Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: AngelofRevenge; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.02 seconds.

  1. Replies
    22
    Views
    1,992

    Okay

    Thanks eveyone for that, my main security consideration is cryptography, that's where I seem to excel in. I find that the contents of drive should be encrypted in a business situation to prevent...
  2. Replies
    9
    Views
    2,004

    Implimentation

    How can such a system be implimented?

    It would be useful, as it could help configure networks.
  3. Replies
    5
    Views
    794

    Problem

    I think the problem is in the OE 6 software, where it is I don't know, I think clean the computer up completely and see what happens.
  4. Replies
    6
    Views
    1,113

    Kudos

    You still wrote it, which is more than I can do
  5. Replies
    1
    Views
    531

    haha

    that's good stuff, go to www.eviloverlord.com because that list is also very funny.
  6. Replies
    4
    Views
    1,423

    Hmm

    Gump

    what you say certainly has clarified the situation, but 128 bit encryption is not a viable option, do not have the formal training, but an interest in Cryptography, and am able to brute...
  7. Replies
    0
    Views
    397

    Calling all crypies

    hello

    Any one out there who is really interested in Cryptography etc?
  8. Replies
    16
    Views
    2,669

    DNS

    Could a DNS server help send the message?
  9. Replies
    16
    Views
    2,669

    InterNetsend

    I study networking like you and am not aware of any such program, popups are ad's written into a web pages script, and they can be blocked, eg Norton Security. 'll see if I can find a program similar...
  10. Replies
    6
    Views
    1,113

    Game

    Hey

    at leat you wrote this, even if it's got bugs galore (win 98ish) you stil wrote it, which is more than I can do.
  11. Replies
    2
    Views
    1,052

    Go forth

    you should go forth and write this program, it will be invaluable to future network administrators.
  12. Replies
    5
    Views
    794

    options

    is it posible to reinstall those components by themselves, otherwise i recomend a complete reinstall after a format, then updating antivirus software and or firewalling the network.
  13. Replies
    4
    Views
    1,064

    Windows

    I've got some Win 98 SE to sell, but I'm in Australia, sorry.
  14. Replies
    22
    Views
    1,992

    Security

    I believe the question is wrong, what you need to know is that encryption protects data, not FAT32 or anything else.

    Any way security issues Microsoft never fix.
  15. Replies
    9
    Views
    1,580

    Rates

    I presume the charge is for line hire, but what type of line I don't know?

    If given extra info I could hep out more.
  16. Replies
    7
    Views
    3,400

    What?

    I would like to know how securityfocus responded and what is the ultimate goal, elminate the shell weakness?
  17. Replies
    11
    Views
    1,953

    Cisco Products

    communication of that type is easy to access, use a packet sniffer, like a port sniffer, except reads packets.
  18. Message

    I can't be much help as I am only familar with Cisco products, and I wrote a firewall so I could do stuff like that.
  19. Replies
    4
    Views
    1,098

    Encryption

    Go to the RSA Laboratories web page because a business will require a secure file storage system, and RSA is almost unbreakable.
  20. Replies
    22
    Views
    2,589

    Ethics?

    Trace and locate without illegal activities
  21. Replies
    10
    Views
    1,846

    Keyloggers

    Do you have a specific Keylogger program?

    If so whch one and how are the logs accessed?
  22. Replies
    4
    Views
    1,423

    Security

    The security of the communications iss my concern in this area. The use of RSA and similar encryption would be a secure system to use, however these signals could be intercepted, and with enought...
  23. Replies
    7
    Views
    2,091

    verification

    Do you want true verification?

    Try a code phrase only that person would know.
  24. Replies
    14
    Views
    1,554

    What to do

    What to do? I think you should get a router/ hardware firewall and configure it properly. Make sure the details are only possessed by you though.
  25. Security

    The firewall should have some configuration options which should allow outbound traffic through, eg net surfing, while preventing external access.
Results 1 to 25 of 28
Page 1 of 2 1 2

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides