Tuesday, September 22, 2020

Battle Of Gypsum Ridge Pt2

 

Close and deadly action on the Ridge.


On their left, the Dominion's first attack on the village
was repulsed as was a rather ragged rush forward by the grenadiers. On the ridge, a steady stream of Rebel companies were thrown into the gaps as they appeared.


At last, the Rifles forced their way into the village while the Grenadiers fell back to reorganize. The Rebels took advantage of the break to rearrange their units, sending fresh units into the line and pulling the dismounted cavalry back from the wall to ride to the open flank .


Accurate fire from the Dominion artillery managed to silence the Rebel battery just in time for a renewed Dominion assault. The fighting was fierce and prolonged.


The Grenadiers did not have the strength to storm the wall and were taking such heavy casualties that General Douglas feared they might be forced to retreat but the Rebel line was flanked and the exposed units suffered from heavy and accurate fire. The last straw came when the Director General's Bodyguard remounted and swept around the flank, driving all opposition before them. 


Saturday, September 12, 2020

Rust Memory Optimization

One of my goals this year is to learn new things that take more than a few weeks to learn. I've been learning Rust. One of the claims I saw is that Rust's borrow mechanics allow it to optimize better than C++ does. I wanted to see this in action so I ran some simple examples through godbolt. Here's some C++ code that reads from array A and writes to array B:

int test(const int* A, int* B, int i) {     int x = A[i];     B[i] = x+1;     int y = A[i];     return x+y; } 

This C++ code compiles to assembly, with -O2:

movsx   rdx, edx lea     rcx, [rdi+rdx*4] mov     eax, DWORD PTR [rcx] lea     edi, [rax+1] mov     DWORD PTR [rsi+rdx*4], edi add     eax, DWORD PTR [rcx] ret 

Note that it is loading DWORD PTR [rcx] twice and loading DWORD PTR [rsi+…] once. That means it's accessing A[i]'s memory twice and B[i] once. It knows that A hasn't changed and it knows i hasn't changed but it doesn't know that A[i] hasn't changed. It's possible that A and B overlap. That means it has to load A[i] twice, even though it's marked const.

Here's the Rust version:

pub fn test(A: &[i32], B: &mut [i32], i: usize) -> i32 {     let x = A[i];     B[i] = x+1;     let y = A[i];     return x+y; } 

and the output (some parts omitted):

push    rax mov     eax, DWORD PTR [rdi + 4*r8]lea     ecx, [rax + 1] mov     DWORD PTR [rdx + 4*r8], ecx add     eax, eax pop     rcx ret 

This code has only two DWORD PTR accesses. It knows that A is a shared reference (so there are no other writers), and B is a mutable reference (so there are no other readers). That means it can conclude that A and B can't overlap. Once it's read A[i] from memory it doesn't have to read it again. Cool!

C (but not C++) has the restrict keyword for this. You can tell the C compiler "trust me, these don't overlap", but C doesn't check. Rust checks this at compile time.

So far I'm enjoying learning Rust. It has many of the things I wanted in a language since the mid-1990s. I don't know if I'll actually use it for a real project, but that's not my goal right now. My goal is to learn some new things that challenge my brain, and Rust is doing that for me.

Storium Theory: Get Emotionally Invested

I've finished up my Storium Basics articles, so now, I'd like to take a little time to write about one more thing. This is something that I think is important for anyone playing Storium, or indeed any sort of RPG or storytelling system. Heck, it's important for general writing as well.

You have to let yourself feel.

If you want to tell powerful stories, you have to let yourself feel.

If you want to truly portray your character, you have to let yourself feel.

If you just want to have the best time you can roleplaying, to have an experience you'll remember and look back on fondly, you have to let yourself feel.

Some people can do this really easily. Others, myself included, have a tougher time with it.

I have a tendency to get pretty mechanical when I'm writing, particularly in RPGs, storytelling games, or the like. I find that I distance myself from the events of the story, from the emotional impact of what goes on, in a way that I don't if I'm just watching a movie or reading a book or playing a video game. When I'm not participating in the writing, I can get involved in the emotion of a story easily. But when I'm participating...

