Search:
Type: Posts; User: 10dedfish; Keyword(s):
Search:
Search took 0.01 seconds.
-
December 28th, 2003, 01:05 PM
Thanks man. Appreciate the help.
10ded
-
December 27th, 2003, 05:09 PM
Does anyone know whether Monmotha's firewall script logs any access attempts or does it go straight into the /dev/null?
Im using it on a redhat 7.3 system.
10ded
-
December 23rd, 2003, 12:18 PM
no probs. let me know how it goes
10ded
-
December 23rd, 2003, 12:11 PM
So, let me get this straight. You are trying to run 2 different machines now off of your two seperate hd's? If so, then your problem really isnt all that bad. Seperate the Hd's and put them into...
-
July 17th, 2003, 06:11 PM
Or you can hit CTRL + ALT + F1 and it will throw you to a terminal window sans xwindows.
-
April 8th, 2003, 12:14 PM
This is a quote from www.net-security.org
SETI@home Clients Information Leakage and Buffer Overflow Vulnerabilities
Posted on 07 April 2003
Information leakage and remotely
exploitable...
-
April 2nd, 2003, 11:57 AM
I hate to break this to you, but how do you think the US got all of those al queda guys they captured to spill the beans? I mean, this guy is like the Operations planner for the whole network and...
-
March 31st, 2003, 12:19 PM
OK, Lets talk about the rule of 1 million and the NSA. If anyone has heard of this before then skip to the end.
The rule of 1 million and the NSA is explained as follows. The NSA told everyone that...
-
March 29th, 2003, 02:09 AM
try looking at www.bookpool.com
Thats where I get most of my computer books and they are usually 40% less than retail.
10Ded
-
February 20th, 2003, 07:01 PM
Greets guys!!
Ok, here is my amatuer attempt at analysis. Please bear with me and correct anything that I am remiss on.
1. Its IPv4 with 20 bytes apiece for TCP/IP
2. The actual packet length is...
-
February 20th, 2003, 01:27 PM
Str34m3r,
Let me see if I understand your post correctly. The r@j in the fields on the right hand side are tcpdumps attempt to correlate the hex information to a readable format. By converting those...
-
February 19th, 2003, 01:54 PM
Guys, I apologize for jumping in at the last minute, but this is an awesome post. Im just trying to learn how to get into forensics, and Im learning a great deal. I started by looking at dons post...
-
February 19th, 2003, 12:18 PM
WOW!!
Thanx for all the outpouring of support. Now if I could only figure out samba. /grrrr/
10Ded
-
February 18th, 2003, 03:10 PM
I recently did a "ps aux" command on my default RH7.3 system and i had a wierd process come up running under root. Im fairly new at linux so Im not really sure what it is. At the far right column...
-
February 18th, 2003, 12:41 PM
http://www.maththinking.com/boat/booksIndex.html
I found this link while looking thru the archives on www.linuxjunior.org
You really have to see to believe.
10Ded :D
-
August 15th, 2002, 11:38 AM
1. Ive heard this one b4, but i cant remember what it is to save my life.
2. 28
3. the guy crying.
4. friday is the name of his transportation.
5. a coal mine.
6. no.
Its only 6:30 in the...
-
August 13th, 2002, 01:39 PM
Typical what?
DId you ask "hey how do i hack {insert client here} or did you have an intelligent question that they refusd to answer.
by the tone of this one i would guess the former.
-
August 13th, 2002, 11:21 AM
What question did you ask?
-
July 24th, 2002, 04:39 PM
Thanks!!!! I appreciate all the timely help.
Cheers.
-
July 24th, 2002, 12:39 PM
GReets all!!!
Does anyone know how long an usb cable can be? Is there a IEEE standard like ethernet?
Any help would be appreciated.
tnx
:D
10Ded
-
June 26th, 2002, 12:47 PM
Has anyone heard about the new security effort being put forth by micro$oft? It requires you to buy a new computer, and other hardware devices...... BWahahahahahahahaahah
these guys have to be out...
-
June 20th, 2002, 12:07 PM
Mostly, the government only will set the dogs out when they have been directly attacked themselves. And unfortunately, the comment about the worthless american media is correct. The old saying "if it...
-
June 12th, 2002, 11:45 AM
This sounds a lot like the "gang" problems that most cities were facing way back when. But most of it still comes down to knowing what your kids and thier friends are up to. I was a little bit of a...
-
June 11th, 2002, 12:14 PM
If you want to throw some fiction in there, try reading The Bear and The Dragon by Tom Clancy. He has a fanciful idea of how a couple lines of code hidden in a software upgrade is used to spy on the...
-
June 10th, 2002, 05:38 PM
you should use the i586 one. I recommend check with the website to be absolutely positive but you should be good to go.
|
|