«
Expand/Collapse
79 items tagged "dev"
Related tags:
day [+],
sql injection [+],
cross [+],
webapps [+],
txt [+],
shell [+],
sda [+],
phpdomainregister [+],
inclusion [+],
hacks [+],
gamebase [+],
activecms [+],
ARM [+],
witze [+],
rfi [+],
remote shell [+],
php [+],
moviebase [+],
linux [+],
hackaday [+],
forgery [+],
cms [+],
Newbie [+],
Area [+],
x86 [+],
usb [+],
u sql [+],
target [+],
str [+],
small linux [+],
microcontrollers [+],
image replacement [+],
dev boards [+],
dev board [+],
buffer overflow [+],
board [+],
bash [+],
backshell tcp [+],
BackTrack [+],
vulnerability [+],
clanportal [+],
x86 linux [+],
week [+],
walker drive [+],
vulnerabilities [+],
version [+],
team [+],
target practice [+],
suffers [+],
squonk [+],
soldercore [+],
sided pcb [+],
setuid [+],
sdb [+],
ruby [+],
rowley associates [+],
remote file include vulnerability [+],
remote [+],
radio shack [+],
quick [+],
protoboard [+],
price tag [+],
pre [+],
poor internet [+],
pin dip [+],
pic [+],
personenseiten [+],
patchlevel [+],
partition table [+],
overwrite files [+],
oculus [+],
null byte [+],
null [+],
news [+],
net square [+],
nbsp nbsp nbsp nbsp nbsp [+],
nbsp [+],
mullti [+],
mount dev [+],
mdvsa [+],
matt [+],
maryland [+],
mandriva linux [+],
lucky charms [+],
lot [+],
local [+],
linus [+],
links [+],
lilo [+],
leon [+],
led [+],
lcd [+],
kit [+],
kickstarter [+],
kicad [+],
joe mccray [+],
iphone [+],
ios [+],
internet conditions [+],
infinite supply [+],
image [+],
homebrew [+],
hole components [+],
hacker [+],
greenbelt md [+],
greenbelt maryland [+],
google [+],
glucone [+],
fine [+],
fdisk [+],
exciting news [+],
ebay [+],
eager little beaver [+],
dzcp [+],
dxl [+],
dual boot with windows [+],
dsp [+],
device boot [+],
dev team [+],
designer handbags [+],
dell utility [+],
dell recovery [+],
data loggers [+],
cylinder boundary [+],
cpu [+],
course [+],
corporate desktop [+],
computing [+],
compatible boards [+],
classic [+],
child privacy [+],
c greenbelt [+],
boot menu [+],
boot [+],
ben [+],
attiny [+],
async firefly [+],
arm devices [+],
arm boards [+],
arduino [+],
anything [+],
Final [+],
random values [+],
entropy [+],
encryption keys [+],
casino website [+],
broker [+]
-
-
12:47
»
Packet Storm Security Recent Files
Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.
-
12:47
»
Packet Storm Security Misc. Files
Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.
-
-
2:11
»
Packet Storm Security Tools
Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.
-
-
8:35
»
Hack a Day
We see a lot of microcontroller dev boards here at Hackaday, so much that we’re jokingly considering changing our name to Board a Day. These devices – from Arduinos to Arduino-compatible boards, very, very small boards, to extremely powerful ARM devices – are a great way to learn about the wonders of controlling electricity with code. [...]
-
-
5:00
»
Hack a Day
eBay isn’t only about counterfeit designer handbags and boxes of all-marshmallow Lucky Charms, sometimes there’s actually something useful for sale. [Matt] found a bunch of Chinese-made ARM development boards with integrated LCD displays on the ‘bay, but without a reliable toolchain, these boards – as cool as they are – are nearly useless. Thankfully, he figured [...]
-
-
16:55
»
Packet Storm Security Recent Files
Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.
-
16:55
»
Packet Storm Security Tools
Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.