When I'm participating, I spend more time thinking about what should happen next, or what I'm going to do, or what cards I'm going to play, or what my strategy should be for the next step, what abilities I want to use, how my tactics will affect my dice rolls...any or all of that, depending on what sort of writing or gaming we're talking about. It's really easy to distance myself from feeling what's happening in the story, and look at things as the basic exercise of writing or gaming rather than the full-fledged emotional experience of a tale.

There's a social aspect, too, though that's less of a concern in a play-by-post sort of game like Storium. But still...I'm not a guy who likes to have his emotions on full display. I'm not that open, really, and so I tend to consciously or unconsciously resist letting myself react to story events emotionally when I'm writing or playing with others.

I've learned that I have to try to break out of that shell.

The best moments I've had in Storium, in tabletop gaming, in online roleplaying, in MUXes, in any kind of collaborative writing experience...those moments have all been when I let my walls drop. Those are the moments I remember most fondly.

The moments when I let the tears come while I read and wrote.

The moments when I felt anger at the deeds of a villain.

The moments when I worried for a hero who had disappeared.

The moments when I dove into my character's mindset and felt the fear he would about the monster lurking in the dark.

It's so very easy to separate ourselves from the tale. Sometimes we do it because we'd be uncomfortable otherwise. In a horror game, for instance, we'll crack jokes or make table talk about the real world, reemphasizing the unreality of the horror. In the midst of a tragedy, we'll have our heroes stand bold and proud, brushing off the sorrow and just going on being heroes. We can't have them break, because someone might think we've broken too.

But I've learned that when I allow myself to feel, when I allow that fear or horror or sadness or pain or joy or hope or dream or love to affect me, and then allow it to affect my writing, I get an experience I can remember, and an experience others can remember as well.

I've learned that I can best write a character who has gone through struggles and pain when I let myself feel the sadness, just as I would if I weren't participating in the writing. I've learned to force myself to treat roleplaying and collaborative storytelling just like watching a movie or reading a book or playing a video game with a great tale - I've learned to drop my guard and let things hit me.

Because when I let things hit me, I let them hit my character, and when I let them hit my character, my character's reactions are more honest, more powerful, more raw and pure. It makes the character feel like a full-fledged person, with hopes and dreams and fears and pain, who is affected by the tale, driven by the tale, pushed to react and to experience emotion and to be changed by those experiences.

For me, it's hard. It's honestly hard. It's so easy to slip back into just thinking, "Well, what should happen next?" or "What card should I use here?" or "What tactic seems best?" or "What would be a cool thing to do?" or "What's my next one-liner?" And look - all of those questions can be, frequently are good things to ask. But not if they separate you from actually feeling. And for me, they can, unless I force myself to into the right mindset. For me, they can, unless I specifically connect myself with the heart of the tale.

This isn't something I can tell you how to do. Everybody's different. Everybody reacts to a story differently. For some of you, this isn't even something you'll have to think about. Some of you are reading this article and thinking, "Wow, I mean, I just get in my character's head and I feel this stuff anyway." And that's great! There are people who can just do that, who can just feel like a character, get in their head, think like they do, and feel like they do. It's something you hear about from great actors all the time, and it's something I've heard from great roleplayers as well.

But if you're like me, and you find yourself thinking clinically about stories, thinking about plot designs, thinking about cards or dice or what-have-you, thinking about character motivations from a distance...I can't tell you how to do it, but I encourage you to try to break that. Think like a reader, think like someone who is experiencing the tale. Don't think what your character should do, feel what your character will do.

If you're like me, that isn't going to be easy, and you aren't going to succeed all the time. But those moments where you do succeed? Those are going to be the moments you remember, the moments you deeply treasure, the moments you look back on years from now and relive in your mind.

When that happens...you see the true treasure that roleplaying, that collaborative storytelling, that writing in general can be. You leave a part of yourself in that story. You become a part of it, and it becomes a part of you. It is a beautiful, wonderful experience.

So...let yourself feel. Open yourself to that experience. Let the story in.




