Discussion:
Ipod Touch locked screen
(too old to reply)
cd69
2011-04-06 09:48:18 UTC
Permalink
Hi there!

I bought an Ipod Touch from a police auction.It powered and got me to a
screen to enter a password.I tried 1-2-3-4 and it now shows me a screen
"Ipod is disabled connect to Itunes"...Is there a workaround or did I bought
something that cannot be used again?Thanks for your help!
TechGuru
2011-04-06 20:41:57 UTC
Permalink
buy the cable for it..and hook it up to the pc and do a restore factory
settings from in itunes

if u wanna jailbreak it..be careful not to install firmware 4.2.1
Post by cd69
Hi there!
I bought an Ipod Touch from a police auction.It powered and got me to a
screen to enter a password.I tried 1-2-3-4 and it now shows me a screen
"Ipod is disabled connect to Itunes"...Is there a workaround or did I
bought something that cannot be used again?Thanks for your help!
cd69
2011-04-07 05:33:55 UTC
Permalink
So frustrating!My computer won't recognize it when trying to install the
drivers for it,so it isn't coming up in ITunes either...kind of a catch-22
if I want to do a re-install/restore...I'm using Windows 7 and been having
troubles with my Apple products as nothing is functioning properly on my pc
and my laptop lately.I can charge them(couple of Ipods) but can't add songs
to them and they aren't recognized in ITunes.I deleted ITunes and
reinstalled but to no avail...As I wasn't in a rush,it was no big deal as
long as I can charge them but now it's annoying...and this latest problem
with this ITouch is puzzling.Don't know what to do?Everything else is
working fine but Apple products!Any ideas?

What is the advantage of jailbreaking by the way?

Thanks for your input!

"TechGuru" wrote in message news:me4np.49$***@newsfe07.iad...

buy the cable for it..and hook it up to the pc and do a restore factory
settings from in itunes

if u wanna jailbreak it..be careful not to install firmware 4.2.1
Post by cd69
Hi there!
I bought an Ipod Touch from a police auction.It powered and got me to a
screen to enter a password.I tried 1-2-3-4 and it now shows me a screen
"Ipod is disabled connect to Itunes"...Is there a workaround or did I
bought something that cannot be used again?Thanks for your help!
TechGuru
2011-04-07 13:45:23 UTC
Permalink
could it be the usb port?

could it be the cable?

could u have some sorta virus running in the background interfearing
with installs?

maybe u have norton or some shit av program interfearing with the install

windows 7 natively installs the basic drivers for ipods..so something is
up with the system if the pc can't install it...

one other thing I would try...totally uninstalling anything to do with
apple from the system...which includes all the crap u get when
installing itunes
reboot the computer....download search everything (small awesome app for
searching files on the pc) do a search for apple or itunes and delete
anything left over that comes up...reboot...then try to reinstall
itunes...but I might try a light install (unzip the installer with
winrar...then go to the folder open a dos box and navigate to the folder
and do a passive install of only what is needed... ex:
itunes.msi /passive ....you only need to install like 3 of the
files...itunes.msi , AppleApplicationSupport.msi and
AppleMobileDeviceSupport.msi..and install quicktime lite
http://www.filehippo.com/download_quicktime_alternative/

don't wanna give u more work....but u might try formating and clean
installing a retail copy of windows 7 sp1....you could just download the
disc and then use your cd key...

too often do places like dell and hp not give u a retail disc..so what I
usually do on clients pcs is download them a retail disc and then just
use there cd key

ive listed what u should probably download if you don't have a retail
disc below..you probably have home premium either x64 or x86


Windows 7 Ultimate with SP1 (32-bit Retail English x86)

File Name:
7601.17514.101119-1850_x86fre_client_en-us_Retail_Ultimate-GRMCULFRER_EN_DVD.iso
Build: 7601.17514.101119-1850
Size: 2,563,039,232 byte
SHA-1: 92C1ADA4FF09C76EC2F1974940624CAB7F822F62
MD5: 24F3A45D43D7C532AA3126CC094C61BD
CRC: C2966895

Torrent:
MICROSOFT.WINDOWS.7.ULTIMATE.RTM.WITH.SP1.X86.RETAIL.ENGLISH.DVD-WZT.torrent
Magnet Link: magnet:?xt=urn:btih:368dae95553a05d04c7b7705ccda8f46169f69a1

Windows 7 Ultimate with SP1 (64-bit Retail English x64)

File Name:
7601.17514.101119-1850_x64fre_client_en-us_Retail_Ultimate-GRMCULXFRER_EN_DVD.iso
Build: 7601.17514.101119-1850
Size: 3,319,478,272 byte
SHA-1: 1693B6CB50B90D96FC3C04E4329604FEBA88CD51
MD5: 56A26636EC667799F5A7F42F142C772D
CRC: 8589EE18

Torrent:
MICROSOFT.WINDOWS.7.ULTIMATE.RTM.WITH.SP1.X64.RETAIL.ENGLISH.DVD-WZT.torrent
Magnet Link: magnet:?xt=urn:btih:bf8a90dc3161e3fd5b7239c6cd5a9d1c0dec79b5

Windows 7 Ultimate with SP1 (32-bit OEM English x86)

File Name:
7601.17514.101119-1850_x86fre_client_en-us_OEM_Ultimate-GRMCULFREO_EN_DVD.iso
Build: 7601.17514.101119-1850
Size: 2,563,039,232 byte
SHA-1: 6930F13DFFF6719763D5C011B38FEDD86A1F0411
MD5: D68B65011DF96526D09F7F8CFC9F10DB
CRC: 08A681BC

Torrent:
MICROSOFT.WINDOWS.7.ULTIMATE.RTM.WITH.SP1.X86.OEM.ENGLISH.DVD-WZT.torrent
Magnet Link: magnet:?xt=urn:btih:1f735f93fd77d471a7953dc1339d312ef371753a

Windows 7 Ultimate with SP1 (64-bit OEM English x64)

File Name:
7601.17514.101119-1850_x64fre_client_en-us_OEM_Ultimate-GRMCULXFREO_EN_DVD.iso
Build: 7601.17514.101119-1850
Size: 3,319,478,272 byte
SHA-1: A676A2F39529BB20CA1971CEE991980546F10034
MD5: A4F7C395B843E2403B4241A933DA0915
CRC: AD0CA2D6

Torrent:
MICROSOFT.WINDOWS.7.ULTIMATE.RTM.WITH.SP1.X64.OEM.ENGLISH.DVD-WZT.torrent
Magnet Link: magnet:?xt=urn:btih:07e21768378484cd96e12167777828e34a110f07


Windows 7 Home Basic with SP1 (32-bit Retail English x86)

File Name:
7601.17514.101119-1850_x86fre_client_en-us_Retail_HomeBasic-GRMCHBFRER_EN_DVD.iso
Build: 7601.17514.101119-1850
Size: 2,563,039,232 byte
SHA-1: 047AF9ECEA6F9430B2C0CA64CE8A6F888FCD5A64
MD5: F1B2DCB226876FA195A5542AB818FB9F
CRC: 50277BC7

BT Torrent:
MICROSOFT.WINDOWS.7.HOME.BASIC.RTM.WITH.SP1.X86.RETAIL.ENGLISH.DVD-WZT.torrent
Magnet Link: magnet:?xt=urn:btih:4c23f29ae76c9f42cc787bb9d157118209dd1ebc

Windows 7 Home Basic with SP1 (64-bit Retail English x64)

File Name:
7601.17514.101119-1850_x64fre_client_en-us_Retail_HomeBasic-GRMCHBXFRER_EN_DVD.iso
Build: 7601.17514.101119-1850
Size: 3,319,478,272 byte
SHA-1: 0FD876E2C773983C2D8EF7955ED0D225B5FFBA36
MD5: 010964BF52BEBB0606205B0B34F318FB
CRC: 118AD3F4

BT Torrent:
MICROSOFT.WINDOWS.7.HOME.BASIC.RTM.WITH.SP1.X64.RETAIL.ENGLISH.DVD-WZT.torrent
Magnet Link: magnet:?xt=urn:btih:d07ece95561dbcb0c236ccf9b1f83bccfcd9b4b8

Windows 7 Home Basic with SP1 (32-bit OEM English x86)

