Jump to content

thorne

Members
  • Posts

    7,630
  • Joined

  • Last visited

  • Days Won

    2

Everything posted by thorne

  1. Nope He has headers and side pipes. It's in a factory five replica. I'm pretty sure thats the numbers. He said it was factory freak high and he was going to sell it to someone who races in some stock class. I'll grab his dyno when I get a chance
  2. My buddy at work has a dyno from his NA 5.0 and its like 270whp 300wtq. Thats why isaid that.
  3. converter FLASH!!!!!!! the gtp looks secksy the mustang has a supercharger and only makes that?
  4. They don't call it patch tuesday for nothing
  5. ALSO YOU DON'T WANT TO SEE THIS IN THE WILD. AT&T can stop it with filtering pretty quickly but a few hours in the wild could tag almost every iphone. If you don't know much about how worms work I suggest reading because a ARMY of iphone bots could take out most cell towers and lots of other fun things. ITs not a good thing.
  6. My wife has a hackintosh also. I run a real mac at work with vmware. BTW RTA. Its not just apple.
  7. I don't know where I was planning on going. the subbie meet is closed
  8. I give it 1 week we will have this flaw in the wild. http://www.reuters.com/article/marketsNews/idINN3036445620090730?rpc=44&pageNumber=1&virtualBrandChannel=11584
  9. http://www.blackhat.com/presentations/bh-usa-09/MILLER/BHUSA09-Miller-FuzzingPhone-PAPER.pdf
  10. http://www.forbes.com/2009/07/28/hackers-iphone-apple-technology-security-hackers.html
  11. http://www.wired.com/threatlevel/tag/blackhat/
  12. http://www.mulliner.org/collin/ the mulliner guy. He seems legit. I mean the hack could easily exist.
  13. http://www.wired.com/gadgetlab/2009/07/sms-hijack-iphone BTW the same guys also demonstrated exploits for windows mobile and android! http://mashable.com/2009/07/30/iphone-hack/ MUHAHAHAHA All your non blackberrys are belong to us. The white paper on how they did it. http://www.blackhat.com/presentations/bh-usa-09/MILLER/BHUSA09-Miller-FuzzingPhone-PAPER.pdf First. The muller guy is legit it seems. Second. Today is black hat. normally the biggest most bad ass exploits get released today by security researchers. Its actually a big deal. Third. At&T can filter these packets once it gets into the wild My impressions. If the sploit works how I'm guessing its a buffer overflow in the SMS program itself that allows injection of code. Once said code is injected its kinda like it jail breaks your iphone running its own code. Control of the iphone. If you've jailed broken your phone and played around much with the underlying OS you can actually SSH to another Iphone over the cell tower network. So basically I could add a user called thorne with a password and turn on SSH and someone could connect and run my phone Now thats me installed SSH its not there by default. BUT this worm essitally could create its own control channels across the cell tower network. BTW I'm not spewing bullshit on this one.
  14. thorne

    LS1 WRX

    fuck you. I eat plenty of ls1's
  15. .... says the guy with 10 posts
  16. Me: So when I get to hit that <3 Wife: Whenever you want ... big boy BBL
  17. Shit if its rolled you could always put spacers in.....
  18. thorne

    NOW WHAT, MIKE?

    http://visionlab.harvard.edu/Members/Alumni/David/mae.gif.2 http://visionlab.harvard.edu/Members/Alumni/David/mae.gif.2
  19. ENDO fuck that Try colon. Crohns Dieses is a bitch. Verced does not phase me nor does demoral. Last time I started screaming it hurt so fucking bad.
  20. Holy shit pics of the pong setup.
  21. Glad your ok. Who else would we fuck with... ohhh shit it will goto paul if that fails its going to me. Its important we keep you alive.
  22. When you join a site and start by advertising its not a way to get off on a good foot. Unless your going to offer everyone on CR a free LS7.
  23. If your clutch would hold you would eat him alive.
×
×
  • Create New...