Search:
Type: Posts; User: fiend; Keyword(s):
Search:
Search took 0.02 seconds.
-
February 9th, 2003, 10:08 AM
hmmm.
If you're using a dial-up modem, you can view your IP by clicking the connection icon in systray and selecting 'details'. Its easier as you can copy-paste your information.
-
June 20th, 2002, 11:27 AM
OK everyone, it'd seem that he doesn't just have a script problem... Yahoo? As in the Instant Messenger? Everyone knows that most IMs online are riddled with security holes and flaws, so maybe...
-
June 20th, 2002, 10:57 AM
one more thing... please, no more threads with PRIEST PORN in the title... please?
-
June 19th, 2002, 10:24 AM
I believe you would be talking about wurms or virii; trojans aren't capable of working like that.
-
June 19th, 2002, 10:22 AM
-
June 19th, 2002, 10:17 AM
err... It would be fairly easy to simply rename the file, thus negating the process name you code into the program
-
June 19th, 2002, 10:12 AM
Other than the above, the only other obvious answer is brute force... Such as lophts software or brutus...
-
June 18th, 2002, 09:09 AM
No, that doesn't sound terribly secure, does it?
But then, he may not have implemented it yet; he could just be testing the login at this point...
-
June 16th, 2002, 11:01 AM
My suggestion is to emulate the VB/C version: set the screensaver flags to ON, so that the computer thinks the screensaver is on when it actually isn't, hence locking CTL+ALT+DEL, ALT+TAB and WIN(or...
-
June 16th, 2002, 10:51 AM
...what?
do you mean that the liwrml directory won't delete?
-
June 15th, 2002, 12:45 PM
-
June 15th, 2002, 12:41 PM
Okay, now I've got something specific...
Anyone know how to move an image control across a form without the image flickering?
-
June 14th, 2002, 10:48 AM
Can someoene post this netstat? Hopefully it'll work with win2k...
-
June 12th, 2002, 12:14 PM
*just to clarify, do you mean that the first program has a command line or whatever to run the second? If so, the first program was designed to mask the second. It could have just set the...
-
June 12th, 2002, 07:28 AM
Learn to explain yourself more clearly.
Try "ping -a".
I'd doubt that he's faked his host name just so he can msg you, but as I've posted somewhere on one of these boards, I've made an anonymous...
-
June 11th, 2002, 12:13 PM
Hmm... Just a quick note.
Firstly, you should probably learn one language at a time.
Secondly, it is highly unlikely that any of you are going to learn a programming language in one summer unless...
-
June 11th, 2002, 09:05 AM
*Windows can use REXEC, RSH and RCD as well... sorry, forgot about that.
-
June 10th, 2002, 12:52 PM
Just by experience, trojans aren't terribly hard to make. If he's got any programming knowledge, he probably could have built his own trojan that does that for LINUX and another for Win(Whatever)....
-
June 10th, 2002, 12:37 PM
hmmm...
Just as soon as you think the thread's dead...
hahaha.
No, I'm not looking for anything specific, just ideas and examples of security software in VB. Generally I'm trying to...
-
www.antioffline.com is good even if its not often updated... plus check out their antionline spoof.
-
bah f*k you stress
VB is MUCH better than delphi... delphi is absolutely useless
-
heh heh...
I believe its a matter of taste. Of course C is the most powerful of the above mentioned, but Java is most easily implemented on the internet and across various platforms. I'm a VB...
-
Stick w/ win2000. Its cheaper and chews up less memory than XP. It doesn't have compatability mode, but I haven't had any compatibility problems with it.
-
I think that's too much TV for you.
-
I made a "masked-sender" net-send program.. have fun...
|
|