This will be the final weekly article of Storium Theory. I'm not going to say that I'm solidly done, that there will never be another article, but I've said just about everything I can think of to say at present. I've written one hundred and thirty-three articles about Storium, counting this one, and I've written about it since November 2015. That's...probably more than I've written about anything else in my life, ever. And that's not counting my participation in Storium Arc, where I've spent many hours talking about this great system and community as well.

It's amazing to me the level of depth that a system like Storium has turned out to have...the fact that I could find so much to write about it, the fact that I could write for such a long time on it and it alone...that honestly surprised me. When I started this out, I didn't initially set it up on my blog. I was just going to have four or five little articles on a webpage somewhere, just a quick little guide of sorts for new Storium players or narrators.

But Storium was deeper than that. Storium was more than that. Exploring Storium took longer, took more thought, became more interesting to me. I found myself exploring the ways the system could be used, the ways you could use challenges to do interesting things, and that got me thinking about how things could work in my own games or with my own characters, and those fed back into articles here.

Now...again, I can't say I'm done. I'm still playing Storium, and topics will still likely arise. But for now, this is the end of weekly articles, of regularly scheduled articles.

I hope that those of you who have read these have found them useful. I hope that I've helped you get more comfortable with the Storium system, and to learn to use it in creative ways, ways that can enhance your stories and lead to memorable and fun games. I hope that I've helped you get into your characters and explore them more deeply.

But now, as ever, I want to emphasize something: My way to play Storium is not the only way to play Storium. My way to write is not the only way to write. As I close up this post, and with it, the regular Storium Theory articles, I want to encourage you to look not just here, but to the community in general, to other Storium games, to other resources. If you need help, ask for it - the community is willing. If you need examples, look for them among the other games out there. See how things have worked. Explore. And come up with your own methods, your own interesting ways to use the system, your own house rules.

Storium is a simple system in concept, but a deep one at heart. Take the time to get to know it and it will reward you.

May the future bring you friendship, great stories, and treasured memories.

Friday, September 4, 2020

GTA 5 DOWNLOAD HIGHLY COMPRESED





Grand Theft Auto V is an action-adventure video game developed by Rockstar North and published by Rockstar Games. It was released in September 2013 


GAME HAS NO ANY PROBLEM  CHED IT BY Y.YADAV




                                                           ADVANCE THING TO DO


PLAESE ALSO DOWNLOD WINRAR NET FRAMWORK   AND PASSWORD FILE


                                                            REQIRMENT TO READ
  • Processor: Intel Core 2 Quad CPU Q6600 @ 2.40GHz (4 CPUs) / AMD Phenom 9850 Quad-Core Processor (4 CPUs) @ 2.5GHz.
  • Memory: 4GB.
  • Video Card: NVIDIA 9800 GT 1GB / AMD HD 4870 1GB (DX 10, 10.1, *11)
  • Sound Card: 100% DirectX 10 compatible.
  • HDD Space: 65GB.
  • DVD Drive.

                                                        

                              ALL DOWNLOAD PART ARE OF GTA 5

                          PLEASE DOWNLOAD PASSWORD 

   PLAESE ALSO DOWNLOD WINRAR NET FRAMWORK   
                                                       

           IF GAME WAS LAGING

CHECK THE VERYFY BIN IN YOUR GT5 FOLDER

AND SECOND YOU WANT TO OPEN GTA 5 MAIN FOLDER

AND COPY ALL FILE FROM MD5  FOLDER THEN PASTE

N GTA5 SHOTCUT FOLDER

OUR GAME START RUNNING                                          

                                      VISIT YOU TUBE



                                                            DOWNLOAD PASSWORD


                           
                                                           GTA 5 DOWNLOAD BUTTON
 ALL PART ARE 2 GB

DOWNLOAD PART 1

DOWNLOAD PART 2

DOWNLOAD PART 3

DOWNLOAD PART 4

DOWNLOAD PART 5

DOWNLOAD PART 6

DOWNLOAD PART 7

DOWNLOAD PART 8

DOWNLOAD PART 9

DOWNLOAD PART 10

DOWNLOAD PART 11

DOWNLOAD PART 12

DOWNLOAD PART 13

DOWNLOAD PART 14


DOWNLOAD PART 15





                                            

Monday, August 31, 2020

How To Hack Any Whatsapp Account In 2020

The article will also be broken down into different subtopics and subcategories. This to make it easy for those who are just interested in skimming through the article to pick the part of WhatsApp hack they are most interested in. Just incase you don't have enough time to go through the entire article.

