View previous topic :: View next topic |
Author |
Message |
Deranger Veteran
Joined: 26 Aug 2004 Posts: 1215
|
Posted: Tue Dec 28, 2004 7:36 am Post subject: |
|
|
xbmodder wrote: | this is cool!
but:
cd /; find|grep pr0n |
Of course you rename them, something like "Our vacation in Italy" |
|
Back to top |
|
|
xbmodder Guru
Joined: 25 Feb 2004 Posts: 404
|
Posted: Wed Dec 29, 2004 3:36 am Post subject: |
|
|
oktane well you can make some sweet locate script.
what i do i have a system hidden in chroot. i used to have usermode. believe me there are many ways to find this! i will make a better tutorial when i reach america!
MAKE SURE YOU MAKE A pr0n user _________________ http://xbmodder.us/ |
|
Back to top |
|
|
Lepaca Kliffoth l33t
Joined: 28 Apr 2004 Posts: 737 Location: Florence, Italy
|
Posted: Wed Dec 29, 2004 2:05 pm Post subject: |
|
|
You mean I can finally download "Weapons of ass destruction" wihout my mommy knowing?? Wheeeeeee! _________________ It isn't enough to win - everyone else must lose, and you also have to rub it in their face (maybe chop off an arm too for good measure).
Animebox! |
|
Back to top |
|
|
viperlin Veteran
Joined: 15 Apr 2003 Posts: 1319 Location: UK
|
Posted: Wed Dec 29, 2004 2:42 pm Post subject: |
|
|
actually its simple enough to have a dot folder... lol it doesnt show up in usual browsing, etc.
not like theres many people who know how to use unix systems that are going to be parents or employers
but maybe an AES256bit Encrypted Harddrive (via encrypted loopback) to store the files on then password asked on mount, no hash stored, it merely is able to mount the data if the passphraze is correct, if it isnt, no filesystem detected |
|
Back to top |
|
|
xbmodder Guru
Joined: 25 Feb 2004 Posts: 404
|
Posted: Thu Dec 30, 2004 9:11 am Post subject: |
|
|
viperlin... i did so...
though i was forced to choke the password...
i need it to mount fine but display and alternate filesystem _________________ http://xbmodder.us/ |
|
Back to top |
|
|
viperlin Veteran
Joined: 15 Apr 2003 Posts: 1319 Location: UK
|
Posted: Thu Dec 30, 2004 5:02 pm Post subject: |
|
|
ha ha, you mean one password mounts one drive, another password mounts another drive
you could get away with a bash/md5 script for that, a semi-secure way would be this:
Code: |
#!/bin/bash
#md5 hash for password
SECRET="f4aec63f047ee29b14ac39e9dc684e73 -"
echo "enter your password"
read GUESS
EGUESS=$(echo $GUESS | md5sum)
if [ "$EGUESS" != "$SECRET" ]
then
mount /mnt/fakeplace # (not encrypted, full of bogus files)
else
mount /mnt/crypto # (which then asks for the filesystem password as mentioned above)
fi
|
so i guess if there not too smart you could play them for a fool by putting in a random password it would mount the bogus partition
insert the correct one, it would then ask you for the cryptoloop password
obviously change that password hash to something you will know
Code: |
echo "password" | md5sum
|
|
|
Back to top |
|
|
xbmodder Guru
Joined: 25 Feb 2004 Posts: 404
|
Posted: Thu Dec 30, 2004 10:15 pm Post subject: |
|
|
viperlin great idea!
but:
you could figure it out like pwd and dwp still mount it?
