Search:

Type: Posts; User: sysmin770; Keyword(s):

Page 1 of 6 1 2 3 4

Search: Search took 0.02 seconds.

  1. Replies
    10
    Views
    12,543

    This seems to be the big thing lately. Security...

    This seems to be the big thing lately. Security companies using all of their effort to market their products that they forget what they were doing in the first place. It is sad, buy my product and I...
  2. Replies
    7
    Views
    8,961

    The_Captain, You left quite a few pieces of the...

    The_Captain,
    You left quite a few pieces of the puzzle out. There are questions that I am sure people are wondering such as what operating systems are the laptops? Is there any need to access...
  3. Replies
    2
    Views
    8,649

    Re: Hash function history

    Well, the recent buzz about MD5 and SHA1 would definitely be something worth mentioning. There are still a lot of applications that use these hashing functions. Here is a useful link you might want...
  4. Replies
    19
    Views
    11,769

    Don't study from just one source. The CISSP is a...

    Don't study from just one source. The CISSP is a very broad range certification and covers many different areas. You will fare better if you study from multiple sources. Even though I have not used...
  5. Replies
    19
    Views
    11,769

    Security is sort of a fad right now. Like most...

    Security is sort of a fad right now. Like most things organizations freak out about everything up front, and then cut members out of their IT staff later. There will always be a need for security...
  6. Replies
    8
    Views
    6,325

    You should be good to go with your current...

    You should be good to go with your current configuration. Just remember, even though you may live in a residential area doesn’t mean that someone won’t wardrive your house. I really wouldn’t...
  7. Replies
    3
    Views
    4,028

    The only way to do that is with a server product...

    The only way to do that is with a server product and not using ICS, using Routing and Remote Access instead. That way you can give the clients and address range via DHCP and route those elsewhere.
  8. Replies
    5
    Views
    5,531

    That is an instant messenger hoax. Don't get...

    That is an instant messenger hoax. Don't get caught up in hoaxes, make sure you research everything before believing things you receive in your email. Hope that helps.
  9. Man, you have to be more specific. What exactly...

    Man, you have to be more specific. What exactly are you looking for? Without knowing exactly what you are talking about, I would say you could start logging privilage useage and object access. That...
  10. Replies
    18
    Views
    10,503

    I have a solution to that problem, run Linux or...

    I have a solution to that problem, run Linux or at least use Windows with a decent browser. I can't believe so many people still use IE after all of the publicized vulnerabilities.
  11. It's good if you are doing some sort of awareness...

    It's good if you are doing some sort of awareness training or something of that nature. Maybe you could try to use it to convince a manager that security is important, hence the nice little cartoon...
  12. Replies
    11
    Views
    9,841

    I suggest using Ncrypt...

    I suggest using Ncrypt http://ncrypt.sourceforge.net

    It is available for both windows and *nix and it is very easy to use. It also has a good file wiper that allows you to securely delete files.
  13. Replies
    17
    Views
    11,791

    Stegonagraphy basically means hidden writing. You...

    Stegonagraphy basically means hidden writing. You can actually hide data in many different file carriers; pictures, music, video, binary exe's, and more. Carrier files can be big problems. Some files...
  14. Obviously the university did not practice due...

    Obviously the university did not practice due care and due diligence in the protection of their systems. The reason, as best practices, you are supposed to put up banners and even minimal protection...
  15. Replies
    10
    Views
    7,399

    I personally do not think that Bluetooth is going...

    I personally do not think that Bluetooth is going to go anywhere anytime soon. Many companies have been investing in this technology. The problems I have with Bluetooth is in the way it operates. Its...
  16. Replies
    14
    Views
    10,107

    And that sends your login credentials in...

    And that sends your login credentials in plaintext.
  17. Thread: Router

    by sysmin770
    Replies
    8
    Views
    7,421

    Also, most routers store their operating system...

    Also, most routers store their operating system in NVRAM. There are really no "interesting" files on a router like you might find on a PC. Things you would consider "interesting" on a router would be...
  18. Replies
    15
    Views
    9,660

    You could also use Ncrypt which is a pretty cool...

    You could also use Ncrypt which is a pretty cool product. It comes with a pretty good file wiper and it is also free. http://ncrypt.sourceforge.net/
  19. Replies
    23
    Views
    12,019

    I knew you could update it by downloading the...

    I knew you could update it by downloading the updates and installing them individually. I guess new things have came out since my friend had it installed on that computer. I don't worry either since...
  20. Replies
    23
    Views
    12,019

    Correct me if I am wrong, but I could have swore...

    Correct me if I am wrong, but I could have swore that the priated version of Windows XP does not allow you to do updates. Well, directly from the web that is using the Windows update feature. When...
  21. Replies
    40
    Views
    8,011

    Poll: *Kerry's campaign is based around the fact that...

    *Kerry's campaign is based around the fact that "I'm not Bush, so vote for me".

    pwaring,
    Even if that was right, that is enough for me. As a veteran who has been deployed overseas, I am tired of...
  22. Replies
    4
    Views
    5,229

    HackQuest, I can't speak too much about the...

    HackQuest,
    I can't speak too much about the Cyber Corps program, but I can speak from a private sector point of view. Just recently companies are starting to understand the importance of Security in...
  23. Replies
    23
    Views
    12,019

    LeeBkr311, I don't know if you noticed or not,...

    LeeBkr311,
    I don't know if you noticed or not, but the guy is a newbie and he is using Windows boxes. Can you imagine what would happen with a misconfigured *nix box set up as a firewall on his...
  24. Replies
    4
    Views
    10,080

    To recover a RAR file with something like...

    To recover a RAR file with something like SmartPar you need the accompanying .PAR files for the .RAR files. Basically .PAR files are like super-checksums that can be used to repair the archive if it...
  25. Replies
    9
    Views
    9,014

    Ncrypt. It is also multi-platform. It also comes...

    Ncrypt. It is also multi-platform. It also comes with a nice file wiper that works really well and wipes the slack-space.

    http://ncrypt.sourceforge.net/
Results 1 to 25 of 134
Page 1 of 6 1 2 3 4