Search the Community

Showing results for tags 'hacking'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Navigating and Using MLP Forums
  • Site Problems & Questions
    • Subscriptions & Donations
  • Moderation and Rules
  • Roleplay World
    • Equestrian Empire
    • Everfree Empire


  • Approved Characters
    • Approved Cast Characters


  • Regular Banner Submissions
  • Contest Banner Submissions


  • Fanfiction Requests
  • Pony Fanfiction
  • Non Pony Fic Recordings


  • Canon Characters
  • Original Characters


  • Pony World Cup
  • Forum Events
  • Episodes
  • Making Christmas Merrier
  • Golden Oaks Library Readings
  • BronyCon


There are no results to display.

There are no results to display.


  • My Little Pony
    • Welcome Plaza
    • FiM Show Discussion
    • Sugarcube Corner
    • Equestria Girls
    • My Little Pony: The Movie
    • Classic Generations
    • Pony Life
  • Events
    • Forum Events
    • Making Christmas Merrier
    • Golden Oaks Library
  • Roleplay World
    • Everfree Planning, OOC & Discussion
    • Everfree Roleplays
    • The Archives
  • Octavia's Hall
    • Commissions
    • Requestria
    • Octavia’s University of the Arts
    • Canterlot Gallery
  • Beyond Equestria
    • General Discussion
    • Media Discussion
    • Forum Games
    • Ask a Pony
    • Forum Lounge
  • Canterlot
    • Throne Room
    • Feedback
    • Site Questions & Technical Support
  • Poniverse
    • Canterlot Avenue
    • PoniArcade
    • Ponyville Live!
    • Gallery of Goodwill
  • Conventions

Product Groups

  • Subscriptions
  • Commissions
    • Valtasar's Digital Art Commissions
    • Midnight's Commission Shop
    • Ariida-chi's Commissions
    • Ambergerr's Art Shop
    • Ody's Commissions
    • SonicPegasus Commissions
    • Berry-Bliss Commissions Store
    • Unicornia Workshop
    • Usager
    • PoisonClaw's Traditional Commissions
    • Alex Vepra's Commission Shop
    • Lucha
    • Nihi The Brony's Commission shop
  • Hosting
  • Commissions Closed
  • Test

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



Website URL

Discord Username

Discord Server








Steam ID


Personal Motto



How did you find us?