File Name:
7601.17514.101119-1850_x86fre_client_en-us_OEM_HomeBasic-GRMCHBFREO_EN_DVD.iso
Build: 7601.17514.101119-1850
Size: 2,563,039,232 byte
SHA-1: 50402B4657A4873D6FF34AEF5F2D988983F365C6
MD5: 0482F4CBDFE9C1C4698C8F42F77A9533
CRC: 8DB6C964

Torrent:
MICROSOFT.WINDOWS.7.HOME.BASIC.RTM.WITH.SP1.X86.OEM.ENGLISH.DVD-WZT.torrent
Magnet Link: magnet:?xt=urn:btih:8a895afe6382d6d221abc31f62954f7b695da729

Windows 7 Home Premium with SP1 (32-bit Retail English x86)

File Name:
7601.17514.101119-1850_x86fre_client_en-us_Retail_HomePremium-GRMCHPFRER_EN_DVD.iso
Build: 7601.17514.101119-1850
Size: 2,563,039,232 byte
SHA-1: 22DF3E5A80F8DBF014C2776A01B1CD9F24D83233
MD5: C5BB99B2F1A9E7A5B4FBC6E3EFF70882
CRC: 9C5DC931

BT Torrent:
MICROSOFT.WINDOWS.7.HOME.PREMIUM.RTM.WITH.SP1.X86.RETAIL.ENGLISH.DVD-WZT.torrent
Magnet Link: magnet:?xt=urn:btih:ac31dfacaa4a91a23e55975f1ac11e88eba3a191

Windows 7 Home Premium with SP1 (64-bit Retail English x64)

File Name:
7601.17514.101119-1850_x64fre_client_en-us_Retail_HomePremium-GRMCHPXFRER_EN_DVD.iso
Build: 7601.17514.101119-1850
Size: 3,319,478,272 byte
SHA-1: B4821F46A171708F5F8F8A0EF48FC16529437961
MD5: 971843A457B6E0DB0AF61258CBE7256A
CRC: D236FD70

BT Torrent:
MICROSOFT.WINDOWS.7.HOME.PREMIUM.RTM.WITH.SP1.X64.RETAIL.ENGLISH.DVD-WZT.torrent
Magnet Link: magnet:?xt=urn:btih:eaa5eae229a93d443c09cae7adc7fde4422d1e9e

Windows 7 Home Premium with SP1 (32-bit OEM English x86)

File Name:
7601.17514.101119-1850_x86fre_client_en-us_OEM_HomePremium-GRMCHPFREO_EN_DVD.iso
Build: 7601.17514.101119-1850
Size: 2,563,039,232 byte
SHA-1: D0D12A9F1F675212DCEED956F6F755C9FD190C48
MD5: 978D535D0377D319E73DB37375EE619A
CRC: C414EBCA

Torrent:
MICROSOFT.WINDOWS.7.HOME.PREMIUM.RTM.WITH.SP1.X86.OEM.ENGLISH.DVD-WZT.torrent
Magnet Link: magnet:?xt=urn:btih:38c444a2d43bc6b1ac65b6ec7f851cb27dbeede8

Windows 7 Professional with SP1 (32-bit Retail English x86)

File Name:
7601.17514.101119-1850_x86fre_client_en-us_Retail_Professional-GRMCPRFRER_EN_DVD.iso
Build: 7601.17514.101119-1850
Size: 2,563,039,232 byte
SHA-1: 917A542B0541054BB9C2A06A11A46AED6943856B
MD5: BEFD4F1E00EC8DA2EFFBD789F4E66FBF
CRC: 20078D8D

BT Torrent:
MICROSOFT.WINDOWS.7.PROFESSIONAL.WITH.SP1.X86.RTM.RETAIL.ENGLISH.DVD-WZT.torrent
Magnet Link: magnet:?xt=urn:btih:6e99a2979dd82463ab964c6b6df8e127a6cc502b

Windows 7 Professional with SP1 (64-bit Retail English x64)

File Name:
7601.17514.101119-1850_x64fre_client_en-us_Retail_Professional-GRMCPRXFRER_EN_DVD.iso
Build: 7601.17514.101119-1850
Size: 3,319,478,272 byte
SHA-1: 5ED2584110E03F498DB4458BA9FAFD5A7EF602ED
MD5: 338F3245D68527DB47B8A44E55317D0A
CRC: 74F3CB73

BT Torrent:
MICROSOFT.WINDOWS.7.PROFESSIONAL.WITH.SP1.X64.RTM.RETAIL.ENGLISH.DVD-WZT.torrent
Magnet Link: magnet:?xt=urn:btih:cd068e3b9d46bd1a5f1bf7a84de8ab4347643b79

Windows 7 Professional with SP1 (32-bit OEM English x86)

File Name:
7601.17514.101119-1850_x86fre_client_en-us_OEM_Professional-GRMCPRFREO_EN_DVD.iso
Build: 7601.17514.101119-1850
Size: 2,563,039,232 byte
SHA-1 : 6A67078674301AFCE5E561CB9D693708DB22BCC3
MD5 : 479EDCF9136FBE2004D7A7954E45E4A7
CRC : 8DFF16F9

Torrent:
MICROSOFT.WINDOWS.7.PROFESSIONAL.WITH.SP1.X86.RTM.OEM.ENGLISH.DVD-WZT.torrent
Magnet Link: magnet:?xt=urn:btih:b2332836db311d8adbaaae3faa1bbeda57af5114

Windows 7 Professional with SP1 (64-bit OEM English x64)

File Name:
7601.17514.101119-1850_x64fre_client_en-us_OEM_Professional-GRMCPRXFREO_EN_DVD.iso
Build: 7601.17514.101119-1850
Size: 3,319,478,272 byte
SHA-1 : AF9FD9CA3C3D6DA67C9E8713E41CD51DF365F8D8
MD5 : 4B947E727A83D3FBD51D99985D23B3BC
CRC : 3C45BCBB

BT Torrent:
MICROSOFT.WINDOWS.7.PROFESSIONAL.WITH.SP1.X64.RTM.OEM.ENGLISH.DVD-WZT.torrent
Magnet Link: magnet:?xt=urn:btih:91618a13c4efcf39ea63c0712d95ca6d0ad981b8

Windows 7 Professional with SP1 (32-bit Volume License English x86)

File Name:
7601.17514.101119-1850_x86fre_professional_en-us_VL_OEM_Professional-GRMCPRVOL_EN_DVD.iso
Build: 7601.17514.101119-1850
Size: 2,433,216,512 byte
SHA-1: 85E9767CD50C6083160393F85CB2C4156CD9348D
MD5: 637EF96096EDDBE7BF5A4A1ACEEC71BA
CRC: 7F1BDDD3

BT Torrent:
MICROSOFT.WINDOWS.7.PROFESSIONAL.RTM.WITH.SP1.X86.VOLUME.OEM.ENGLISH.DVD-WZT.torrent
Magnet Link: magnet:?xt=urn:btih:67e54a04683be736d19b4b5472b1c3c7c337e8a2

Windows 7 Professional with SP1 (64-bit Volume License English x64)

File Name:
7601.17514.101119-1850_x64fre_professional_en-us_VL_OEM_Professional-GRMCPRXVOL_EN_DVD.iso
Build: 7601.17514.101119-1850
Size: 3,181,668,352 byte
SHA-1: 647C756B95EEF95C05EA04EEAFED035E0065EB9E
MD5: 83FE84A7968E7EF226B9BE45CBE4F9AA

BT Torrent:
MICROSOFT.WINDOWS.7.PROFESSIONAL.RTM.WITH.SP1.X64.VOLUME.OEM.ENGLISH.DVD-WZT.torrent
Magnet Link: magnet:?xt=urn:btih:B5A3CEBC42F27420D321525EC220F5CAE5285796
Post by cd69
So frustrating!My computer won't recognize it when trying to install the
drivers for it,so it isn't coming up in ITunes either...kind of a
catch-22 if I want to do a re-install/restore...I'm using Windows 7 and
been having troubles with my Apple products as nothing is functioning
properly on my pc and my laptop lately.I can charge them(couple of
Ipods) but can't add songs to them and they aren't recognized in
ITunes.I deleted ITunes and reinstalled but to no avail...As I wasn't in
a rush,it was no big deal as long as I can charge them but now it's
annoying...and this latest problem with this ITouch is puzzling.Don't
know what to do?Everything else is working fine but Apple products!Any
ideas?
What is the advantage of jailbreaking by the way?
Thanks for your input!
buy the cable for it..and hook it up to the pc and do a restore factory
settings from in itunes
if u wanna jailbreak it..be careful not to install firmware 4.2.1
Post by cd69
Hi there!
I bought an Ipod Touch from a police auction.It powered and got me to a
screen to enter a password.I tried 1-2-3-4 and it now shows me a screen
"Ipod is disabled connect to Itunes"...Is there a workaround or did I
bought something that cannot be used again?Thanks for your help!
Iowna Uass
2011-04-08 12:39:16 UTC
Permalink
Post by TechGuru
don't wanna give u more work....but u might try formating and clean
installing a retail copy of windows 7 sp1....you could just download the
disc and then use your cd key...
too often do places like dell and hp not give u a retail disc..so what I
usually do on clients pcs is download them a retail disc and then just use
there cd key
ive listed what u should probably download if you don't have a retail disc
below..you probably have home premium either x64 or x86
Windows 7 Ultimate with SP1 (32-bit Retail English x86)
< garbage snipped >

