Search:

Type: Posts; User: Neptune0z; Keyword(s):

Page 1 of 3 1 2 3

Search: Search took 0.03 seconds.

  1. Replies
    1
    Views
    13,998

    The older pdf encryption schemes were very weak,...

    The older pdf encryption schemes were very weak, and mainly relied on encryption thru obscurity and can be cracked very easily with a 100% success rate. Just goolge around a bit to learn the...
  2. Replies
    10
    Views
    10,184

    "Thanks, but cipher does the seem to have an...

    "Thanks, but cipher does the seem to have an option for just doing a few files, it only want's to do whole voulmes which takes too long." --irongeek

    Just as sdewis said...
    "cipher /W:C:\ where...
  3. Replies
    10
    Views
    10,184

    Check out the cipher.exe that comes standard with...

    Check out the cipher.exe that comes standard with Windows XP...I only use the professional version, but im pretty sure it's included in the home version as well...I beleive this is what your looking...
  4. Replies
    49
    Views
    264,294

    "With what you said above, more options would...

    "With what you said above, more options would equal less security. KISS"
    -- gore

    Ya...I see where your going with that one, but what about usability and customization?
    Give a child a tablesaw...
  5. Replies
    4
    Views
    12,102

    Sounds like a job for metasploit! Check out the...

    Sounds like a job for metasploit!
    Check out the link...

    www.metasploit.org
  6. Replies
    49
    Views
    264,294

    Sorry bro...I didn't mean to insult...

    Sorry bro...I didn't mean to insult SUSE...lol...I was saying things as I saw em thats all...I'd post a reply to your comments but im afraid too, lol...you nit picked every one of my reasons...
    ...
  7. Replies
    49
    Views
    264,294

    "OpenBSD does something any OS could do. They...

    "OpenBSD does something any OS could do. They ship with everything turned off by default. SUSE could do the same thing...

    Why not go over WHY you like OpenBSD? I'd personally like to know the...
  8. Replies
    49
    Views
    264,294

    An entire book could be written on custom *nix...

    An entire book could be written on custom *nix security mods, but i'll just try to cover the high points...P.S...Im specifically talking about OpenBSD here, but the principles should apply to almost...
  9. Replies
    6
    Views
    7,312

    Essentially what your talking about is blocking...

    Essentially what your talking about is blocking or filtering active content at the TCP layer...I mean sure you can setup your browser to filter out active content, but that data is still making it to...
  10. Replies
    8
    Views
    7,262

    Ideally, You would only provide him with the data...

    Ideally, You would only provide him with the data that he needs...Why not just burn it to a CD?
    Sure you can use something like TrueCrypt for XP to encrypt various partitions, but what happens if he...
  11. Replies
    13
    Views
    10,123

    Honestly, I think you might be taking the wrong...

    Honestly, I think you might be taking the wrong approach here...A good authentication system will require a user to provide two things:

    Something you know, and something you have...
    ...
  12. Replies
    26
    Views
    17,821

    "TCP Wrapper and SSH Port Forwarding for 1000...

    "TCP Wrapper and SSH Port Forwarding for 1000 Alex" -RoadClosed

    There's your fix...

    If it is using some form of filtering higher up in the OSI model, your going to have to "wrap" the SSH...
  13. Replies
    19
    Views
    15,714

    Well...The simplest way would probally be to just...

    Well...The simplest way would probally be to just mention some links in your inbox...Maybe you could mention that FTP server that will be running next week on your home system, so you can share your...
  14. Replies
    10
    Views
    12,724

    You didnt get over your head with that resume you...

    You didnt get over your head with that resume you posted on monster.com did you? lol

    The actions you should take are going to depend on a policy that you've decided BEFORE the incident occurs....
  15. Replies
    22
    Views
    42,109

    "I wonder if Ms can get in trouble as this would...

    "I wonder if Ms can get in trouble as this would come under antitrust or something like that.?" -front2back

    M$ looks out for itself pretty good in the EULA...Unknowing to most users, after they...
  16. Replies
    15
    Views
    11,143

    What the ? Sorry about that triple post.Im not...

    What the ?

    Sorry about that triple post.Im not sure what happened, my browser acted like it was timing-out. Guess I should have checked it before resending.On an unrelated note: I was using...
  17. Replies
    19
    Views
    15,714

    I doubt you will have any luck getting Earthlink...

    I doubt you will have any luck getting Earthlink or an ISP to release any IP records. However, there are always simpler methods you could take into your own hands...

    Why not spread a little honey...
  18. Replies
    15
    Views
    11,143

    nice thread... Anyhow...Attacks using...

    nice thread...

    Anyhow...Attacks using techniques like your talking about, work on the principle that it is possible under the right circumstances to alter the return address of a function to allow...
  19. Replies
    4
    Views
    6,284

    This depends on exactly what you mean by...

    This depends on exactly what you mean by "software restriction". Basically you can enforce a security policy and restrict software two different ways on a *nix system. Of course the methods you...
  20. Replies
    7
    Views
    6,938

    Interesting idea...There's a lot of talk right...

    Interesting idea...There's a lot of talk right now about using worms/trojans and such to scan and identify hosts that are vulnerable to new exploits. These systems are then "infected" with a patch...
  21. Replies
    5
    Views
    4,042

    Your DLL would contain some basic functions like...

    Your DLL would contain some basic functions like

    InstallHook
    UninstallHook
    HookProc

    The first two are self explanitory, HookProc is the code you want to execute qhwn your hook is called...
  22. Replies
    5
    Views
    4,042

    Sounds like your code is creating a local hook...

    Sounds like your code is creating a local hook instead of a remote one...Did you include your hook procedure in a DLL (Global hooks require the procedure to be in a DLL)? It's also very import to use...
  23. Replies
    9
    Views
    9,928

    When using wireless it's very important to use...

    When using wireless it's very important to use WPA. This is because WEP is totally insecure and easily crackable, and has been for some time. Those people buying wireless access points this year for...
  24. Replies
    16
    Views
    13,848

    Your talking about cookie managment, which really...

    Your talking about cookie managment, which really has little to do with a firewall. Most web browsers allow you to control how internet sites can interact with your computer. Cookie managment allows...
  25. Replies
    14
    Views
    8,060

    "In the real world..that just doesnt...

    "In the real world..that just doesnt happen..............I have yet to find a basic end user with a 14 character password...I have been able to get better passwords...using pass phrases instead."

    ...
Results 1 to 25 of 59
Page 1 of 3 1 2 3