Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: wyred; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.01 seconds.

  1. Thread: Decompiling Java

    by wyred
    Replies
    8
    Views
    1,233

    warriorfan808, Java is very easy to decompile....

    warriorfan808,

    Java is very easy to decompile. There are numerous programs to do it, DJ Java Decompiler, Mocha,Cavaj, to name a few. Just do a quick google for "Java Decompiler" and you get 1.7...
  2. Thread: Decompiling Java

    by wyred
    Replies
    8
    Views
    1,233

    mad_fox9007, There is no way to write Java...

    mad_fox9007,

    There is no way to write Java code that isn't easy to compile. When you call javac.exe(or hit compile in your IDE), a .class file is created which contains byte code. This byte code...
  3. Thread: WINE and WMF

    by wyred
    Replies
    4
    Views
    744

    WINE and WMF

    Ironically enough, WINE is still vulnerable to the now patched WMF exploit. Talk about emulation!
    Quote from H D Moore(WINE Founder) from ZDNet


    The rest of the article is here:...
  4. Replies
    17
    Views
    2,004

    warriorfan808, The newer v5 Linksys routers...

    warriorfan808,

    The newer v5 Linksys routers are no longer Linux based, last I heard it was VxWorks. You might still be able to find an older version at the store. I know I was fooled by the new...
  5. Replies
    3
    Views
    1,111

    Thanks Hesperus! Unfortunately, neither of...

    Thanks Hesperus!

    Unfortunately, neither of these could find the passwords from the password history of Windows :( I'm not running a domain or any remote authentication at home, so I know it has to...
  6. Replies
    3
    Views
    1,111

    Password History Cracking?

    Everyone always suggests that people enforce some sort of password history on their computer. My question is, where do the old passwords get stored? I've googled for the answer on and off for the...
  7. Replies
    7
    Views
    633

    Google Talk goes live?

    We've all heard the rumors that Google is going to be launching its IM service soon. The Los Angeles Times and CNN both have articles about it being announced some time tomorrow. Well this guy is...
  8. Replies
    17
    Views
    1,604

    Hi Madseel, I'd guess you're using some sort...

    Hi Madseel,

    I'd guess you're using some sort of GUI to browse your filesystem? AFAIK, most GUI's in Unix don't display hidden directory's by defualt, much the same way Explorer doesn't by default...
  9. Replies
    14
    Views
    2,541

    I do have a federal job(organization to remain...

    I do have a federal job(organization to remain namless), and our security frightens me sometimes. All users run as local admins and the \\host\c$ is accessible on anyone's computer :( I usually try...
  10. Replies
    6
    Views
    2,588

    Swoosh - ...

    Swoosh -

    Elcomsoft(http://www.elcomsoft.com/arpr.html ) has a tool for recovering lost RAR passwords. It supports a brute-force and a dictionary attack. Their product info says that RAR files are...
  11. Replies
    16
    Views
    1,522

    From the image you uploaded, it looks like this...

    From the image you uploaded, it looks like this is more a problem with IE. In the type column, it says the source was Interet Explorer Protected Sites.
  12. Thread: Code for DES :

    by wyred
    Replies
    14
    Views
    2,321

    I got bored and decided to format the code. For...

    I got bored and decided to format the code. For the sake of not taking up an entire page with the source, I attached it. I hope this helps someone answer AbhishekDwivedi's question.
    ...
  13. Replies
    10
    Views
    945

    Thanks for all the posts everyone, this really...

    Thanks for all the posts everyone, this really helps :)

    Negative: I dont work for the company that has the problem. Maybe vulnerable wasnt the right word to use. There is a webserver that has some...
  14. Replies
    10
    Views
    945

    Breaking the news: Your Vulnerable!

    I've noticed that there are lots of posts about people wondering whether or not to tell sys admins that they have security holes. For those of us who decide to spill the beans, does anyone have any...
  15. Thread: new spyware?

    by wyred
    Replies
    8
    Views
    1,104

    Oops, I spoke too soon. That only works for one...

    Oops, I spoke too soon. That only works for one of the computers. Does anyone else see anything I'm doing wrong here, or is this just on of those things that happens and it cant really be fixed?
  16. Thread: new spyware?

    by wyred
    Replies
    8
    Views
    1,104

    I fixed it. ipconfig /registerdns didnt work, but...

    I fixed it. ipconfig /registerdns didnt work, but renewing the adapter did. Maybe a stale address or something? Thanks for all the help, now I just need to log on to all the computers(20-ish) to find...
  17. Thread: new spyware?

    by wyred
    Replies
    8
    Views
    1,104

    Well the ip address didnt work, it just gave me...

    Well the ip address didnt work, it just gave me the same error. I can also add firefox to the list of browsers that work.
  18. Thread: new spyware?

    by wyred
    Replies
    8
    Views
    1,104

    Thanks for all the replys everyone. The...

    Thanks for all the replys everyone.

    The problem is that all the computers used to be able to go to google, but now some of them can't, and the symptoms are starting to move to other computers. At...
  19. Thread: new spyware?

    by wyred
    Replies
    8
    Views
    1,104

    new spyware?

    Hi everyone,

    My school is having some trouble with a few computers and I thought some one here could help. The computers are Dell Optiplex GX150's, running Windows 98 SE. The problem is a few of...
  20. Thread: hacking by JPEG?

    by wyred
    Replies
    22
    Views
    2,543

    phishphreek80: I dont know if this is what you...

    phishphreek80:

    I dont know if this is what you are remembering, but there was an exploit for the linux image manipulation program XV. Heres a link in bugtraq with source:

    ...
  21. Replies
    27
    Views
    1,802

    The way they used to track us at my old high...

    The way they used to track us at my old high school was to force us to proxy through an N2H2 server and log all the requests to sites that were not allowed. They also had Centurion cards so we...
  22. Replies
    22
    Views
    2,802

    Heres an interesting link to a Gameboy Advance...

    Heres an interesting link to a Gameboy Advance running Unix 5th Edition: http://www.kernelthread.com/publications/gbaunix/
  23. Replies
    18
    Views
    1,244

    There a dozens of sites with lists of proxies on...

    There a dozens of sites with lists of proxies on the internet, just do a google search for them. One site I like that has a free somewhat up to date list is http://www.samair.ru/proxy/. I would do...
  24. Thread: Need Help

    by wyred
    Replies
    8
    Views
    1,206

    Most web sites store customer information in a...

    Most web sites store customer information in a database or on part of the server that is not accessable over the internet. Your best bet is probably a database if you want all the information in one...
  25. Thread: Need Help

    by wyred
    Replies
    8
    Views
    1,206

    A google search that would work would be...

    A google search that would work would be something like "index of" site:www.target.com or allinurl:"index of" site:www.target.com. A lot of websites dont like to give out directory listings. I have...
Results 1 to 25 of 33
Page 1 of 2 1 2

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides