Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: HTRegz; Keyword(s):

Page 1 of 20 1 2 3 4

Search: Search took 0.07 seconds.

  1. Thread: SSL Survey

    by HTRegz
    Replies
    1
    Views
    1,242

    SSL Survey

    I'm speaking at SecTor (www.sector.ca) in Toronto next week and I'm trying to collect some data on perceptions of SSL from various target groups.

    I figured I'd post an additional survey here --...
  2. Replies
    10
    Views
    2,806

    UDP is a different sort of beast because it is...

    UDP is a different sort of beast because it is Connectionless. You don't have the S, SA, A of TCP to confirm if a port is open, instead you have to rely on ICMP error messages, which are often...
  3. Replies
    3
    Views
    2,358

    Awwww, you mentioned my name :) Although I like...

    Awwww, you mentioned my name :) Although I like it better when they mention my last name as well.

    Windows 7 RTM isn't actually affected, only Windows 7 RC is affected.

    Also it looks like it's...
  4. Replies
    4
    Views
    1,037

    The number of "in production" W2K servers would...

    The number of "in production" W2K servers would probably astound most people. I actually think this is a big issue and one that I find slightly concerning. As for blocking 139/445, since this is in...
  5. Replies
    4
    Views
    3,055

    That second post was definitely unnecessarily...

    That second post was definitely unnecessarily snappy.

    There are problems with your code, but they could also be problems on the use side

    Issues:

    1) No ':' at the end of your if statement...
  6. There's been page-long articles on my concerns...

    There's been page-long articles on my concerns over client-side DoS and DoS in general? Damn... where, all I've seen are my blog posts.

    Whether or not the issue is widespread is not the case......
  7. The problem is they don't close the door in this...

    The problem is they don't close the door in this case if the horse has bolted... they only close the door if the horse is already there... Meaning the other horse could bolt as well (to beat an...
  8. Hey All, I heard back from MSFT and this was...

    Hey All,

    I heard back from MSFT and this was the intended functionality of the patch.



    It sounds like functionality beat security here... and that sounds like an issue to me.

    In my...
  9. Replies
    6
    Views
    3,114

    I'm glad you managed to track down the problem......

    I'm glad you managed to track down the problem... if you have any problems going forward, please let me know.
  10. Successful Exploit Renders Microsoft Patch Ineffective

    Hey All,

    Just wanted to share that the MS09-008 patch isn't as cut and dry as it seems. There's an issue where if someone has already exploited CVE-2009-0093, the issue will not be properly...
  11. Replies
    6
    Views
    3,114

    Have you contacted nCircle Technical Support? You...

    Have you contacted nCircle Technical Support? You can also email me ( tyler [at] ncircle [dot] com ) and I can make sure your issue gets to the right people.
  12. Replies
    7
    Views
    3,695

    Hey, You simply need to craft your query...

    Hey,

    You simply need to craft your query properly.

    1) Is the form method POST or GET? This will change how the query is crafted. Your example makes use of a GET (no body, simply URL...
  13. Hey, That's a fairly generic question... so...

    Hey,

    That's a fairly generic question... so here's a fairly generic answer :)

    It is indeed possible to change the reported version for many of your services. This will confuse software that...
  14. Thread: CanSecWest

    by HTRegz
    Replies
    0
    Views
    766

    CanSecWest

    Hey All,

    I'm gonna be at CanSecWest this year, so I figured I'd see who was going to be there to meet up for a beer. (http://cansecwest.com/)

    Tyler.
  15. Replies
    11
    Views
    6,240

    Whether or not he can access his email externally...

    Whether or not he can access his email externally in dependent on a number on things.

    Let's start with, How does he access his email at work?

    Is it in a client (Outlook, Thunderbird, Eudora)...
  16. Replies
    15
    Views
    2,440

    I'd recommend that you give Ubuntu Server a...

    I'd recommend that you give Ubuntu Server a try... let it install and see where you end up


    As for a GUI, you should definitely be able to get something up and running I used to run GUIs on my...
  17. Replies
    6
    Views
    2,698

    There are quite a few places you can look... ...

    There are quite a few places you can look...

    While this may not help with infecting your VM, there's some interesting stuff at the virus source code database (http://vscdb.totallygeek.com/).
    ...
  18. Thread: Good pc book

    by HTRegz
    Replies
    23
    Views
    2,868

    Using metasploit is about 25 pages out of the...

    Using metasploit is about 25 pages out of the overall total of the book, and it's not for everyone... or people that already know a thing or two but it's a great learning resource (one of the reasons...
  19. Replies
    10
    Views
    4,156

    Hey, Most of the time, I find certs are...

    Hey,

    Most of the time, I find certs are useless... Sure as CSR mentioned, certs are useful when you don't have hands on experience... other than that the only time I'd advocate for them is if you...
  20. Thread: Good pc book

    by HTRegz
    Replies
    23
    Views
    2,868

    Spec: I highly suggest you check out Gray Hat...

    Spec: I highly suggest you check out Gray Hat Hacking... it changed my opinion on books with the word Hacking in them :) it's got a decent group of authors. Chris Eagle (who released the IDA Pro book...
  21. Thread: Good pc book

    by HTRegz
    Replies
    23
    Views
    2,868

    metguru has some good options... I have Reversing...

    metguru has some good options... I have Reversing - The Secrets of Reverse Engineering sitting on my bookshelf. Hacking - The Art of Exploitation... I wouldn't pay for it... but I'd read it.

    I'd...
  22. Replies
    12
    Views
    2,006

    Sites can definitely NOT "borrow" cookie...

    Sites can definitely NOT "borrow" cookie information... that would be the opposite of all the security models that they attempt to put in place...

    As Spec mentioned, generally those ads are based...
  23. Replies
    12
    Views
    2,006

    macnux: Do some reading on the Same Origin Policy...

    macnux: Do some reading on the Same Origin Policy (http://en.wikipedia.org/wiki/Same_origin_policy). Essentially a website would have to violate the Same Origin Policy in order to access your...
  24. I don't know how you installed it.. but if you...

    I don't know how you installed it.. but if you installed and configured everything yourself might I suggest walking away and finding an easier way?

    I'm a huge fan of XAMPP -...
  25. Thread: AV for Routers

    by HTRegz
    Replies
    11
    Views
    4,987

    I think you're confusing a home network and a...

    I think you're confusing a home network and a "real network"... I mean those devices aren't even really routers... They are poorly named NAT devices. If they were real routers you could layer them...
Results 1 to 25 of 500
Page 1 of 20 1 2 3 4