automounter... _________________ http://xbmodder.us/ |
|
Back to top |
|
|
viperlin Veteran
Joined: 15 Apr 2003 Posts: 1319 Location: UK
|
Posted: Thu Dec 30, 2004 11:12 pm Post subject: |
|
|
well you still need the 20+ character password to mount the encrypted partition, assuming you never give that up, your secure, that was a little wrapper script to fool people into beleving they mounted the hidden one |
|
Back to top |
|
|
Leffe Tux's lil' helper
Joined: 07 Apr 2004 Posts: 145 Location: Sweden
|
Posted: Sat Jan 01, 2005 5:01 pm Post subject: |
|
|
Random post:
man ls
Quote: | -I, --ignore=pattern
Do not list files whose names match the shell pattern pattern
(not regular expression) unless they are given on the command
line. As in the shell, an initial `.' in a filename does not
match a wildcard at the start of pattern. For simple-minded
root-kits: add LS_OPTIONS="$LS_OPTIONS -I mystuff" in /etc/pro-
file or so, to hide your directories. |
|
|
Back to top |
|
|
xbmodder Guru
Joined: 25 Feb 2004 Posts: 404
|
|
Back to top |
|
|
CrazyTerabyte Apprentice
Joined: 30 Dec 2004 Posts: 193
|
Posted: Sun Jan 02, 2005 1:45 am Post subject: |
|
|
Quote: | -I, --ignore=pattern
Do not list files whose names match the shell pattern pattern
(not regular expression) unless they are given on the command
line. As in the shell, an initial `.' in a filename does not
match a wildcard at the start of pattern. For simple-minded
root-kits: add LS_OPTIONS="$LS_OPTIONS -I mystuff" in /etc/pro-
file or so, to hide your directories. |
This does not "hide" your directory, but instead show exactly where it is. Just do echo $LS_OPTIONS or set or env to see exactly where it is. |
|
Back to top |
|
|
Leffe Tux's lil' helper
Joined: 07 Apr 2004 Posts: 145 Location: Sweden
|
Posted: Sun Jan 02, 2005 10:26 am Post subject: Tip: Styles can be applied quickly to selected text. |
|
|
CrazyTerabyte wrote: | Quote: | -I, --ignore=pattern
Do not list files whose names match the shell pattern pattern
(not regular expression) unless they are given on the command
line. As in the shell, an initial `.' in a filename does not
match a wildcard at the start of pattern. For simple-minded
root-kits: add LS_OPTIONS="$LS_OPTIONS -I mystuff" in /etc/pro-
file or so, to hide your directories. |
This does not "hide" your directory, but instead show exactly where it is. Just do echo $LS_OPTIONS or set or env to see exactly where it is. |
And if you use some tricky pattern ;)? |
|
Back to top |
|
|
Sandra n00b
Joined: 21 Aug 2003 Posts: 4 Location: Örebro, Sweden
|
Posted: Mon Jan 03, 2005 10:42 pm Post subject: |
|
|
lol |
|
Back to top |
|
|
gufodotto n00b
Joined: 24 Aug 2004 Posts: 7
|
Posted: Thu Jan 13, 2005 4:30 pm Post subject: |
|
|
cool idea... it convinced me to learn how to use screen
not that I download any pr0n, of course |
|
Back to top |
|
|
S_aIN_t Guru
Joined: 11 May 2002 Posts: 488 Location: Ottawa
|
Posted: Thu Jan 13, 2005 9:30 pm Post subject: |
|
|
ahh.. never thought i would see something like this in tips and tricks..
this just proves how versatile linux really is.. :) _________________ "That which is overdesigned, too highly
specific, anticipates outcome; the anicipation of
outcome guatantees, if not failure, the
absence of grace."
- William Gibson, "All Tomorrow's Parties"
----
http://petro.tanreisoftware.com |
|
Back to top |
|
|
g1um n00b
Joined: 19 Nov 2003 Posts: 32 Location: Thunder Bluff, Mulgore
|
Posted: Fri Jan 14, 2005 4:05 pm Post subject: |
|
|
very nice |
|
Back to top |
|
|
outspoken Guru
Joined: 14 Feb 2004 Posts: 464 Location: orlando, fl
|
Posted: Tue Feb 01, 2005 10:02 pm Post subject: |
|
|
just to add my .02 on screen - i use ctrl+a then " to get a menu for cycling through open sessions, its a nice little feature to show you what you have open. when you have a lot of them it helps to name them, use ctrl+a then shift+a to rename a session you are using. of course there are all kinds of options but I start out my sessions with 'screen -AmS <screen name>'
encrypted drive, loopdevices, usbkey and other such stuff - wow you guys must be porno kings. have you considered talking with your significant other about the porn and seeing if its cool or maybe they will watch too? well, maybe youve been caught before and thats no fun.
really what id suggest is not keeping it locally if your THAT concerned, try storing it on a remote machine and stream it or something. burn dvds and watch them in the living room - pictures too! well, just saying if you are really concerned and the other person knows linux a little or can figure things out then what can ya do. =)
one thing though "._backup" is one of the first things id look into. try creating a subdir in an existing folder such as /var/spool/mail/ and name it something like "incoming" so its /var/spool/mail/incoming. you can make that a mount point for your drive or partition if you are going that route as well.
but hey, whatever, enjoy. |
|
Back to top |
|
|
rohan28 Tux's lil' helper
Joined: 12 Dec 2004 Posts: 84 Location: Australia
|
Posted: Wed Feb 02, 2005 2:14 am Post subject: |
|
|
Alternate solution: go out with people who believe in porn. Works for me... and you can both enjoy it together |
|
Back to top |
|
|
dhasenan n00b
Joined: 13 Jan 2005 Posts: 41 Location: NYS
|
Posted: Wed Feb 02, 2005 2:24 am Post subject: |
|
|
How about using something like Rubberhose in addition to these steganographic techniques?