-
16:55
»
Packet Storm Security Misc. Files
Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.
-
-
15:22
»
Packet Storm Security Recent Files
Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.
-
15:22
»
Packet Storm Security Misc. Files
Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.
-
-
6:00
»
Hack a Day
On the continuing list of homebrew ARM dev boards we’ve seen over the past few months, [Squonk42]‘s USBug is one of the best we’ve seen. Like many other ARM boards, it breaks out a member of the Cortex M0/M3 family into a 40-pin DIP, but unlike all the others, [Squonk] designed it so you can [...]
-
-
18:51
»
Packet Storm Security Recent Files
Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.
-
18:51
»
Packet Storm Security Misc. Files
Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.
-
-
6:22
»
Hack a Day
We can’t count the number of projects we’ve seen on Hackaday with a USB port. Unfortunately, most of these builds – from RepRap controllers to wireless data loggers – don’t use the full capabilities offered to them with USB. [Ben] came up with a very cool USB breakout board that allows you to explore the USB [...]
-
-
15:30
»
Hack a Day
[Natsfr] was looking for a single-sided PCB to host a PIC 18F4550. Not finding one he designed his own in Kicad and is sharing (translated) the spoils of his labor. This chip has USB capabilities which is why we see it used in a ton of projects. Almost all of them (including this USB input device [...]
-
8:30
»
Hack a Day
Before you get jealous of the massive amount of sway that hackaday must’ve tossed at these guys to get a dev kit, don’t be. We just funded the kickstarter like everyone else. This is exciting news though since, as you probably know, I’m very fond of immersive gaming and have always craved a strong VR [...]
-
-
21:27
»
Packet Storm Security Recent Files
Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.
-
21:27
»
Packet Storm Security Misc. Files
Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.
-
-
23:31
»
Packet Storm Security Recent Files
Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.
-
23:31
»
Packet Storm Security Misc. Files
Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.
-
23:31
»
Packet Storm Security Misc. Files
Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.
-
-
18:47
»
Packet Storm Security Recent Files
Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.
-
18:47
»
Packet Storm Security Tools
Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.
-
18:47
»
Packet Storm Security Misc. Files
Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.
-
5:01
»
Hack a Day
Ever wonder what CPU dev boards look like? In the realm of highly confidential hardware, it doesn’t get much more secret than upcoming CPUs coming out of Intel. Somehow, a few CPU dev boards wound up on eBay, and [Leon] was cool enough to save all the pictures (Polish, Google translation, or translate in the sidebar). [...]
-
-
10:01
»
Hack a Day
It seems like hacker-friendly ARM development boards are just exploding into the market right now. Here’s one we haven’t looked at yet. The SolderCore is made by Rowley Associates and is packed with features which help to explain the $80 price tag. [CharlieX] just ordered one and posted a bit about his first day with [...]
-
-
14:09
»
Hack a Day
Here’s something we thought we would never see: computing with just pipes, /dev/zero, and /dev/null. As a thought experiment, [Linus] imagined a null byte represented an electron. /dev/zero would have an infinite supply of electrons and /dev/null would make a wonderful positive power supply. With a very short program (named mosfet.c), [Linus] can use Linux pipes [...]
-
-
14:41
»
Carnal0wnage
Joe McCray with Strategic Security is running a two week exploit dev course.
Course Description & Instructor Information:
http://strategicsec.com/Exploit-Dev-Courses-Oct-2011.pdfStrategic Security has teamed up with Net-Square to provide the most comprehensive exploit development course package available to the public. Occasionally similar courses are offered privately to various three letter agencies and large financial institutions.
Exploit development is often considered the most difficult area of focus in the entire field of IT security. It requires both a broad range of skills and deep level of knowledge in Networking, Operating Systems, and Programming. Now you too can learn what has long been thought to be "Black Magic" by many from one of the top practitioners and trainers in the world.
How is this course put together?
The course is actually a 2 week package deal designed to both teach the fundamentals of modern exploit development and give the student ample guided practice time with the instructor to actually get proficient.
