re-host it on userscripts, but if you don't mind I would like to upload a post about it. And yes, I have been making sure to give credit where it's due for you <3 It is an awesome thing.
#40 to #39 - fragman ONLINE (07/04/2014) [-]
sure, go ahead
User avatar #35 - DisgruntledTomato (10/16/2013) [-]
Just a quick reminder, I still use your channel skipper <3
#36 to #35 - fragman ONLINE (10/17/2013) [-]
woah that is still a thing?
awesome, thanks
User avatar #37 to #36 - DisgruntledTomato (10/17/2013) [-]
I don't know if others use it, but I still do. Probably going to write a UI for it as well. Pretty useful.
User avatar #33 - akkere (06/19/2012) [-]
I decided to do an EZ setup
www.mediafire.com/?b5qdg8cez3563db

I wasn't able to finish it in time before the post was out of its 24 hour slot, but it has a readme with some instructions so you don't have to keep repeating yourself

What do you think?
User avatar #26 - venumb (06/18/2012) [-]
Is it alright if I take what you have so far and edit it and repost the results as long as I mention your name? I plan on adding GUI and other features other than Skipper. The auto thumb/thumb down will probably be in there too.

Really good work on the idea :)
#27 to #26 - fragman ONLINE (06/18/2012) [-]
I really wouldn't recommend the thumb down feature, there is a vote limit for a certain timespan which could have negative impact on functionality and would also motivate people to post their content outside the channel.
But expanding it in general, sure.
User avatar #28 to #27 - venumb (06/18/2012) [-]
I guess your right. I'll leave the thumbing out of the expanded release. I have other ideas that I'm am way more motivated on accomplishing anyway.
#21 - negrocop (06/18/2012) [-]
If you want, I can make a quick step by step guide for you to post for Chrome users and how to edit the skipped channels.
#22 to #21 - fragman ONLINE (06/18/2012) [-]
this would be really nice. but since my 24 hour frame is almost done and this content will go back to the depths of *************** I dont think it will be necessary.
#23 to #22 - negrocop (06/18/2012) [-]
Ah I truly doubt that. This was a huge step forward for FJ today, it'll be remembered for a while. And you could upload a Firefox guide and a Chrome guide for newbies in the following days. Especially probably around Thursday or Friday since a lot of Bendingtime posts will come about Saturday. There will be tons of bitchin about it. :P
#24 to #23 - fragman ONLINE (06/18/2012) [-]
good idea. I like it.
In this case it'd be wonderful if you could provide the chrome guide :)
#29 to #24 - negrocop (06/18/2012) [-]
Rawr, this should be good.
Here is the Tampermonkey Beta link
chrome.google.com/webstore/detail/gcalenpjmijncebpfijmoaglllgpjagf
#31 to #29 - fragman ONLINE (06/18/2012) [-]
big yay for you, thx.
I think I'll have it ready by around thursday
#32 to #31 - negrocop (06/18/2012) [-]
Sorry it took so long, I was PMing some people tryin to help them
#30 to #29 - negrocop (06/18/2012) [-]
I'll have a friend try it out later with that when he gets home though
#25 to #24 - negrocop (06/18/2012) [-]
I'll get to workin on it here in a few minutes :)
User avatar #12 - natedimes ONLINE (06/18/2012) [-]
Which page did you fond the source code that showed the channels in an array?
User avatar #13 to #12 - natedimes ONLINE (06/18/2012) [-]
find*
#14 to #13 - fragman ONLINE (06/18/2012) [-]
I don't quite get what you mean...
the code is fully hand-written
User avatar #15 to #14 - natedimes ONLINE (06/18/2012) [-]
Oh, I thought you said that there was a way to edit the source code.
#16 to #15 - fragman ONLINE (06/18/2012) [-]
ah now I get it.
Depends on your browser. You might want to check out this if you're using chrome:
stackoverflow [DOT] com/questions/5258989/manually-adding-a-userscript-to-google-chrome
#17 to #16 - fragman ONLINE (06/18/2012) [-]
rest should be in the content description.
User avatar #18 to #17 - natedimes ONLINE (06/18/2012) [-]
If you're referring to adding the channel skipper, don't worry about that it installed automatically :). I was just wondering about when you said that you could edit the source code so it only skips certain channels.
#19 to #18 - fragman ONLINE (06/18/2012) [-]
actually that's what I meant...
you'll need to find where the script is stored in order to edit it. that should be explained in the description pretty much, on the stackoverflow site you'll find the various user-datadir defaults for chrome.
then edit the file script.js in notepad++ or something like that
User avatar #20 to #19 - natedimes ONLINE (06/18/2012) [-]
Ohhh ok now I get it :). Thank you, Sir.
User avatar #9 - missladyhalmighty (06/18/2012) [-]
You are a god. << Seriously, thank you.
#10 to #9 - fragman ONLINE (06/18/2012) [-]
you're welcome
User avatar #8 - fjdesign (06/18/2012) [-]
Good work my friend. I am truly proud of what you have done. If you ever need anything from us please do ask.
#11 to #8 - fragman ONLINE (06/18/2012) [-]
thank you.
#6 - anonymous (06/18/2012) [-]
i ahve no ******* idea what a user scrpt is. how do i use it. inb4 newfag
#7 to #6 - fragman ONLINE (06/18/2012) [-]
I don't know you, and this is crazy...
but read the damn description maybe?

seriously the manual in there should be pretty straightforward
#34 to #7 - anonymous (06/25/2012) [-]
**** you you, you analnutbag. go die in a ******* fire
#1 - Sunset has deleted their comment [-]
#2 to #1 - fragman ONLINE (06/16/2012) [-]
depends on your browser. if you're using firefox with greasemonkey, you can simply create a new user script (after you've defined a default userscript editor, e.g. notepad++) and paste the source code. then edit the array defined in line 9 to be filled with all the channels you'd like skipped, like this:
var skipit = new Array("channel1", "channel2", "channel3");
#3 to #2 - Sunset has deleted their comment [-]
#4 to #3 - fragman ONLINE (06/16/2012) [-]
this is a little ugly, but I don't know of any better way at this moment.
you'll find the script in C:\Users\%username%\AppData\Local\Google\Chrome\User Data\Default\Extensions\xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\1_0\script.js
while "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx" is a random string. I don't know how that's generated but if it's based on the script source code it should be "camaaaeklepkjffjiookkjabipiidofl".
In this folder there are two files, manifest.json and script.js (which is the one you can edit using any text editor and just save it)
#5 to #4 - Sunset has deleted their comment [-]
 Friends (0)