Search:

Type: Posts; User: The_tyrant; Keyword(s):

Search: Search took 0.15 seconds.

  1. Replies
    1
    Views
    26,629

    How hard is the CASP?

    I was on comptia's site, and I just saw that they came out with a new certification, the CASP.

    http://certification.comptia.org/getCertified/certifications/casp.aspx

    Anyone familliar with...
  2. Replies
    14
    Views
    19,726

    you know, this is a great hacker trick go on a...

    you know, this is a great hacker trick
    go on a forum, ask for a pentest, and let other people find the vulnerabilities for you

    anyways, i trust you enough, and i am working on finding...
  3. which book is better for the comptia security+ exam?

    http://www.comptiastore.com/product_p/1426005962.htm
    http://www.amazon.ca/Principles-Computer-Security-CompTIA-Beyond/dp/0071633758/ref=sr_1_23?ie=UTF8&qid=1292190704&sr=8-23

    can someone tell me...
  4. Thread: Wikileaks

    by The_tyrant
    Replies
    66
    Views
    48,859

    this reminds me: why is it that wikileaks almost...

    this reminds me: why is it that wikileaks almost only features stuff that makes the government look bad?
  5. Thread: Wikileaks

    by The_tyrant
    Replies
    66
    Views
    48,859

    even the Chinese news is anti wikileaks...

    even the Chinese news is anti wikileaks
    according to 新京报 (a Beijing newspaper)
    my own translation:
    "Do not leak information to wikileaks. It is betraying you country."

    think about it this way,...
  6. Thread: Wikileaks

    by The_tyrant
    Replies
    66
    Views
    48,859

    I HATE wikileaks Look, if you leak information...

    I HATE wikileaks

    Look, if you leak information to an intelligence agency, its treason
    leaking stuff to wikileaks is no different than leaking information to the KGB
    and since the CIA would...
  7. What to do if a perfectly good site has been labeled as an attack site?

    the site is perfectly good, but Firefox and chrome labeled it as an attack site!
  8. Replies
    3
    Views
    8,862

    how could this be exploited?

    Synopsis
    An open SMTP relay is running on this port.

    Description
    The remote SMTP server is insufficiently protected against relaying.
    This means that it allows spammers to use your mail server...
  9. Replies
    1
    Views
    9,924

    Does this reveal any vulnerabilities?

    Apache/2.2.15 (Unix) mod_ssl/2.2.15 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 Server at www.******.com Port 80?
  10. Replies
    25
    Views
    24,935

    I just read this article, you guys might want to...

    I just read this article, you guys might want to check it out:http://www.cracked.com/article_18771_6-new-spy-technologies-you-literally-cant-hide-from.html
  11. Replies
    14
    Views
    14,835

    Questions about firefox

    This is what I have heard today:
    Firefox is bad, it records and sends marketing information to marketing companies, its not illegal since its in the licensing agreement. That is how Mozilla doesn't...
  12. Replies
    25
    Views
    24,935

    your biggest risk is if your dad used parental...

    your biggest risk is if your dad used parental control software
    some of them have a scheduled screen-grab feature. That is your biggest risk.
    so Live CD is you best choice

    of course, there is...
  13. Replies
    0
    Views
    1,313

    latest honker doctrine

    Honkers (红客) are Chinese communist hackers
    If you run a government site for a capitalist country, or if you run a site for some organization that the Chinese government does not like you might have...
  14. thanks guys, this question has already created a...

    thanks guys, this question has already created a huge flame war on a Chinese forum.
    you guys answered it, so I'm guessing its the question that's flawed
    BTW what sub forum should i post in to...
  15. Does the number of hackers increase the success rate or speed?

    The hypothetical situation:
    X number of hackers are at location A
    these hackers are trying to steal file C off file server B
    A has a fixed bandwidth. Every hacker has his/her own laptop with the...
  16. Replies
    1
    Views
    4,998

    Hello World!(my first post)

    hi everyone, this is my first post
Results 1 to 16 of 16