Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: droby10; Keyword(s):

Page 1 of 7 1 2 3 4

Search: Search took 0.01 seconds.

  1. Replies
    20
    Views
    1,621

    no offense, sdk, but given that you're the only...

    no offense, sdk, but given that you're the only one familiar with the objectives of the host/environment - and haven't even mentioned what software applications the users will be running...expecting...
  2. Thread: Security Cert

    by droby10
    Replies
    18
    Views
    1,329

    me thinks you are misinterpretting the wording of...

    me thinks you are misinterpretting the wording of "an elective credit" for meaning "scott-free". essentially, by having those certs, you get to skip the P.E class if you want. but you're still...
  3. Replies
    7
    Views
    854

    there are a couple of theoretical approaches at a...

    there are a couple of theoretical approaches at a network level, but neither of them are going to yield any form of success in practice. you could do this via multilayered tunneling (which has...
  4. Replies
    25
    Views
    14,290

    they're in the ntds.dit, there are also a number...

    they're in the ntds.dit, there are also a number of internlized ways to provide redundant access to passwords. although some form of discretion must be accounted for.
    ...
  5. Replies
    7
    Views
    1,031

    i'll try to simplify the clarity of pointers. ...

    i'll try to simplify the clarity of pointers.

    when you declare a pointer

    char *p;

    the pointer declaration(*) should be assumed to be a part of the type specification.

    so after...
  6. Replies
    19
    Views
    3,170

    the guys hosting your site should have acted...

    the guys hosting your site should have acted quicker...i'd notify them that anyone logging into anywhere in that network segment between now and the time stated above needs to change their password...
  7. Replies
    19
    Views
    3,170

    sorry for the delay...been away. yes, i was...

    sorry for the delay...been away.

    yes, i was saying not to delete it for two reasons both relating to maintaining the state of the system. 1) the timestamp as noted and 2) the contents of the...
  8. Thread: Error Msg Help

    by droby10
    Replies
    5
    Views
    576

    something is attempting to register a com...

    something is attempting to register a com server....when it pops up, leave it open and take a look at the process/application list for anything suspect. it could just be a faulty software...
  9. Replies
    19
    Views
    3,170

    pull the plug - you've found the evidence, now...

    pull the plug - you've found the evidence, now you need to analyze without interruption. look at time stamps for the entire system based on the ctime of the setuid cgi script. were the web logs...
  10. Thread: AO club rulez

    by droby10
    Replies
    20
    Views
    2,103

    i am jacks aching diaphragm from laughing so hard.

    i am jacks aching diaphragm from laughing so hard.
  11. you could do this...but the real issue is...

    you could do this...but the real issue is shellcode not extended or embedded sql commands.
  12. Replies
    8
    Views
    1,235

    anonymous neg: it's always nice to see...

    anonymous neg:


    it's always nice to see creativity within a poor case of comprehensive reading skills...if i was "whining", there would have been a 'why'. i made a simple statement; actually i...
  13. Replies
    11
    Views
    2,189

    i understand and support your point, but the...

    i understand and support your point, but the absoluteness of it can be argued.

    for instance, cryptoanalysis is often done prior to developing a new cypher to guard against weaknesses in any...
  14. Thread: Private IPs

    by droby10
    Replies
    21
    Views
    1,764

    a default routing setup will route regardless of...

    a default routing setup will route regardless of network and host address; the rfc indicates that the reserved blocks _should_ not be routed in public networks; and are in most cases implemented as...
  15. Replies
    9
    Views
    806

    a modem...? well, then i wouldn't be as...

    a modem...?

    well, then i wouldn't be as concerned as previously illustrated as you don't have a ethernet interface (ppp) or it's virtual (some implementations of pppoe).
  16. Replies
    9
    Views
    806

    hmmm.... theoretically, if the attacking...

    hmmm....

    theoretically, if the attacking computer is local on the network, i could see how it might be possible to point you at a different dns, gateway, etc. such that you'd be on one end of a...
  17. Thread: Byte Patches

    by droby10
    Replies
    2
    Views
    463

    consider the logical structure of an assembled...

    consider the logical structure of an assembled program, where offsets are used for execution flow. in the following simplistic example, such a 4 bit change can be seen.



    0x80483d0 <main>: ...
  18. Replies
    12
    Views
    805

    what...like a large group of people at ao, who...

    what...like a large group of people at ao, who are supposedly "security-conscience" are the first to plug their ears, gag their neighbors, and blind-fold their children when anything controversial...
  19. Replies
    12
    Views
    805

    more than likely it's done through the detection...

    more than likely it's done through the detection of whether or not the test browser is the active window (which is accomplishable in javascript, no extra perms or controls needed).

    here's an easy...
  20. Replies
    7
    Views
    526

    there is a duality in aspect with certifications...

    there is a duality in aspect with certifications and jobs. i think everyone is aware that certifications don't really mean anything with regard to performance levels. granted it is a token of...
  21. Replies
    1
    Views
    550

    the use of commenting features is database...

    the use of commenting features is database dependent (which you didn't list). my guess, is that you are using access - which doesn't provide this functionality.

    but i've also experienced similar...
  22. Replies
    8
    Views
    1,235

    hey, since all the heavy hitters are giving out...

    hey, since all the heavy hitters are giving out greens....i could use a bigger buffer for those times where i play devils advocate and get slammed for it.

    or you can neg me for trying...but you...
  23. Replies
    9
    Views
    915

    the distinction between this guy's actions and...

    the distinction between this guy's actions and those who do "good hacking" is obvious, isn't it? "good hacking" does exist, is valued, and even pays well. had max stayed on the straight and narrow,...
  24. Replies
    2
    Views
    1,267

    spoofing in a nutshell

    i've posted another one of my older tutorials on my site. again, leaving it there so that i can make modifications/edits as needed and the formatting abilities. this reproduction was in response to...
  25. Thread: Books

    by droby10
    Replies
    7
    Views
    610

    along with the above suggestion for tcp/ip...

    along with the above suggestion for tcp/ip illustrated (these top my list).


    Title: Applied Cryptography, 2nd ed.
    Author: Bruce Schneier
    Publisher: John Wiley & Sons
    ISBN: 0-471-11709-9
    ...
Results 1 to 25 of 165
Page 1 of 7 1 2 3 4