wow....
Maybe 5 to 7 years ago, I would've gone the torrent route for a download,
but these days almost every download I've sampled has malware injected into
it.
The fact that you admit to doing this and installing it on client computers
is even more disturbing.
And if you think your so called virus scanner is able to detect the malware
embedded in the disk image.... well, good luck with that.
TechGuru
2011-04-08 20:29:18 UTC
Permalink
moron...if u go by the md5 thats impossible
Post by TechGuru
don't wanna give u more work....but u might try formating and clean
installing a retail copy of windows 7 sp1....you could just download the
disc and then use your cd key...
too often do places like dell and hp not give u a retail disc..so what I
usually do on clients pcs is download them a retail disc and then just use
there cd key
ive listed what u should probably download if you don't have a retail disc
below..you probably have home premium either x64 or x86
Windows 7 Ultimate with SP1 (32-bit Retail English x86)
< garbage snipped>
wow....
Maybe 5 to 7 years ago, I would've gone the torrent route for a download,
but these days almost every download I've sampled has malware injected into
it.
The fact that you admit to doing this and installing it on client computers
is even more disturbing.
And if you think your so called virus scanner is able to detect the malware
embedded in the disk image.... well, good luck with that.
Iowna Uass
2011-04-11 15:17:19 UTC
Permalink
Post by TechGuru
moron...if u go by the md5 thats impossible
So you are saying that if a package has a hash, it's legit?
Who created the package with the hash?
Think about it for a while before you start calling people names.
TechGuru
2011-04-11 19:46:11 UTC
Permalink
you obviously don't understand what a crc or md5 is...so just shhh
Post by Iowna Uass
Post by TechGuru
moron...if u go by the md5 thats impossible
So you are saying that if a package has a hash, it's legit?
Who created the package with the hash?
Think about it for a while before you start calling people names.
Iowna Uass
2011-04-12 12:18:34 UTC
Permalink
Post by TechGuru
you obviously don't understand what a crc or md5 is...so just shhh
Post by Iowna Uass
Post by TechGuru
moron...if u go by the md5 thats impossible
So you are saying that if a package has a hash, it's legit?
Who created the package with the hash?
Think about it for a while before you start calling people names.
At work we call it encryption and I've written software to do it.
For the uninformed that think the so called guru knows anything, an md5 hash
is to indicate that the files haven't been altered from the original source.
The problem that you obviously overlook is that I can take a cd, alter a few
key files, repackage and re-hash the volume and imbeciles such as yourself
would never know the difference due to the fact that you have zero
understanding of the concept.
In that case, all the hash will do is tell you that you've downloaded what I
packaged.
And now all your data belong to us.
TechGuru
2011-04-12 17:05:13 UTC
Permalink
your a fucking moron...I feel sorry for whoever you work for...
microsoft releases the md5s of there isos moron...so just get the fuck
off the newsgroups ...bad advise is worse then no advise...go back to
fucking your dog you hick
Post by Iowna Uass
Post by TechGuru
you obviously don't understand what a crc or md5 is...so just shhh
Post by Iowna Uass
Post by TechGuru
moron...if u go by the md5 thats impossible
So you are saying that if a package has a hash, it's legit?
Who created the package with the hash?
Think about it for a while before you start calling people names.
At work we call it encryption and I've written software to do it.
For the uninformed that think the so called guru knows anything, an md5 hash
is to indicate that the files haven't been altered from the original source.
The problem that you obviously overlook is that I can take a cd, alter a few
key files, repackage and re-hash the volume and imbeciles such as yourself
would never know the difference due to the fact that you have zero
understanding of the concept.
In that case, all the hash will do is tell you that you've downloaded what I
packaged.
And now all your data belong to us.
Iowna Uass
2011-04-13 13:14:15 UTC
Permalink
Post by TechGuru
your a fucking moron...I feel sorry for whoever you work for...
microsoft releases the md5s of there isos moron...so just get the fuck off
the newsgroups ...bad advise is worse then no advise...go back to fucking
your dog you hick
Wow....