Dates:
Exploit Dev: No Assembly Required Oct 31 - 4 Nov 2011 (5 Days)
Exploit Dev: Target Practice Nov 7 - 11 2011 (5 Days)
Training Location
The workshops will be held at "The Academy of Computer Education" in Greenbelt, MD.
The address is:
7833 Walker Drive, Suite 520C Greenbelt, Maryland 20770
$1000 Discount by using these links
Exploit Dev 1 Week @ $5,000
http://tinyurl.com/SS-EDNAR-D-CGExploit Dev 1 Week @ $6,000
http://tinyurl.com/SS-D-EDTP-CGExploit Dev 2 Week Package Deal @ 8,500
http://tinyurl.com/SS-EDNAR-TP-D-CG
-
-
12:15
»
Hack a Day
[dev_dsp] wanted to try his hand at creating a purely analog implementation of multiple synchronizing fireflies powered by a single battery and built from off-the shelf, through-hole components on inexpensive protoboard. In theory, even your local Radio Shack should still carry all of this stuff. He was obviously inspired by [alex]‘s fireflies that we’ve covered [...]
-
-
8:57
»
remote-exploit & backtrack
Hello!
I'm not new to Linux or pen testing, but I am new to the Backtrack distro. A week or so ago I installed Backtrack 4 on my laptop at work, dual boot with Windows 7. The laptop is an HP Pavilion dv7. All was well until this morning, when I couldn't boot into either and was getting Grub error 22. I've tried googling and searching on these forums, but I haven't found anything specific to me.
I can boot from the live CD and mount /dev/sdb5 under /mnt.
Here is my output of fdisk -l:
# fdisk -l
Disk /dev/sda: 500.1 GB, 500107862016 bytes
255 heads, 63 sectors/track, 60801 cylinders
Units = cylinders of 16065 * 512 = 8225280 bytes
Disk identifier: 0x485f5e16
Device Boot Start End Blocks Id System
/dev/sda1 * 1 26 203776 7 HPFS/NTFS
Partition 1 does not end on cylinder boundary.
/dev/sda2 26 58531 469939200 7 HPFS/NTFS
/dev/sda3 58531 60789 18136064 7 HPFS/NTFS
/dev/sda4 60789 60802 105496 c W95 FAT32 (LBA)
Disk /dev/sdb: 500.1 GB, 500107862016 bytes
255 heads, 63 sectors/track, 60801 cylinders
Units = cylinders of 16065 * 512 = 8225280 bytes
Disk identifier: 0x766f69c2
Device Boot Start End Blocks Id System
/dev/sdb1 1 30401 244195008+ 7 HPFS/NTFS
/dev/sdb2 30402 60801 244188000 5 Extended
/dev/sdb5 30402 59670 235103211 83 Linux
/dev/sdb6 59671 60801 9084726 82 Linux swap / Solaris
Disk /dev/sdc: 8136 MB, 8136949760 bytes
255 heads, 63 sectors/track, 989 cylinders
Units = cylinders of 16065 * 512 = 8225280 bytes
Disk identifier: 0x00000000
Device Boot Start End Blocks Id System
/dev/sdc1 * 1 987 7928046 6 FAT16
Any help is greatly appreciated!
-
-
5:16
»
remote-exploit & backtrack
Hello all
every time i try to mount using
mount /dev/sda1 /mnt/sda
i get a /dev/sda1 cannot be found in /etc/fstab
however /dev/sda1 is listed by fdisk -l
any advice?
cheers
yoma
-
-
7:45
»
remote-exploit & backtrack
Hi,
I am relatively new to these forums, and somewhat new to Backtrack.
I was wondering if somebody on here could help me with my Partition Table. I was trying to re-arrange it and make it neater and cleaner.
But, somehow Partition Magic in Vista told me it was all messed up and wanted to know if I wanted that fixed. So as an eager little beaver, who wasn't thinking I hit the "Sure why not" button. =/
Bad mistake.
