China claims supercomputer crown

Discussion in 'Computer Science & Culture' started by Michael, Oct 29, 2010.

Thread Status:
Not open for further replies.
  1. fedr808 1100101 Valued Senior Member

    Messages:
    6,706
    You can't really hack someone else's IP. It's like me hacking your phone number. Even if I can figure out what it is what in the world am I going to do with it?
     
  2. Google AdSense Guest Advertisement



    to hide all adverts.
  3. ULTRA Realistically Surreal Registered Senior Member

    Messages:
    1,555
    Shows what I know about hacking!
     
  4. Google AdSense Guest Advertisement



    to hide all adverts.
  5. Stryder Keeper of "good" ideas. Valued Senior Member

    Messages:
    13,101
    IP's can be "Spoofed". When people use "anonymous proxies" to access this website, they use the proxies IP rather than their own, this doesn't however mean the proxy doesn't know what their IP was (And for the most part using a proxy actually lessens a persons own security and potentially the sites security, which is why we'd suggest not using a proxy to view the site)

    To "Hijack" an IP would either require spoofing which is difficult because if one person intercepts an end packet it's not going to appear to the other person when spoofed. Or the usage of a Trojan which would basically act as a "Man in the middle" and send out duplicate data of what is sent and received.

    Trojans are obviously quite common place, however for the most part they can be detected since they increase data traffic and can undermine system stability.

    China has a mixture of problems though from botnet infections to "Illegal" cybercafe's that their government shuts down, obviously the governments tight policing of the internet also causes concerns to those that want more freedom etc.
     
  6. Google AdSense Guest Advertisement



    to hide all adverts.
  7. fedr808 1100101 Valued Senior Member

    Messages:
    6,706
    Yah, I know about spoofing. But hacking an IP as in me somehow "hacking" your IP to do something bad is somewhat...unrealistic.

    Besides the fact that it is a tad...pointless. What could I do if I knew what your IP was? I couldn't even trace you with any degree of certainty.

    Also, unless you have a static IP than me trying to spoof your IP would be somewhat pointless because once you reboot or turn off your computer then the next time you turn it on your IP will be changed.
     
  8. fedr808 1100101 Valued Senior Member

    Messages:
    6,706
    Hacking can be a lot easier than most people think.

    If I am in the physical presence of any computer that uses Ubuntu, Windows XP, Vista, or Windows 7 I can hack it in probably less than 5 minutes. If it has the best security and password system (namely a BIOS password) on a desktop then it will take me 30 minutes tops.

    Hacking computers when your in their physical presence is amazingly easy, especially for linux based systems.

    Now doing it remotely, that is hard.

    There was a famous worm called SQL Slammer. Guess how long it took it to infect 60,000 servers? A week? A day? No, a mere ten minutes.

    Another worm infected 1 million computers in less then 24 hours.

    The first major computer virus actually attacked Apple computers (so much for unhackable).

    The best security against a hacker in the physical presence of your desktop is to buy a desktop case that can be locked closed and to set a BIOS password.
     
  9. birch Valued Senior Member

    Messages:
    4,136
    YOU are one hardheaded, immature, extremely annoying fuker who has reading comp problems. it's like talking to an attention deficit hyperactive child.

    repeat: i never stated it was a breakthrough and i stated over and over that i know it's not new technology.

    also, don't condescend others so stupidly just because your interest is computers. of course people know fluency is not just being able to turn a computer on or run a program. also, you are stupid enough to think or come across that they are just a bunch of buffoons who put together the computer with no idea what they are doing. anyways, it's more important what they built it for and how they are going to use it. people make a big deal over the most irrevelant aspects.

    and i resent and DON'T! use my statements for your continued made-up shit pretending i made challenges or claims which i clearly didn't.
     
    Last edited: Nov 19, 2010
  10. Stryder Keeper of "good" ideas. Valued Senior Member

    Messages:
    13,101
    It's obviously harder than it use to be, most servers don't send helpfile's to terminals anymore

    Please Register or Log in to view the hidden image!

    (or of course run legacy services like Telnet, most terminal access is conducted in an SSH tunnel which although hackable does aid in fending off the least experienced attackers or poorly created attacks.)

    Still the old school method of "Wardialing" to try and find a bank or academic server to "play" with is a bit outdated now, especially since companies are even using Fax less with email becoming more popular and obviously Telex went out with the ark.

    While indeed it's a veritable playground for some due to every computer being hooked to a network rather than having to authenticate through handshakes, it actually misses the style and grace of old school hacker urban legend.

    Nowadays you get people calling themselves hackers when they copy someone else's project and just rewrite the .nfo file. Meh, enough reminiscing for me.
     
  11. fedr808 1100101 Valued Senior Member

    Messages:
    6,706
    Good point. Although IP spoofing as someone mentioned before may aid. There's probably a list of recognized IP's on a server that are for admins. While they can't bypass every security system I'd be willing to wager if you can spoof one than you can get a good 10% of the way in.

    This all assuming there isn't an admin with sharkwire in which case your screwed.
     
  12. fedr808 1100101 Valued Senior Member

    Messages:
    6,706

    For starters, you still don't use the shift button, word of advice, if you hope to do well in high school someday you should figure it out.

    I don't condescend others, I condescend you, you unappreciative twit. You have no inkling what your blabbering on about. You pathetic waste of space.


    Stryder, does this actually make any sense? I'm betting JN-25 was easier to decrypt than this sentence.

    I resent your childish maturity and your technical know-how of a child. Only one of us deserves to be resentful, and the fact remains that you know nothing about a computer.

    What do you have against ADHD? Da Vinci had ADHD. So many of the greatest minds throughout history had ADHD. So many of the greatest minds of today have ADHD. To think you, in all your 'perfection' can compete is laughable you petulant, whiny, insignificant, speck on the shoulder of giants.

    You were dumb enough to think otherwise until I proved otherwise. I would be satisfied if you just knew what the shift button was for!

    Are you spelling "fucker" like that because your such a wimp, such a coward, that if you think you say "fucker" than you will be banned? If your going to attack me don't be a wimp, man up sally.
     
  13. Stryder Keeper of "good" ideas. Valued Senior Member

    Messages:
    13,101
    Moderator note to all:
    Please cut the bickering down as it tends to digress the topic and overall degrade the thread.

    Thanks in advance for attempting to be more "professional".
     
  14. Billy T Use Sugar Cane Alcohol car Fuel Valued Senior Member

    Messages:
    23,198

    Please Register or Log in to view the hidden image!

    "...China is building a city-sized cloud computing and office complex that will include a mega data center, one of the projects fueling that country's double-digit growth in IT spending. The entire complex will cover some 6.2 million square feet, with the initial data center space accounting for approximately 646,000 square feet, according to IBM, which is collaborating with a Chinese company to build it. ..."
    From: http://www.computerworld.com/s/arti...omputing?source=CTWNLE_nlt_dailyam_2011-02-07
     
Thread Status:
Not open for further replies.

Share This Page