Hit a nerve? I'll bet you didn't know that md5 hasn't been secure for a
number of years now.
I've can make a hash match the original. Not a lot of difficulty there.

Also, my company pays me quite well for the systems I build. I'll bet you're
working helpdesk at a call center.

You should also take advantage of spell check. Your grammer indicates the
education of an eighth grader.
Heath
2011-04-13 15:01:11 UTC
Permalink
Education of a 5th grader? lol. I know I am not part of this "argument" but
thought I'd put my comment in. You say he has the education of a 5th grader,
well, you aren't much better with continuing to respond like an 8th grader
in your rants. I have found a lot of people in here that are like you, get
all huffy and puffy when someone actually stands up to you. Kind of like a
bully in a school yard.
Post by TechGuru
your a fucking moron...I feel sorry for whoever you work for...
microsoft releases the md5s of there isos moron...so just get the fuck off
the newsgroups ...bad advise is worse then no advise...go back to fucking
your dog you hick
Wow....

Hit a nerve? I'll bet you didn't know that md5 hasn't been secure for a
number of years now.
I've can make a hash match the original. Not a lot of difficulty there.

Also, my company pays me quite well for the systems I build. I'll bet you're
working helpdesk at a call center.

You should also take advantage of spell check. Your grammer indicates the
education of an eighth grader.
Iowna Uass
2011-04-14 13:53:58 UTC
Permalink
Post by Heath
Education of a 5th grader? lol. I know I am not part of this "argument"
but thought I'd put my comment in. You say he has the education of a 5th
grader, well, you aren't much better with continuing to respond like an
8th grader in your rants. I have found a lot of people in here that are
like you, get all huffy and puffy when someone actually stands up to you.
Kind of like a bully in a school yard.
I don't mind an educated debate, but dishing out bad advice to people that
don't have a lot of knowledge about how computers work irks me. I've seen
enough systems that have been turned into a bot due to downloading torrents.

Do you want to trust your OS to a downloaded torrent?
TechGuru
2011-04-13 17:00:45 UTC
Permalink
even if md5 can be faked...the time required and number of cpus is
stupid to think someone gonna bother..(300 cpus working for 3 weeks..get
a life)...and even if someone was to do that...ms still published sh-1
as well and thats not hacked far as I know...if your that paranoid about
security on computers...maybe you shouldn't use one...either that or go
work for the cia/fbi
Post by Iowna Uass
Post by TechGuru
your a fucking moron...I feel sorry for whoever you work for...
microsoft releases the md5s of there isos moron...so just get the fuck off
the newsgroups ...bad advise is worse then no advise...go back to fucking
your dog you hick
Wow....
Hit a nerve? I'll bet you didn't know that md5 hasn't been secure for a
number of years now.
I've can make a hash match the original. Not a lot of difficulty there.
Also, my company pays me quite well for the systems I build. I'll bet you're
working helpdesk at a call center.
You should also take advantage of spell check. Your grammer indicates the
education of an eighth grader.
Iowna Uass
2011-04-14 14:01:17 UTC
Permalink
even if md5 can be faked...the time required and number of cpus is stupid
to think someone gonna bother..(300 cpus working for 3 weeks..get a
life)...and even if someone was to do that...ms still published sh-1 as
well and thats not hacked far as I know...if your that paranoid about
security on computers...maybe you shouldn't use one...either that or go
work for the cia/fbi
Here is a link to how easy it is.

http://www.mscs.dal.ca/~selinger/md5collision/

So next time you think you know what you are talking about, perhaps you
should use that google thing to do some research before opening your mouth.