Best Pony

Best Princess

Best Mane Character

Best CMC

Best Secondary/Recurring Character

Best Episode

Best Song

Best Season

Hearth's Warming Helper

Fandoms Involved In

Found 6 results

  1. Yes I do and it keep saying warning your computer is under attack please call whatever phone number they said. Also things keep popping up on my computer saying you are banned from doing anything on this computer, and it wouldn't let me exit the screen or do anything on the computer. One time my sister was playing on the computer and the whole screen just went blue. What do you have to say about this?
  2. I've just found this ZOMGmazing video on YouTube: Someone has made a ponified version of this great classic game "The Sims"! Unfortunately, this video is not an actual game :-/ They just put those animations there, mixed with the images captured from "The Sims", to make it look like an actual game. How sad, I was so happy to see it and I just wanted to play it right away! ;-) It would be my two favorite things mixed together in one place: "The Sims" and ponies. BUT! I couldn't get rid of this idea off of my mind, it returned to me over and over, and then I realized that making such a ponified version of "The Sims" is actually possible! :-D Once in the past I used my hacking skills to figure out where "The Sims" keeps the skin textures in its game data directory and analyzed these files with my hex editor, and then I figured out that those textures are being kept in some .iff files, as just plain BMP bitmaps. So I could swap them with my custom bitmaps to make them appear in the game. I could make tattoos, different clothing mods, and even a R34 mod by swapping the swim suit textures into some naked bodies ;-J But time went on, and several software tools appeared for modding "The Sims". There are programs like Transmogrifier, which allow to export data from .iff files or swap them with some other textures, for example. For the pony mod I'm talking about, something more would be needed though: it requires swapping the 3D meshes, bone systems and animation tracks with pony versions. This is a bit harder, but still not impossible! I've found a website which documents all "The Sims"'s game data file formats and structures. Any skilled hacker/programmer can possibly make use of this info; especially that there's a programming library created to manipulate those files too! :-> I've also found this exhaustive list of software tools created to make modifications to "The Sims". They allow to modify data structures, objects' properties, string descriptions, icons, pie menus, game objects, textures etc. I've seen there some items about editing the animation data too. So I think the whole toolbox is already there, and making such a mod for "The Sims" is possible. But of course this would need people (or ponies). I'm a skilled programmer, but not-so-skilled 3D modeller (well, I can model simple stuff, but ponies are not so simple for me) nor texture maker (I can do 2D graphics & draw ponies though, so it's not so bad). But my worst nightmare is the constant lack of time. So any help will be very welcome. Anyone interested in trying to make this "The Sims" pony mod a real thing? I saw in some threads on this forum some interest in "The Sims"-"MLP:FiM" cross-over. So I think it would definitely be worth doing. Whadd'ya think? ;-) Any volunteers? :->
  3. By golly, it's another story about computers! Gee whiz, I feel like I did an intro like this before. . . huh. Ah well, this story is a bit more entertaining and jammed packed with suspense! (Nah, probably not.) Oh, and if you didn't understand the second half of that title, here's a translation, "In Real Life Oh My Gosh Wut The Fack Laugh Out Loud". Damn, am I the only one who remembers what "Lol" stands for? Now I really feel old. . . Anyway, on to the REAL intro! Inspired by historical events and characters. This work of fiction was designed, developed, and produced by a multicultural team of various religious faiths and beliefs. Visit help and tips Quoting a famous intro / speech? Very original, RePub. Well, what do you expect? We're running out of ideas and. . . you know what? And that, my friends, is what we call, "a bigger budget". Yeah, we're turning out like El Smosh. Pretty soon these blog entries are going to be translated into Dovahkiin (Elder Scrolls: Skyrim). But I digress, you're here for the story, not the random hilarity. (Unless you are here for that in which I really need to rework my formula.) Well, as many of you probably didn't know. Over the weekend, Bethesda had a big sale for their Fallout series, and being the classical fanatic I am, I decided to buy the entire Classic Collection for a grand total of 10 bucks. Not bad, eh? If you can recall, and I'm pretty sure I've mentioned at least twice a post, I still don't have a computer. What's taking so long? I'm broke, mkay? The only computer I have, if you can recall (again), is the "Brick" which does, in fact, have the capabilities of running Fallout Classic. Now I just had to acquire internet connection. . . Now, the time was about three in the morning, very convenient when you had to download a good 2 GBs of Fallout goodness (1, 2, and Tactics). Please, that wasn't going to get in my way! So what did I do? I geared up and did a montage by grabbing a hat, hoodie, long black pants, socks, a face mask, and a backpack stuffed with, the Brick, a LAN Cable, charger, and my cell-phone. Why I did it is still beyond me, but in the end, I was glad I packed dark. Y'know, I've been playing a lot of video games lately. I'm not ashamed of it, but after a good. . . 200 hours? It really gets in your head. Oh, and I mastered the "crouch-walking". So, I think that'll explain a bit more. Anyway, here I am, dressed head to toe in the silliest get-up while crouch-walking throughout my house as if I'm avoiding alarms. Eventually, after 20 minutes, I crawled myself up a different flight of stairs to where our internet router is kept and I plugged in my laptop. The booting alone took long enough, not to mention Steam's part in all of it. The entire process took forever and I was growing restless. Back and forth, I paced around the room, sweating and regretting my entire life, when all of a sudden, I start hearing footsteps. Now, I thought it was just my computer fan for a while, so I ignored it and continued my contemplation. At least, until I heard the wooden stairs grumble under the feet of my trampling mother. At that point, I was wrapping myself around the Brick, begging for it to complete the download; me mum was right outside the door, peeking in. I didn't move a muscle and, thankfully, she didn't dare turn on the lights. After what seemed like hours, she left the room and returned to her bedroom, leaving me in a heaping pile of sweaty rags. Fallout Classic is a great game! Would recommend. -RealityPublishing
  4. So recently, I was playing Lego Batman 2 and I thought about Mare-Do-Well. I realized she's basically a mixture of Batman and Darkwing Duck. I got curious and decided to see if there were any Mare-Do-Well games. To my surprise, there aren't. I was thinking of a Mare-Do-Well game being a rom hack of Batman for NES. Either this, or someone can make a built-from-scratch game of Mare-Do-Well, and make it feel like a Batman game. I'd do this myself, but I don't know how to hack roms and I'm still learning how to use Game Maker.*I do not own these pictures, I simply found them on Google/deviantART*