@ first Windows wouldn't boot, it recognized my custom boot screen then hit a blue screen and cycled. Come to find out my Partition table got screwed up even more so i fixed it from having two boot flag's and dup.li' Entry's along with writing a new MBR & fixing the MFT down to this.
> Fdisk -ul
Code:
root@bt:~# fdisk -ul
Disk /dev/sda: 200.0 GB, 200049647616 bytes
255 heads, 63 sectors/track, 24321 cylinders, total 390721968 sectors
Units = sectors of 1 * 512 = 512 bytes
Disk identifier: 0x00000000
Device Boot Start End Blocks Id System
/dev/sda1 63 144584 72261 6 FAT16
/dev/sda2 145408 21116927 10485760 7 HPFS/NTFS
/dev/sda3 * 21116928 385479674 182181373+ 7 HPFS/NTFS
Disk /dev/sdb: 2086 MB, 2086666240 bytes
2 heads, 63 sectors/track, 32345 cylinders, total 4075520 sectors
Units = sectors of 1 * 512 = 512 bytes
Disk identifier: 0x007a8367
Device Boot Start End Blocks Id System
/dev/sdb1 * 63 2097269 1048603+ b W95 FAT32
/dev/sdb2 2097270 4075469 989100 83 Linux
Disk /dev/sdc: 1000.2 GB, 1000204886016 bytes
255 heads, 63 sectors/track, 121601 cylinders, total 1953525168 sectors
Units = sectors of 1 * 512 = 512 bytes
Disk identifier: 0xe8900690
Device Boot Start End Blocks Id System
/dev/sdc1
Code:
root@bt:~# fdisk -l
Disk /dev/sda: 200.0 GB, 200049647616 bytes
255 heads, 63 sectors/track, 24321 cylinders
Units = cylinders of 16065 * 512 = 8225280 bytes
Disk identifier: 0x00000000
Device Boot Start End Blocks Id System
/dev/sda1 1 9 72261 6 FAT16
/dev/sda2 10 1315 10485760 7 HPFS/NTFS
/dev/sda3 * 1315 23995 182181373+ 7 HPFS/NTFS
My main Disk is sda, Sda1 is my Dell Utility or Dell Media Direct Fat32. My Sda2 is my Dell Recovery Drive NTFS. & my sda3 is my main OS drive. Which windows wont recognize in any recovery setup.
As far as i Can see my Main problem is that sda2 end's on 1315 cylinder and sda3 is set to start on cylinder 1315.
I was wondering if my problem's bigger than this, or if it's just as simple as changing that value with sfdisk or testdisk.
I've tryed testdisk and that wont do any thing, and sfdisk is to complicated for me to just start throwing value's in there.
ANY Help is sooooo Much appreciated.
I'll give you any print out you need.
PLEASE HELP ME, up for two days trying to fix this.
& I'm STUCK!
p.s here's two more sfdisk print out's showing other problem's I've come across.
Code:
root@bt:~# sfdisk -uS /dev/sda --f
Checking that no-one is using this disk right now ...
BLKRRPART: Device or resource busy
This disk is currently in use - repartitioning is probably a bad idea.
Umount all file systems, and swapoff all swap partitions on this disk.
Use the --no-reread flag to suppress this check.
Disk /dev/sda: 24321 cylinders, 255 heads, 63 sectors/track
Old situation:
Units = sectors of 512 bytes, counting from 0
Device Boot Start End #sectors Id System
/dev/sda1 63 144584 144522 6 FAT16
/dev/sda2 145408 21116927 20971520 7 HPFS/NTFS
/dev/sda3 * 21116928 385479674 364362747 7 HPFS/NTFS
/dev/sda4 0 - 0 0 Empty
Input in the following format; absent fields get a default value.