By the way, I was hacking C-64s long before you ever walked this planet and
part of my current job is analyzing exploits. So maybe you should stick to
swapping video cards.
TechGuru
2011-04-14 18:56:04 UTC
Permalink
The weakness was demonstrated by faking a certificate so that an SSL
enabled fake website can successfully spoof a genuine website. This will
mean that when people browse and they see the URL to contain HTTPS
and/or a lock icon in the browser status bar, they will no longer be
100% assured that they are looking at a genuine website. If this
assurance is gone, then how else is one supposed to verify whether one
is dealing with a genuine or a fake website?
The resources required to create this exploit were not enormously large
– 200 Playstations 3 for 2 weeks. This is certainly not beyond the means
of a determined hacker. As the article mentions, this much computing
power could probably be acquired for $1500 from Amazon! Consider this
effort against the pay-off that a rogue hacker might have in terms of
harvesting identity information of hundreds of thousand unsuspecting
customers of important financial institutions like banks.

your link deals with small little files and I did read up on it you
reject...I really doubt it would work so easily or fast on a file as big
and complex as an iso....especially if someone wanted to also include a
virus...if you really think someones gonna go to all that trouble...you
really need to get a life...now end of discussion ..your way to paranoid
a user

On 1 March 2005, Arjen Lenstra, Xiaoyun Wang, and Benne de Weger
demonstrated[12] construction of two X.509 certificates with different
public keys and the same MD5 hash, a demonstrably practical collision.
The construction included private keys for both public keys. A few days
later, Vlastimil Klima described[13] an improved algorithm, able to
construct MD5 collisions in a few hours on a single notebook computer.
On 18 March 2006, Klima published an algorithm[14] that can find a
collision within one minute on a single notebook computer, using a
method he calls tunneling.

On December 24, 2010, Tao Xie and Dengguo Feng announced the first
published single-block MD5 collision (two 64-byte messages with the same
MD5 hash).[16] Previous collision discoveries relied on multi-block
attacks. For "security reasons", Xie and Feng did not disclose the new
attack method. They have issued a challenge to the cryptographic
community, offering a US$ 10,000 reward to the first finder of a
different 64-byte collision before January 1, 2013.
Post by Iowna Uass
even if md5 can be faked...the time required and number of cpus is stupid
to think someone gonna bother..(300 cpus working for 3 weeks..get a
life)...and even if someone was to do that...ms still published sh-1 as
well and thats not hacked far as I know...if your that paranoid about
security on computers...maybe you shouldn't use one...either that or go
work for the cia/fbi
Here is a link to how easy it is.
http://www.mscs.dal.ca/~selinger/md5collision/
So next time you think you know what you are talking about, perhaps you
should use that google thing to do some research before opening your mouth.
By the way, I was hacking C-64s long before you ever walked this planet and
part of my current job is analyzing exploits. So maybe you should stick to
swapping video cards.
TechGuru
2011-04-14 19:09:31 UTC
Permalink
In cryptography, SHA-1 is a cryptographic hash function designed by the
National Security Agency and published by the NIST as a U.S. Federal
Information Processing Standard. SHA stands for Secure Hash Algorithm.
The three SHA algorithms are structured differently and are
distinguished as SHA-0, SHA-1, and SHA-2. SHA-1 is very similar to
SHA-0, but corrects an error in the original SHA hash specification that
led to significant weaknesses. The SHA-0 algorithm was not adopted by
many applications. SHA-2 on the other hand significantly differs from
the SHA-1 hash function.

SHA-1 is the most widely used of the existing SHA hash functions, and is
employed in several widely-used security applications and protocols. In
2005, security flaws were identified in SHA-1, namely that a
mathematical weakness might exist, indicating that a stronger hash
function would be desirable.[2] Although no successful attacks have yet
been reported on the SHA-2 variants, they are algorithmically similar to
SHA-1 and so efforts are underway to develop improved
alternatives.[3][4] A new hash standard, SHA-3, is currently under
development — an ongoing NIST hash function competition is scheduled to
end with the selection of a winning function in 2012.

