April 12th, 2004, 03:50 AM
Is it possible that the popular defacement mirror has been defaced?
-taken from www.zone-h.com
_TOMDAQ
April 11th, 2004, 09:32 AM
stickman,
The article you read was most likely about Adrian Lamo. He's received a lot of press lately (mostly because he hacked into the New York Times and they decided to press charges) and it's...
April 10th, 2004, 08:25 AM
I'm not sure if this has already shown up here, but I thought it was an interesting read:
http://www.zone-h.org/nigerianfraud
It seems the folks at Zone-H followed through with one of those "we...
April 10th, 2004, 05:26 AM
Anyone care to place a wager on how long it will take Core Security to get a law suit together?
I'm guessing that the project will have to pick up a little bit more steam before Core really gets...
March 27th, 2004, 04:20 AM
Maroni,
I respect your paranoia, but I don't think you have anything to worry about. Viruses can live on a boot sector, but this a rather old school approach. Furthermore, they don't have any...
March 27th, 2004, 01:22 AM
The version of Windows is an important consideration here. With windows 9x/ME, gaining complete control of the operating system is a bit more difficult because there are very few network services...
March 9th, 2004, 09:47 AM
I've often wondered why I haven't heard more about viruses spreading through bluetooth enabled devices. I don't know much about bluetooth standards so maybe it's to difficult to bother with or just...
March 4th, 2004, 05:09 AM
R0n1n, I suppose it depends on the router you are using and the manufacturer's interpretation of NAT. If your router has a built in firewall, then some protection will be afforded, however, NAT by...
March 3rd, 2004, 12:12 AM
Why would NAT have to be "bypassed" for you to see this traffic. I think you're missing an important piece of network address translation. Key point - NAT does not provide any security whatsoever. ...
February 28th, 2004, 01:22 AM
You definitely want the access-list on the outside to be as granular as possible. If you are running an IOS with the firewall feature set, the access-list provides several features not present in...
February 27th, 2004, 04:59 AM
A few more thoughts...
Try searching for 'passive OS scanning' on Google. If your class is on a shared network i.e. a hub, you might be able to use a passive OS scanner to find more information...
February 27th, 2004, 03:17 AM
On the HIDS note; check out SamHain. It has way more features than Tripwire and it's still open source!
http://la-samhna.de/samhain/
-Tomdaq