  5. Well, some folks in the past have asked me, what is my career and what does it involve and there are some who have taken it as a joke, so instead, I'm gonna teach all of you a bit of IT/Network Security 101. There are some parts I've taken from other forums, wiki, etc. yet I will also include my thoughts as well. Now one thing I want to mention to all of it or not, there are a lot of Sons of Bitches out there who would do such cruel things, especially on the internet, so want to provide some of my knowledge to you as a "safety" measure or members who wish to pursue a career in IT, this will highly assist you. In addition, there are several type of IT security categories, but I will explain the common one, and what are its functions. What is Network Security? As a professional Network Administrator, specialized in Network Security, it involves the authorization of access to data in a network. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company (This is what I primarily did at my job, by managing them, specifically private forums), and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password. What Are Its Concepts? Now, I don't think many will understand some of the terms (yes there are some funny ones, lol), but network security starts with authenticating, commonly with a username and a password. Once authenticated, a firewall enforces access policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as: Worms Viruses Trojans being transmitted over the network. Anti-virus software or an intrusion prevention system (IPS) help detect and inhibit the action of such malware. An anomaly-based intrusion detection system may also monitor the network like wireshark traffic and may be logged for audit purposes and for later high-level analysis. With communication between two hosts using a network may be encrypted to maintain privacy. Honeypots, essentially decoy network-accessible resources, may be deployed in a network as surveillance and early-warning tools, as the honeypots are not normally accessed for legitimate purposes. Techniques used by the attackers that attempt to compromise these decoy resources are studied during and after an attack to keep an eye on new exploitation techniques. Such analysis may be used to further tighten security of the actual network being protected by the honeypot. A honeypot can also direct an attacker's attention away from legitimate servers. A honeypot encourages attackers to spend their time and energy on the decoy server while distracting their attention from the data on the real server. Similar to a honeypot, a honeynet is a network set up with intentional vulnerabilities. Its purpose is also to invite attacks so that the attacker ’ s methods can be studied and that information can be used to increase network security. A honeynet typically contains one or more honeypots. Types of Security? There are several, but I will explain Security Management (which is common). With Security Management, there are two types of securities. The first one, is a home or small office, which may only require basic security (what you guys have in your home, is an example). The second, is a more complex one which is heavily monitored in large businesses that may require high-maintenance and advanced software and hardware to prevent malicious attacks from hacking and spamming. You'll see that in Hospitals, Banks, Companies, etc. (Federal Offices are a little different and they have specific type of security). What Are Attacks? Let me hint you guys on a important thing, and I think many already know this. NOTHING IS PRIVATE. Networks are subject to attacks from malicious sources. However, there are two categories: Passive - when a network intruder intercepts data traveling through the network Active - in which an intruder initiates commands to disrupt the network's normal operation. Now, to give you an example of attacks from each category, this will serve as somewhat of an easy guide, making it easier for you to identify a problem. HINT: Some individuals can see it faster than others, by the level of activity. Passive: ---NETWORK Wiretapping Port Scanner Idle Scan Active: Denial-of-service attack (Yes, very common for websites, and yes, you have seen them here) Spoofing Man in the middle ARP poisoning Smurf attack Buffer overflow Brute-Force Password Cracking Packet Sniffer Heap overflow Format string attack Rootkit SQL injection Cyber attack Social Engineering (The most trickiest one in the book, and are split into 4 categories) Our Defense: Beside Network Security, everyone has this to prevent attacks such as ones listed above. The following defenses are: Access Control Systems Application securityAntivirus software Secure coding Security by design Secure operating systems AuthenticationTwo-factor authentication Multi-factor authentication Authorization Firewall (computing) Intrusion detection system Intrusion prevention system With these Defenses, it ensures safety within your walls, and thus prevents future attacks. Unguarded and unwatched, these attacks can occur again and again. Following these steps could assist you in preventing problems, on pretty much anything you have........whether its a home PC, network, website, forum, whatever......... This is pretty much what I can explain, however, there is a lot on Computer Security, but if members are interested in pursuing a career involving that sort of specialty, be prepared, b/c you'll be doing a lot of studying and hands on work. In addition, if you wish to contact me on a specific subject I didn't mention, please feel free to comment and I could give you a possible explanation (hint: even though i've done moderation for 6 years, and Security for 4 years, be aware that I may not have all the answers, which i may end up researching them). Hope you enjoy reading this, UPDATE: Had to Add some info on the Types of Attacks...........Expect a detail of each one later, for better understand of them.
  6. I'm crying now, because of our school. I personally believe, that if it is on a computer, no matter how hard it may be, or how bad you need to get, there is always a way to do specific things when it comes to hacking (good or bad). Our school is WAY over protective with blocking stuff on the computers. I don't think they actually tried (cuz they got a new system and it's all messed up) but it's so bad, you aren't even allowed to change the volume on the computer without the administrator password. Well I have a friend who uses CMD, and has a past with it. I got curious, and looked into it, and loved it. I've been in it for really only a few weeks, but I learned quite a bit by self-taught, and tutorials off of YouTube and stuff. Well what I wanted to do, was set my name in the domain as an administrator just so I could at least change my volume. I have no intention for using the power for bad. But problem is, I can't get to this point. I have tried countless amount of tricks to get a CMD that runs as an administrator, but all attempts end in error 5-access denied. But I haven't given up. I still believe there has to be SOMETHING out there that can be done. I've looked at ways around error 5, and all are blocked. I got really close at times, but right before it opens, a pop up wanting admin password came up. So now I am desperate, and this has become a thing of me just wanting to beat this challenge. I don't want to loose at this! So does anybody have any ideas of things that can be done. Preferably things that don't leave a mark (meaning there won't be evidence left to get busted). I do have access to a teacher computer actually, but I'm not sure if that matters. I haven't tried. I'm just so desperate, I'm almost willing to do anything, in a way where I can get away with it. Obviously that still has to apply. Any idea on what could help? And it might actually have to be deep, because it has to be something they haven't thought of already.