Sorry, no. The pic is identical to the product I have.
I'm selling because I already have a copy of it, and I found this in my supply of software and games.
hmm, how much would you want for it?
|
|
|
I have a brand new, sealed copy of FPS Creator. I am putting up for sale for BTC. Post and/or PM me your offers! x10?
|
|
|
too late
|
|
|
lol. No.
Boot PC -> MBR loads (truecrypt) -> Truecrypt decrypts MBR on hdd (windows) -> control gets passed to that.
The kernel is encypted.
OK, the Windows kernel is encrypted, but the same problem applies to TrueCrypt. You need to enter a passphrase / insert a USB stick, and someone could install a modified version of TrueCrypt that saves the key to somewhere (like the last sector of the disk, or NVRAM). EvilMaid
|
|
|
For the sake of arguing, how could they install a backdoored kernel on an encrypted hard drive.
The kernel has to be loaded from somewhere. Unless you boot from a CD or USB drive, it will be on an unencrypted partition of your hard disk. lol. No. Boot PC -> MBR loads (truecrypt) -> Truecrypt decrypts MBR on hdd (windows) -> control gets passed to that. The kernel is encypted.
|
|
|
Just bought L4D2, after a bit of discussion he decided to go first and I got the gift instantly. +1
|
|
|
i'm selling plex's 1.25btc each.
lemmie know. i can deliver it tonight
hmm, seems like a good deal. i wont be able to take it up tonight though.
|
|
|
Err... kind of not what he asked for.
|
|
|
Topic says it all. Post an offer or send a pm.
Not to hijack this thread, but I would like one aswell. (@op i'll delete this if you feel it's hijacking )
|
|
|
Um, even if they did that. Someone could steal their harddrive etc. And if they got a trojan on the system, odds are most people wouldn't be looking for wallets (just yet), and even then, it's only a matter of typing a few commands to get a system level console.
If someone can get physical access to your computer, even Linux with encrypted hard disk is no protection. They could install a backdoored kernel that leaks your password. You can actually restrict running cmd.exe using the software restrictions, but as I said this doesn't mean that another program you trust couldn't be hacked to do the same things. For the sake of arguing, how could they install a backdoored kernel on an encrypted hard drive.
|
|
|
@SomeoneWeird: Eventually, running Ubuntu as my main OS and Windows in a VM is my goal, but it creates too many headaches at once. For example, I really like my VPN WiTopia, but it doesn't have a Linux version. Another example: my mobile broadband card technically will work with Linux, but it involves two pages of tedious instructions.
So, I am slowly phasing Windows out and Ubuntu in. For example, I now do all of my web surfing in Ubuntu running in a VMware VM.
@1MLyg5WVFSMifFjkrZiyGW2nw: I am running Windows 7 and I am trying to restrict any possible malware from installing and/or running itself without entering the Admin password.
Running as normal user should already block installation of drivers (rootkits do that). The only way to protect against "normal" trojans that could read your wallet.dat is restricting the programs you can run to a small set. You can do that from "Local security policy" by creating Software Restriction rules (by file name, certificate or MD5 hash). Note that it's still possible that some exploit takes over a trusted program and reads out your files. Only safe way is to make an user account for Bitcoin only and don't use it for anything else. Um, even if they did that. Someone could steal their harddrive etc. And if they got a trojan on the system, odds are most people wouldn't be looking for wallets (just yet), and even then, it's only a matter of typing a few commands to get a system level console.
|
|
|
... *sigh* Ask someone to move this back.
ah. shit. >.>
|
|
|
@SomeoneWeird: Eventually, running Ubuntu as my main OS and Windows in a VM is my goal, but it creates too many headaches at once. For example, I really like my VPN WiTopia, but it doesn't have a Linux version. Another example: my mobile broadband card technically will work with Linux, but it involves two pages of tedious instructions.
So, I am slowly phasing Windows out and Ubuntu in. For example, I now do all of my web surfing in Ubuntu running in a VMware VM.
@1MLyg5WVFSMifFjkrZiyGW2nw: I am running Windows 7 and I am trying to restrict any possible malware from installing and/or running itself without entering the Admin password.
Just install bitcoin in the VM then? And as 1MLyg5WVFSMifFjkrZiyGW2nw said, look at the group policies and change everything to restrict what the other account can do
|
|
|
To increase my overall security, I created a separate Admin Windows login and downgraded my normal day-to-day account to a Standard User.
However, in my Standard account, I seem to be able to do everything I could when it was an admin account. Can someone tell me what I need to do to vastly restrict what a standard user can do? And don't say "switch to Linux" - I'm working toward that goal, but there's a million steps involved.
I want to limit what malware would be capable of doing on my PC.
Run everything in a sandbox.
|
|
|
Blockexplorer shows about 5000 seconds left until next difficulty.
Think it will be closer to 1.5M or 1.9M ? My guess is 1.9M
~1.6 imo.
|
|
|
PM with offers, will buy any game I don't have for a reasonable price.
|
|
|
Will since it's my theory that botnet will soon become self aware and create its own pools with millions of zombie pcs, my question is simple. Does the bitcoin system have anyway to prevent this?
Some of the most capable minds working for IBM can make a computer that plays chess or Jeopardy very well. We're a very long way from computers that have a true concept of self. An ad hoc network put together by a bunch of people running open source software to compute SHA hashes is about as far away from self awareness as my toaster. QFFT +1
|
|
|
|