<start> <size> <type [E,S,L,X,hex]> <bootable [-,*]> <c,h,s> <c,h,s>
Usually you only need to specify <start> and <size> (and perhaps <type>).
/dev/sda1 :
&
Code:
root@bt:~# sfdisk -uS /dev/sda1 --f
Checking that no-one is using this disk right now ...
BLKRRPART: Invalid argument
OK
Disk /dev/sda1: 8 cylinders, 255 heads, 63 sectors/track
Old situation:
Units = sectors of 512 bytes, counting from 0
Device Boot Start End #sectors Id System
/dev/sda1p1 30195395 1796312749 1766117355 cd Unknown
start: (c,h,s) expected (1023,254,63) found (0,190,62)
end: (c,h,s) expected (1023,254,63) found (257,19,50)
partition ends on cylinder 257, beyond the end of the disk
/dev/sda1p2 ? 544165376 2228272491 1684107116 72 Unknown
start: (c,h,s) expected (1023,254,63) found (101,107,32)
end: (c,h,s) expected (1023,254,63) found (370,114,47)
partition ends on cylinder 370, beyond the end of the disk
/dev/sda1p3 ? 1109413705 1109433745 20041 45 Unknown
start: (c,h,s) expected (1023,254,63) found (68,114,0)
end: (c,h,s) expected (1023,254,63) found (322,76,12)
partition ends on cylinder 322, beyond the end of the disk
/dev/sda1p4 0 - 0 0 Empty
Input in the following format; absent fields get a default value.
<start> <size> <type [E,S,L,X,hex]> <bootable [-,*]> <c,h,s> <c,h,s>
Usually you only need to specify <start> and <size> (and perhaps <type>).
/dev/sda1p1 :
Code:
root@bt:~# sfdisk -uS /dev/sda2 --f
Checking that no-one is using this disk right now ...
BLKRRPART: Invalid argument
OK
Disk /dev/sda2: 1305 cylinders, 255 heads, 63 sectors/track
Old situation:
Units = sectors of 512 bytes, counting from 0
Device Boot Start End #sectors Id System
/dev/sda2p1 ? 6579571 1924427647 1917848077 70 DiskSecure Multi-Boot
start: (c,h,s) expected (409,142,41) found (365,99,47)
end: (c,h,s) expected (1023,254,63) found (371,114,37)
/dev/sda2p2 ? 1953251627 3771827541 1818575915 43 Unknown
start: (c,h,s) expected (1023,254,63) found (288,115,51)
end: (c,h,s) expected (1023,254,63) found (364,116,50)
/dev/sda2p3 ? 225735265 225735274 10 72 Unknown
start: (c,h,s) expected (1023,254,63) found (288,116,47)
end: (c,h,s) expected (1023,254,63) found (372,101,51)
/dev/sda2p4 2642411520 2642463409 51890 0 Empty
start: (c,h,s) expected (1023,254,63) found (0,0,0)
end: (c,h,s) expected (1023,254,63) found (0,0,0)
Input in the following format; absent fields get a default value.
<start> <size> <type [E,S,L,X,hex]> <bootable [-,*]> <c,h,s> <c,h,s>
Usually you only need to specify <start> and <size> (and perhaps <type>).
/dev/sda2p1 :
It's Pretty much the same for Sda3 as well. :(
Please someone. I really need this drive back. It has so many custom setup's on it.
-
-
10:03
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2010-017 - WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. The updated packages have been patched to correct this issue.
-
-
9:39
»
remote-exploit & backtrack
hello again.
this is how the ground works of my bt4 beta is set. "I know the final version was released a couple of days ago, but due to poor internet conditions i cannot download it".
i have /dev/sda9 ext3 as /boot
/dev/sda10 reiserfs as /
/dev/sda11 as swap
now i wish to add windows partition to lilo's boot menu for that i added
other = /dev/sda1
label = Windows
table = /dev/sda
to the bottom of the page. After i execute lilo -v it gives an error vmlinuz not found. pls guys help me out here.:(