- Joined
- Jun 12, 2015
- Messages
- 7,695
- Points
- 113
Ok, that is good news for us here.
Somehow, mine and H2Oxides avatars managed to get switched the other day.
Somehow, mine and H2Oxides avatars managed to get switched the other day.
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
HaHaHa!! how did I miss your "Picnic Basket":crackup:No, I've had that happen to me in the past. It wasn't tom, you can't really "hack" the forums like that.
http://laserpointerforums.com/f66/el-wire-amazing-unique-light-source-97733.html
Post #6
It's happened outside of the forums to me with tinypic as well but only once. Looks like occasionally it can mix up one of the millions of images with yours.
So the other person does exist, did receive my 561, and is not interested in a package exchange. This is infuriating, because I may be permanently unable to acquire a 561 now.
If you have a 561 and are even potentially interested in selling it, please PM me. I will pay your price.
That's beyond messed up. And how did this tomfire dude actually manage to mix up the shipping info for the packages? You'd think he would pay attention if he was shipping lasers worth >$500. Is the other party a member here?So the other person does exist, did receive my 561, and is not interested in a package exchange. This is infuriating, because I may be permanently unable to acquire a 561 now.
If you have a 561 and are even potentially interested in selling it, please PM me. I will pay your price.
Honestly this whole thing makes no sense. Why would he send you the wrong laser knowing that you wouldn't pay him until you were satisfied? Not really sure what kind of scammer would do that. Certainly not a competent scammer..
Heck: Maybe CrazyJay really was robbed, got it all back via an insurance claim, and the 589 the OP got was stolen . CrazyJay was based in Australia, along with some other guy TonyT or something? o.0 lots of coincidences going on here and I don't like coincidences...
So wait! Does this mean that Isaac Clark really did have some inside guy(i think that's the term he used) That got him a 561.
Af for 561 I may know someone that had one Ill ping him and see if he will Chime in.
By the way, anyone can hack anyones password here. All passwords in a factory SQL type board will be stored into a SQL database, unless they're a pretty skilled hacker to penetrate the SQL database and make a copy of it; then decrypt the method used to store the passwords into the SQL data they would have every password here.
Also, to edit the forums via a "Hack" would be simple via a SQL injection, or to take another super-user's account login.
It's all possible, just watch your-self; never use same password twice but always something you can remember.
They'd have to have the database address and port, which are probably not forwarded and walled off by a firewall. It's also near impossible to decrypt a properly hashed and salted password.
IF the database is properly hashed and salted, you mean... sure it is difficult to decrypt without some decent CPU power but possible.
Also, the database information is going to be available server side; because the forum always has a connection to the database. All a hacker needs is to perform a SQL Injection type hack and get super-user access to the forum, this would give them access to the database and such. This isn't something an ever-day coder could or would do;
Just saying; It IS possible. There are many vulnerabilities out there in code.
Hope you get it all figured out Sta!
No web admin would put database info available to public eyes, they'd most likely have the config files behind some permissions.
The forum doesn't always have a connection either, only when someone is hitting a PHP script. The vulnerabilities are very slim. Sure it's possible, but it's extremely difficult and probably wouldn't even be worth it.
Even with massive CPU power, I don't think you could decrypt it. You'd need to brute force the frontend. It's basically impossible to decrypt salted hashes.
Sorry to de-rail the thread.