If you add a physical hard drive, people can open the box and see it. My computer currently has an open case because I have to run a cable to a hard drive whose screws won't come loose and which is positioned too low for me to get the cable back up to another drive. So I'd just add a five- or ten-gig partition to my 20GB legacy drive, call it a 10-gig, establish an innocuous mountpoint, use Rubberhose if I'm really paranoid (and can get it to run; it's still alpha, I think, and its homepage is down so I'm not sure about its status), and limit SO's access to a different computer with no bad data on it. _________________ I admit it, it's my fault. |
|
Back to top |
|
|
linux_girl Apprentice
Joined: 12 Sep 2003 Posts: 287
|
Posted: Wed Feb 02, 2005 3:50 am Post subject: |
|
|
just wondering how mutch of you guys who already has a Code: | (wife|girl frind|somethings others) |
AND watch porn
_________________
Last edited by linux_girl on Wed Feb 02, 2005 4:27 am; edited 1 time in total |
|
Back to top |
|
|
linux_girl Apprentice
Joined: 12 Sep 2003 Posts: 287
|
Posted: Wed Feb 02, 2005 4:01 am Post subject: |
|
|
when i was a student i made c.prog to mount an encrypted file
there was 2 password :
1st to mount.
2nd to trick u into beliving it is mounted (if i get cougth by FBI)
then rewrites and clean evidences like while [true ] dd if=/dev/urandom of=//bla bla ... ;done
u can also harcode password into bin like : ading a getenv(...) to mount.c require knolege in c coding
Code: |
$PORN=true mount -a
$SHELL=root mount -X -X -X #triple XXX ur mission if u wanted ...blabla is to have a root shell...
|
_________________ |
|
Back to top |
|
|
outspoken Guru
Joined: 14 Feb 2004 Posts: 464 Location: orlando, fl
|
Posted: Tue Mar 29, 2005 9:35 pm Post subject: |
|
|
linux_girl wrote: | when i was a student i made c.prog to mount an encrypted file
there was 2 password :
1st to mount.
2nd to trick u into beliving it is mounted (if i get cougth by FBI)
then rewrites and clean evidences like while [true ] dd if=/dev/urandom of=//bla bla ... ;done
u can also harcode password into bin like : ading a getenv(...) to mount.c require knolege in c coding
Code: |
$PORN=true mount -a
$SHELL=root mount -X -X -X #triple XXX ur mission if u wanted ...blabla is to have a root shell...
|
|
good stuff, but if you got caught by the FBI, a trick like this is not going to help. =) (i'm going to guess you were joking here. ;P )
uhm just for the record, i replied to this thread to help out in hidding things, nothing wrong with trying to shift things around. but if people are really concerned about others finding their stuff on a computer i would say burn it and watch it in a home player. |
|
Back to top |
|
|
xbmodder Guru
Joined: 25 Feb 2004 Posts: 404
|
Posted: Wed Mar 30, 2005 4:12 pm Post subject: |
|
|
yeah. that does not work too well.
i was doing a rsync -av / rsync://served/backup
and a list of all my pr0n popped up :-/
what we need to do is make a file that shows up as a normal file and then the rest is pr0n
like that jpeg hack that came out a bit ago.
Ok i figured out what i am going to do.
in /home/guest/.superconfig
i am going to have a tar stub (like nvidia driver) that extracts in /var/tmp/.super/
and it has +t with the user xbmodder who is in sudoers. and uses sudo to mount the file at
/home/guest
so your user has a temporary home directory. then come Ctrl+D it unmounts. We need something that does not show up in mount. Maybe just untar it and cd to that directory? you never know? _________________ http://xbmodder.us/ |
|
Back to top |
|
|
xbmodder Guru
Joined: 25 Feb 2004 Posts: 404
|
Posted: Wed Mar 30, 2005 4:42 pm Post subject: |
|
|
http://xbmodder.us/mediawiki
This is where all the scripts will be hosted. I am looking at a basic encryption script for the files. No compiled junk. If you want compiled junk send it to my email addy:xbmodder@gmail.com and tell me where you want it. I will think about it. Please no uuencode to get files onto the wiki. _________________ http://xbmodder.us/ |
|
Back to top |
|
|
stp_1993 Apprentice
Joined: 09 May 2004 Posts: 173 Location: Isle of Lesbos
|
Posted: Tue Apr 12, 2005 8:06 pm Post subject: This is stupid |
|
|
This is stupid. Most relationships fail because of increasing levels of dishonesty.
I suggest you try telling the truth from moment zero.
You'd be surprised how many people appreciate the honesty, much more so than they dislike what you're being honest about.
Have you considered just being honest and telling your SO that you look at pr0n?
If you can have honest, open dialogues about sex, your relationship will be much stronger.
If your SO really cannot deal with you looking at pr0n, and this person is really really firm about this point, I suggest you date someone who isn't a fascist:
Code: | cp SO /dev/null # dump SO
grep SO /dev/random # find a new one
|
[Okay, okay, I know that the actual topic of discussion is merely how to hide yr pr0n, not how to hide yr pr0n from your significant other.] |
|
Back to top |
|
|
|