"By the way, I was hacking C-64s long before you ever walked this
planet"...considering my first computer was an apple II..I kinda doubt
your older
Post by Iowna Uass
even if md5 can be faked...the time required and number of cpus is stupid
to think someone gonna bother..(300 cpus working for 3 weeks..get a
life)...and even if someone was to do that...ms still published sh-1 as
well and thats not hacked far as I know...if your that paranoid about
security on computers...maybe you shouldn't use one...either that or go
work for the cia/fbi
Here is a link to how easy it is.
http://www.mscs.dal.ca/~selinger/md5collision/
So next time you think you know what you are talking about, perhaps you
should use that google thing to do some research before opening your mouth.
By the way, I was hacking C-64s long before you ever walked this planet and
part of my current job is analyzing exploits. So maybe you should stick to
swapping video cards.
Iowna Uass
2011-04-15 15:40:04 UTC
Permalink
<regurg snipped>
Post by TechGuru
"By the way, I was hacking C-64s long before you ever walked this
planet"...considering my first computer was an apple II..I kinda doubt
your older
Yet most of your postings use the grammar related to textspeak.
Even in your retort, your grammar is poor at best.
Looking at previous postings, I'm going to hazard a guess that you've just
seen your twentieth birthday.

My original comment still stands.
To offer advice in a public forum to the effect that you can download
whatever you need using torrents and not pick up malware is bad advice on
the best of days.
Your responses to my comment indicates your lack of working knowledge of
encryption.
In my environment, I need to ensure that my systems communicate securely
over continents.
That involves the exchange of PKI and certificate management on both ends.
Using a hash just ensures that it would be difficult to read the data
traveling from A to B and that the message received is actually the one that
was sent. I use sha1 for my encryption algorythms.

Using a torrent doesn't meet any of those requirements and therefore is not
secure by any means.
Even if you have a signature, unless you are downloading from the source, in
this case Microsoft, you can't guarantee the validity of the content.

To counter your statement in a previous post about doubting whether or not
an image can be compromised. You need to think on the small scale.
All I need to do is modify one system file, and make the hash of that match
the original. Then repack the disk image. That's all it takes.

And if you think that a ton of computing power would be needed to crack any
encryption, and would take forever then you've never heard of a botnet.

So think about that for a while.
TechGuru
2011-04-16 00:45:43 UTC
Permalink
people use bad grammar/spelling on the net cause they don't wanna type
all the words moron...maybe YOU better study up on social interaction on
the net

and im not even gonna bother fighting anymore with someone of your
ignorant intelligence...arguing with you is like talking to a stubborn
brat who must have the last word (and yes I realize im getting the last
one in)
Post by Iowna Uass
<regurg snipped>
Post by TechGuru
"By the way, I was hacking C-64s long before you ever walked this
planet"...considering my first computer was an apple II..I kinda doubt
your older
Yet most of your postings use the grammar related to textspeak.
Even in your retort, your grammar is poor at best.
Looking at previous postings, I'm going to hazard a guess that you've just
seen your twentieth birthday.
My original comment still stands.
To offer advice in a public forum to the effect that you can download
whatever you need using torrents and not pick up malware is bad advice on
the best of days.
Your responses to my comment indicates your lack of working knowledge of
encryption.
In my environment, I need to ensure that my systems communicate securely
over continents.
That involves the exchange of PKI and certificate management on both ends.
Using a hash just ensures that it would be difficult to read the data
traveling from A to B and that the message received is actually the one that
was sent. I use sha1 for my encryption algorythms.
Using a torrent doesn't meet any of those requirements and therefore is not
secure by any means.
Even if you have a signature, unless you are downloading from the source, in
this case Microsoft, you can't guarantee the validity of the content.
To counter your statement in a previous post about doubting whether or not
an image can be compromised. You need to think on the small scale.
All I need to do is modify one system file, and make the hash of that match
the original. Then repack the disk image. That's all it takes.
And if you think that a ton of computing power would be needed to crack any
encryption, and would take forever then you've never heard of a botnet.
So think about that for a while.
TechGuru
2011-04-06 20:44:08 UTC
Permalink
http://support.apple.com/kb/HT1808?viewlocale=en_US
Post by cd69
Hi there!
I bought an Ipod Touch from a police auction.It powered and got me to a
screen to enter a password.I tried 1-2-3-4 and it now shows me a screen
"Ipod is disabled connect to Itunes"...Is there a workaround or did I
bought something that cannot be used again?Thanks for your help!
Continue reading on narkive:
Loading...