Search queries like these are a common place; Can WhatsApp be hacked? Can you read WhatsApp messages? How safe is the most popular trade fair in the world? This article gives you all the solution you need to hack any WhatsApp account, as well as how to protect yourself from a WhatsApp hack attack.

Although the messenger is now on an end-to-end encryption, WhatsApp is still not totally safe from espionage. WhatsApp chats and messages can still be accessed and read remotely, and old &deleted WhatsApp chats and messages retrieved.

WhatsApp Spy: Hack WhatsApp Chats and Messages

A very simple solution is to use a software that can hack WhatsApp remotely. All manufacturers offer to read the WhatsApp messages an extra web portal. In addition to the Whatsapp messages but can also spy on other messengers. So you can also have access to social media accounts.

The software may only be installed on a smartphone. If the user of the smartphone has been informed about the installation and effects.

WhatsApp Hacker: 3 Steps to Hack WhatsApp in 2020

You can hack Whatsapp using a second cell phone. No extra SIM card is necessary for this. The guide also works with a tablet. With this method, the other phone only needs to clone WhatsApp messages is internet connection.

The trick to hack Whatsapp successfully is not a software bug. It's the way WhatsApp has developed the setup wizard. Since there are no user accounts with passwords and you log in via the mobile number, here lies the vulnerability. But you can also protect yourself from the Whatsapp hack.

Hack WhatsApp Chat with the Best WhatsApp Hacking Tool

To read Whatsapp messages, the mobile phone number of the target must be known. The cell phone can remain locked. There is no need to install software to hack and read Whatsapp messages. Even with the PIN or fingerprint, the Whatsapp account can be hacked.

STEP 1: Create a New WhatsApp Account

To hack an account from Whatsapp, the app from the App Store must be installed on the second cell phone. After the installation of Whatsapp, target's phone number is entered. A confirmation request must be waited until access to the smartphone of the victim exists.

STEP 2: WhatsApp Account Confirmation

The confirmation of the Whatsapp account is the actual security risk of the messenger. Whatsapp usually confirms the registration via SMS. Occasionally the confirmation will also be sent by automated phone call via a phone call.

Calls and text messages can be read and taken by anyone even when the screen is locked. So that the WhatsApp hack does not stand out, the SMS must be removed from the start screen by swiping.

STEP 3: Enter Confirmation

The stolen verification PIN is now entered on the second smartphone. As a result, the WhatsApp account has been taken over by you. You can read the WhatsApp messages, which respond to this mobile phone number.

The downside to this trick is that the victim immediately notices the Whatsapp hack as soon as Whatsapp is opened. If the victim goes through the sign-in process again. The attacker loses access to the messages and no Whatsapp messages can be read.

How to Hack Someone's WhatsApp in 2020

A good way to hack a WhatsApp account is to hack whatsapp online. Here you can read WhatsApp messages via a browser and also write. The target user can continue to use his cell phone (works for iOS, Android phone etc) and does not notice the WhatsApp hack.

STEP 1: Access the Cell Phone

In order to be able to read WhatsApp messages by installing software. Access to the unlocked smartphone is required for a short time. In addition, cell phone, a computer or laptop is necessary. On this the Whatsapp messages will be read later.

STEP 2: Access WhatsApp Web

If you have access to the unlocked smartphone, Whatsapp must be started there. The Whatsapp settings include Whatsapp Web . If this is selected, Whatsapp opens a QR code scanner with the hint to open WhatsApp Web in the browser.

If the QR code is scanned in the browser with the smartphone. There is a permanent connection and Whatsapp messages can be read. If you want to hack Whatsapp in this way. You have full access to all incoming messages and you can even write messages yourself.

STEP 3: Read WhatsApp Messages

The target usually sees this Whatsapp hack only when the settings are invoked to Whatsapp Web in the app. Whatsapp messages can be read via the browser. Regardless of whether the smartphone is on home Wi-Fi or on the move. You can also hack group chats admin by just having any of the contact details.

