mikegambino

Members
  • Content

    9
  • Joined

  • Last visited

    Never
  • Feedback

    0%

Community Reputation

0 Neutral
  1. lol. Were you not reading. I replaced the BASH with the C shell. Then proceeded to add a whois feature to the shell, because the version of the C-shell I was using(not sure which one, as it had been modified previously) did not have one... done asking questions?
  2. Errr, We changed the standard shell completely, as well as modified the version of the new shell we put in place of the BASH. And, every single operating system out there(just a generalization) was made for one purpose, to complete the tasks of the developer(s). So, there was nothing really wrong with it. We just wanted a cool distro that we could distribute to our friends. We wanted to make it, sort of a cross between fedora, and the backtrack series. We(I) also wrote a driver for my lexmark X5250, because there were none for linux. Although I couldn't use the lexmark all-in-one photo center, it still allowed me to print whatever I wanted.
  3. To be honest with you, I respect your opinion. I also respect that you called me out. I don't mind. It happens a lot. And as for being responsible enough to put someone elses safety before mine, I am not yet. That's why in 2 months, when my son(hopefully a son) is born(yeah, I know, bad mistake at 15. but I didn't do it on purpose), I won't be taking care of him. At least not by myself. In fact, probably very little, for a while.
  4. Me and 6 other people yes. We completely overhauled Fedora Core 9. All I had to do was modify the C-shell. Which you may or may not have ever heard of the C shell. It's just a shell like Bourne and Bourne-Again(BASH). Which btw, is not exactly easy. Also, when you have identified, exploited, and then solved problems in high-level web applications, you can talk shit.
  5. Certified information Security Specialist, is different from the CISSP certification. To be come a Certified Information Security Specialist, all you have to do is obtain an information security related certification. If I had the CISSP certification I would have said so, in this manner, "I have the CISSP certification from [vendor]"(comptia I think.) And as for script kiddie, lemme know when you've written your own OS, malware, AV. k, smartass?
  6. I was just wondering who was living near me. I live about 50 minutes south-southwest of pittsburgh, in Monongahela.
  7. Are there any skydivers on here that live in the Pittsburgh area?
  8. lol. Well, sure I guess I might have to find Korbin. And, my Mom, couldn't care less. And my dad, well, he was in the 501st Parachute Infantry Regiment. He's only done static line. But he would like to go skydiving as well.
  9. Ummm, introduction I guess. Well, I'm 15. Pretty cool I guess. Certified Information Security Specialist. I Specialize in web-application security. Some call me a hacker. But I'm not, at least not a malicious one. I prefer pay rather than public recognition for my work. Anyways, moving on. I've never been skydiving. As a matter of fact, I've been told by law your not allowed to go skydiving before you're 16(not sure if its actually true). But I enjoy aviation. I just seek thrills, thats why I'm here.