Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: unhappyStar_7; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.01 seconds.

  1. Replies
    31
    Views
    2,137

    do i really 'lack' self control... NO i have self...

    do i really 'lack' self control... NO i have self control where it's needed... (like my boss) and i don't really need to control myself against personal attacks over the net... whatever .......
  2. Replies
    31
    Views
    2,137

    gore ... so you took offence personally and gave...

    gore ... so you took offence personally and gave me neq's... i have respect for you because i read many of your posts... BUT...

    i'm not gonna apologize for insuting him because i TRIED, I DID TRY...
  3. Replies
    31
    Views
    2,137

    you big fat motherfucker.... do not post in here...

    you big fat mother****er.... do not post in here anymore .... i'm not asking anyone to do or prove anything ... go eat more twinkies you bitch... and leave me alone.... i asked for a ****ing EDUCATED...
  4. Replies
    31
    Views
    2,137

    thank you for being positive ... i'm sorry i got...

    thank you for being positive ... i'm sorry i got carried away but i didn't mean any harm to the system and it's not like port scanning is illegal ...

    really framework i appriciate your input......
  5. Replies
    31
    Views
    2,137

    frame... 31337 is significant because of it's...

    frame... 31337 is significant because of it's historical meaning... in my company (huge company)... no matter what kind of service you wanna run it's not really professional to put it on 31337.
    ...
  6. Replies
    31
    Views
    2,137

    i guess you got me there H. i guess some of...

    i guess you got me there H.

    i guess some of your assumptions are true... no, PERSONALY i don't give a rat's ass about ppl who i work for, the client or the web hosting inc. i don't have any...
  7. Replies
    31
    Views
    2,137

    quote "many companies run IRC"... not in this...

    quote "many companies run IRC"... not in this case, there is no need what so ever for this company to run IRC... you are gonna have to trust me on that one...

    if and if, the IRC ports would be...
  8. Replies
    31
    Views
    2,137

    really, really weird... need reply

    You may remember my problem from before. This is another, really weird chapter. I've been recently asigned to administer 24 workstation inter-office network; all NT & 2000. One of my users have been...
  9. Replies
    9
    Views
    1,907

    1. if you are looking into making restoring your...

    1. if you are looking into making restoring your windows partitions to a certain state use Deep Freeze ...

    2. Linux has it's own swap partition by default

    3. Linux doesn't defragment nowhere as...
  10. Replies
    8
    Views
    1,934

    my advice is to create your own... i know that...

    my advice is to create your own... i know that it's not much of an advice but if you want somthing simple use C's XOR function w/ some addtional obfsucation of your choice... not hard at all
  11. Replies
    12
    Views
    1,361

    if this is true... ...

    if this is true...

    http://www.kfki.hu/~arthp/art/t/tiepolo/giandome/trojan_ho.jpg
  12. Replies
    22
    Views
    5,442

    i doubt you have completly legitimate intentions...

    i doubt you have completly legitimate intentions in mind but truly i don't care so here goes...

    i don't user XP but 2000 pro so in your case the accuall proccess might be different:

    1. by...
  13. Replies
    10
    Views
    2,086

    is it possible to erace Widows logs only if you...

    is it possible to erace Widows logs only if you have Administrative priviledges or is there a know vulnerability which will enable regular users to do that
  14. Replies
    10
    Views
    2,086

    excellent link but what i ment was who was...

    excellent link but

    what i ment was who was logged in (let's say) yesterday ... where are the records of that kept
  15. excelent...that's all i need

    excelent...that's all i need
  16. Replies
    10
    Views
    2,086

    How to find out who's logged in ?

    How can you find out who has logged into a NT/2000 computer. If you have the workstations set up not to cash any accounts then they have to authenticate at the domain controler which will do the...
  17. What are the 'native' logging capabilities of Windows (NT/2000)

    Does anyone have experience how does Windows log all the activity on the system. Is the 'Event Viewer' the only program that installs by default? There are only 3 tabs in the Window...
  18. What are 'native' logging capabilities of windows NT/2000 ?

    Does anyone have experience how does Windows log all the activity on the system. Is the 'Event Viewer' the only program that installs by default? There are only 3 tabs in the Window...
  19. Replies
    4
    Views
    1,013

    Thank you...Thank you... You're right of...

    Thank you...Thank you...

    You're right of course horse; It was (as usuall) simplest and the most obvious answear.
    Everyone has to close the file and then we can change the thinggy... I cannot...
  20. Replies
    4
    Views
    1,013

    Need your help... fast!

    Can anyone please explain how is it possible to have a file from a shared drive open at two different systems at the same time. One system is NTsp6 and the other one is win2k sp1. The file is on the...
  21. Networking Complete...

    Networking Complete
  22. Replies
    15
    Views
    2,492

    as an addition: 127.0.0.1 is a loopback...

    as an addition:

    127.0.0.1 is a loopback address (but we already know that) It's used to test the network adapter (aka NIC/eth0) basically if you cannot connet to the network the first thing you...
  23. Replies
    4
    Views
    744

    to my understanding ... SYS key encrypts the sam...

    to my understanding ... SYS key encrypts the sam AGAIN and stores the result on a floppy or somwhere localy... ok sounds reasonable... if you get sam and you don't have the 2nd hash you cannot...
  24. Replies
    4
    Views
    744

    SYSKEY... what is it?

    can anyone provide more information on SYSKEY... I've been recently asigned to administer NT & win2k machines. Security is my biggest concern. I've been having problems w/ a certain user. How can I...
  25. Replies
    0
    Views
    540

    all you need is SAM...

    In many tutorials, even books (Hacking Exposed) the tool of choice for copying the SAM file or equivalent (SAM._) from the HD by booting it to another OS is NTFSDOSPro from System Internals . The...
Results 1 to 25 of 31
Page 1 of 2 1 2