WhatsApp Hack: How to Hack any WhatsApp account

Which is the most popular messaging app globally? Of course, you can use different apps from Android or iOS to send and receive messages. But Whatsapp remains everyone's favorite globally!

Whatsapp is one of the popular apps in the world. There are more than 2 billion active users on Whatsapp, messaging daily with the app. Why do people love WhatsApp? Whatsapp is very convenient and easy to use.

Other messaging apps like Facebook Messenger, still needs a special account to sign up for this app. If you change a new app, you'll need to add another account. This can be stressful, as you have to remember a lot of new passwords and usernames.

HACKER NT

More articles


Sunday, August 30, 2020

Airba.sh - A POSIX-compliant, Fully Automated WPA PSK Handshake Capture Script Aimed At Penetration Testing



Airbash is a POSIX-compliant, fully automated WPA PSK handshake capture script aimed at penetration testing. It is compatible with Bash and Android Shell (tested on Kali Linux and Cyanogenmod 10.2) and uses aircrack-ng to scan for clients that are currently connected to access points (AP). Those clients are then deauthenticated in order to capture the handshake when attempting to reconnect to the AP. Verification of a captured handshake is done using aircrack-ng. If one or more handshakes are captured, they are entered into an SQLite3 database, along with the time of capture and current GPS data (if properly configured).
After capture, the database can be tested for vulnerable router models using crackdefault.sh. It will search for entries that match the implemented modules, which currently include algorithms to compute default keys for Speedport 500-700 series, Thomson/SpeedTouch and UPC 7 digits (UPC1234567) routers.

Requirements
WiFi interface in monitor mode aircrack-ng SQLite3 openssl for compilation of modules (optional) wlanhc2hcx from hcxtools
In order to log GPS coordinates of handshakes, configure your coordinate logging software to log to .loc/*.txt (the filename can be chosen as desired). Airbash will always use the output of cat "$path$loc"*.txt 2>/dev/null | awk 'NR==0; END{print}', which equals to reading all .txt files in .loc/ and picking the second line. The reason for this way of implementation is the functionality of GPSLogger, which was used on the development device.

Calculating default keys
After capturing a new handshake, the database can be queried for vulnerable router models. If a module applies, the default keys for this router series are calculated and used as input for aircrack-ng to try and recover the passphrase.

Compiling Modules
The modules for calculating Thomson/SpeedTouch and UPC1234567 (7 random digits) default keys are included in src/
Credits for the code go to the authors Kevin Devine and [peter@haxx.in].
On Linux:
gcc -fomit-frame-pointer -O3 -funroll-all-loops -o modules/st modules/stkeys.c -lcrypto
gcc -O2 -o modules/upckeys modules/upc_keys.c -lcrypto
If on Android, you may need to copy the binaries to /system/xbin/ or to another directory where binary execution is allowed.

Usage
Running install.sh will create the database, prepare the folder structure and create shortlinks to both scripts which can be moved to a directory that is on $PATH to allow execution from any location.
After installation, you may need to manually adjust INTERFACE on line 46 in airba.sh. This will later be determined automatically, but for now the default is set to wlan0, to allow out of the box compatibility with bcmon on Android.
./airba.sh starts the script, automatically scanning and attacking targets that are not found in the database. ./crackdefault.sh attempts to break known default key algorithms.
To view the database contents, run sqlite3 .db.sqlite3 "SELECT * FROM hs" in the main directory.

Update (Linux only ... for now):
Airbash can be updated by executing update.sh. This will clone the master branch into /tmp/ and overwrite the local files.

Output
_n: number of access points found
__c/m: represents client number and maximum number of clients found, respectively
-: access point is blacklisted
x: access point already in database
?: access point out of range (not visible to airodump anymore)

The Database
The database contains a table called hs with seven columns.
id: incrementing counter of table entries
lat and lon: GPS coordinates of the handshake (if available)
bssid: MAC address of the access point
essid: Name identifier
psk: WPA Passphrase, if known
prcsd: Flag that gets set by crackdefault.sh to prevent duplicate calculation of default keys if a custom passphrase was used.
Currently, the SQLite3 database is not password-protected.


Related posts