reply to post by spellbound
Well if you think you can keep up, perhaps thats an option we could persue, if nothing else simply to spread the knowledge I/we have obtained. You
arent in this for profit are you? Heh.
You must understand too, that I have experienced knowledge and have physical evidence that most everyone on this site would damn near die to have. I
probably shouldnt have said that but the facts are that I have documents and images of elements that form the backbone of this forum and entire site
and they came to me via decades of skill and self-education, exploitation of weak systems and massive research beyond common standards.
To simplify the best I can, all computers operate off a 0 and 1 system and despite the security you implement short of full disconnection from a lan
environment, every single electronic device can be manipulated with the proper understanding and "leverage".
Electrical impulses alone determine whether or not a transistor is in a state of on or off and all data is processed as a string of 0's or 1's so by
simply manipulating the impulses we can override entire operating systems and attack directly the hardware. One who controls the hardware is
essentially the operating system in itself, and thus can determine what is being sent or received and how.
This isnt a lesson in massively low level hardware hacking but rather an insight into how every electronic component can be exploited and manipulated.
Even 256 bit encryption stands no chance when it in itself is encrypted at the cpu level. Even packet monitoring software cannot adequately track and
diagnose "power-on" signals coming from a lan card, it instead looks for specific packet forming and acts upon that.
In short, if a cpu has power feeding into it, that power can be manipulated via instruction sets as if an operating sytem were calling it to do so.
Using this very old-school technique one can completely and utterly control every aspect of the processor and force it to do their bidding, all while
sending null op codes to the operating system (which Windows® simply ignores the errors or you would get crashes every 5 seconds) thus allowing
entirely transparent control of the hardware.
Todays viruses are a joke and merely little programs attempting to do undocumented things with the operating system but they are causing severe
identity theft and ddos damage to mission critical systems on unwitting victims, almost soley because windows® is such a junk-ware system meant
specifically to sell and look pretty.
The bottom line is, even the greatest of operating systems really means nothing when you can control the hardware itself directly. Which is exactly
how certain ultra high level documents are obtained.
I will go no further into this subject so please dont ask.
Sorry for getting off topic.