Search:

Type: Posts; User: warl0ck7; Keyword(s):

Page 1 of 8 1 2 3 4

Search: Search took 0.04 seconds.

  1. Replies
    10
    Views
    11,370

    Google has acknowledged the flaw and will be...

    Google has acknowledged the flaw and will be working to correct it.



    http://rxlabs.blogspot.com/2006/04/googles-response.html

    Seniors please stop being so c*cky and arrogant.
  2. Replies
    4
    Views
    7,582

    Very poor and irresponsible behaviour zeroknock,...

    Very poor and irresponsible behaviour zeroknock, you rightly said
    ."there is'nt a parch for ignorance" so, stop being ignorant
    (god damn what did i tell you to do!!!).
  3. Replies
    5
    Views
    13,740

    If you wish to be very creative try out scapy. ...

    If you wish to be very creative try out scapy.

    http://www.secdev.org/projects/scapy/
  4. Replies
    1
    Views
    4,978

    Fuzzing your browser

    Attacks on browsers are becoming common day by day, for example the latest
    IMG tag bug in Internet Explorer, lets discuss a tool to find bugs in browsers.
    The program we are going to discuss is...
  5. Replies
    2
    Views
    3,870

    Hey HTRegz is it my fault that microsoft code has...

    Hey HTRegz is it my fault that microsoft code has bugs ?
    From Blog



    Shouldn't microsoft have fixed it but no their policy is hey it compiles ship it!.
    Its high time they became a little (at...
  6. Replies
    4
    Views
    3,594

    As for book i recommend the following The Art...

    As for book i recommend the following

    The Art of Computer Virus Research and Defense

    Secondly for good virus resources see VX Heavens

    As for virus patterns there are'nt any freely...
  7. Replies
    2
    Views
    3,870

    Microsoft knew about the WMF flaw for years

    Title Says it all,
    Stephen Toulouse writing in a Microsoft security blog has now confirmed that
    the Microsoft has known about the WMF flaw for many years

    Take a look

    1. The Blog
    2. Bugtraq...
  8. Replies
    32
    Views
    28,949

    Actually i am an electronic and communication...

    Actually i am an electronic and communication engineer by profession and i know
    communication techinolgy at the back of my hand , any how you'r response was
    very obivious. Take a few points please...
  9. Replies
    32
    Views
    28,949

    Actually lot has changed with cell phones today,...

    Actually lot has changed with cell phones today, i'll let you know what i know

    1. Cell phone network is very much based on OSI refrence model, so it
    has its pros and cons.

    2. Eavesdropping...
  10. Replies
    33
    Views
    15,441

    It is nice to see you have planned to shift over...

    It is nice to see you have planned to shift over too web based solution. do take
    a look at the following resources

    www.sqlsecurity.com
    www.oswap.org
    of course www.google.com :rolleyes:
  11. Replies
    3
    Views
    7,355

    Nemsis+Libnet for WinPcap 3.1

    I just rebuilt nemesis and libnet to work under windows with
    WinPcap 3.1, i am attaching it here hope you find it usefull.
  12. Replies
    33
    Views
    15,441

    Actually if you wish to completely take...

    Actually if you wish to completely take everything to
    the server i recommend you make a web interface instead of a VB application.
    Any how for the problem in hand
    the only solution is too ask the...
  13. Replies
    33
    Views
    15,441

    Hi yogurtu, First of all welcome to AO. 1....

    Hi yogurtu,

    First of all welcome to AO.

    1. For the connection string, make sure no passwords are *in* it.
    2. For the stored procedure, you can implement your own extened stored procedure
    (a...
  14. Great work micro$oft (once again)...

    Great work micro$oft (once again)
    http://www.securityfocus.com/brief/89
    http://www.securityfocus.com/archive/1/420288
  15. Replies
    31
    Views
    37,289

    bah most of the malwares are rotten cut and copy...

    bah most of the malwares are rotten cut and copy paste code, the best
    packing you can find is asprotect. Most of them are written in borland delphi.

    also in these times it is not hard to have...
  16. Replies
    31
    Views
    37,289

    A few things i would like to say 1. If you...

    A few things i would like to say

    1. If you don't have a seprate machine use vmware ( i am amazed how it was missed out).

    2. thhorse13 i think you missed out a very basic point, you need...
  17. Thread: Bridging

    by warl0ck7
    Replies
    10
    Views
    6,863

    You are getting a few things wrong here(or i am...

    You are getting a few things wrong here(or i am confised :rolleyes: ), you
    need a serial to ethernet bridge(something like that) to connect a modem to
    a NIC, since they are two very very...
  18. Replies
    7
    Views
    5,112

    Wrong actually, tcp.len gives the length of tcp...

    Wrong actually, tcp.len gives the length of tcp payload and not of the whole packet
    for the whole packet lenght you need ip[2:2]. also using tcp.len gives me a parse error(??).
  19. Replies
    7
    Views
    5,112

    As for length use '(( ip[2:2] >= 81 ) or (...

    As for length use '(( ip[2:2] >= 81 ) or ( ip[2:2] <= 162) )'

    for ACK and PSH

    '(tcp[tcpflags] & (tcp-push|tcp-ack)!= 0)'

    The whole thing becomes

    '((ip[2:2]>=81) or (ip[2:2]<=162)) and...
  20. Replies
    5
    Views
    12,281

    sob sob :mad: , now will have to learn ruby.

    sob sob :mad: , now will have to learn ruby.
  21. Replies
    20
    Views
    12,490

    The point is microsoft won't make things better...

    The point is microsoft won't make things better until it can make money out of
    it, also nowdays these days they are more busy trying to second google.
  22. Replies
    24
    Views
    16,849

    Viral technology is always going to be two steps...

    Viral technology is always going to be two steps ahead of viral technology. why ?
    because antivirus companines will go down the drain if this whole things stopped.
    Someone once said antivirus...
  23. Microsoft IIS 5.0/51./6.0 HTTP 401 Response Internal IP Disclosure

    Microsofts IIS 5.0/5.1/6.0 Web servers seem to disclose their internal ip, when giving
    a 401 HTTP response take a loook.

    [11:05 PM ~]#nc -vv 127.0.0.1 267
    localhost [127.0.0.1] 267 (?) open...
  24. Replies
    4
    Views
    4,719

    Great work man!, keep it up. get those games...

    Great work man!, keep it up. get those games running as soon as possible :D
  25. Replies
    27
    Views
    15,343

    Download psexec from www.sysinternals.com put...

    Download psexec from www.sysinternals.com

    put your machine ips in a file say file.txt

    c:\>for /f %i in (file.txt) do psexec \\%i -u administrator -p <password here> sc stop SharedAccess

    this...
Results 1 to 25 of 188
Page 1 of 8 1 2 3 4