I cannot be held responsible for the lack of intelligence in the following sentence.
chsh is a ****tard.
Printable View
I cannot be held responsible for the lack of intelligence in the following sentence.
chsh is a ****tard.
Now, I have no real interest in the flaming between chsh and tiger shark. But there is no way that a post such as el-half's deserves ap's of the green variety. It posted no useful content and just continued the flame war. People often bitch that most of this board is a popularity contest....thank you for proving them right.
I'd suggest if you're (you meaning anyone who reads this) gonna respond with anything negative in the future at least provide some relevant information to back you up. Flaming for flaming's sake is stupid, at least in a forum where people are trying to get useful information.
Ts, great information. Ive been reading a bit lately about TTL and TCP/IP and your summary really helped it make more sense.
Tiger Shark: Great tutorial, useful information (in my eye's) and an interesting topic for people who deal with Networking as well as Information Security (such as myself :)). Greenies for you my friend.
Oh bloody hell.......
I'm still reading last nights epistle.
I'm calling nihil to stop him giving you whatever it is that keeps HIM up ( OOh Errr)
I did a crash course in IT, and they covered TCP/IP pretty good for the time allowed,
and then I read this.
Dear Tiger: please restrain yourself to one a week please, as the old eyes don't work quite as well as they used to.
Gotta love the hypocrisy. :rolleyes:Quote:
Originally posted here by Negative
Neggy impatiently waits for chsh's impressive, related-to-this-forum, over-our-head tutorials...
Plenty.Quote:
I was giving Tiger Shark kudos.Quote:
It seems that you always spend more time trying to find something wrong with a thread/post than you do adding something of value to a thread/post.
Indeed.Quote:
But hey, we're all entitiled to our opinions... :rolleyes:
Actually, it was a somewhat inaccurate half-effort at best. You sort of mention things can be done without explaining how, nor do you explain the differences between implementations. That is neither here nor there, the point is it's not really security related.Quote:
Originally posted by Tiger Shark
Hmmm.... "TCP Flags: Their use and abuse" explained what the typical flags are for and how, with knowledge of the information returned can be, in part, used to footprint a system or in some cases deny it service.
Enumeration is not hacking. At any rate, you are admitting here it is an implementation specific issue.Quote:
"TTL and traceroute: The forgotten hack"..... Let's see, traceroute is an implementation, if you will, of the TTL in an IP packet that began life as a hack. It explains how and why it works and goes on to hint at the fact that the principle can be used to enumerate resources beind a firewall that doesn't allow ICMP Echo_Requests through to the internal devices but might allow ICMP Time_Exceeded packets out.
Neither tutorial discusses in any way how to improve the security of your systems. You discussed nothing in this tutorial of how to defeat such "hacks" (which are really just simplistic enumeration). IMO the line between security and other in this instance has something to do with whether there is any discussion on how to improve the security of your computer. This discusses nothing related to that, and therefore belongs in other IMO.Quote:
Both are undoubtedly security related. Maybe you don't understand the difference between "Security" and "Other".
Funny thing, Faqt wrote me directly via pm and cleared up the matter. This is irrelevant to the issue at hand.Quote:
While you are here I'll give you a little update from the last thread you tried to screw up with your pathetic "I'm so bloody superior" attitude. Faqt has progressed rather well in her quest. She has quite thoroughly enumerated the applicable resources on her network and has already received half her extra credits for managing to do so. Her midterms got a little in the way but I understand she is working again on the issue. She has done this all on her own with only conceptual suggestions and encouragement from me, (and maybe others), through PM's so as to avoid your unconstructive drivel.
Wow, and I thought TheSpecialist was an ass.
It is obvious my post was lame, but chsh's comment on Tiger Shark's article was exactly the same, only stated more fancy.Quote:
I'd suggest if you're (you meaning anyone who reads this) gonna respond with anything negative in the future at least provide some relevant information to back you up. Flaming for flaming's sake is stupid, at least in a forum where people are trying to get useful information.
The part of my post that you quoted was just as much for chsh as it was for you, mjk, and anyone else. It would appear that chsh has at least read it since his next post has more information to back up his opinions on the matter.
TS. i gotta say i really enjoy your writing style. you bring clarity to whatever it is your writing about. more! more!