Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: tomdaq; Keyword(s):

Search: Search took 0.01 seconds.

  1. Replies
    4
    Views
    883

    Defacement mirror

    Is it possible that the popular defacement mirror has been defaced?



    -taken from www.zone-h.com

    _TOMDAQ
  2. Replies
    32
    Views
    2,824

    stickman, The article you read was most likely...

    stickman,

    The article you read was most likely about Adrian Lamo. He's received a lot of press lately (mostly because he hacked into the New York Times and they decided to press charges) and it's...
  3. Replies
    1
    Views
    1,185

    Nigerian email fraud

    I'm not sure if this has already shown up here, but I thought it was an interesting read:

    http://www.zone-h.org/nigerianfraud

    It seems the folks at Zone-H followed through with one of those "we...
  4. Replies
    11
    Views
    1,924

    Anyone care to place a wager on how long it will...

    Anyone care to place a wager on how long it will take Core Security to get a law suit together?

    I'm guessing that the project will have to pick up a little bit more steam before Core really gets...
  5. Replies
    8
    Views
    1,138

    Maroni, I respect your paranoia, but I don't...

    Maroni,

    I respect your paranoia, but I don't think you have anything to worry about. Viruses can live on a boot sector, but this a rather old school approach. Furthermore, they don't have any...
  6. Replies
    7
    Views
    1,035

    The version of Windows is an important...

    The version of Windows is an important consideration here. With windows 9x/ME, gaining complete control of the operating system is a bit more difficult because there are very few network services...
  7. I've often wondered why I haven't heard more...

    I've often wondered why I haven't heard more about viruses spreading through bluetooth enabled devices. I don't know much about bluetooth standards so maybe it's to difficult to bother with or just...
  8. Thread: Bypassing NAT

    by tomdaq
    Replies
    17
    Views
    3,227

    R0n1n, I suppose it depends on the router you are...

    R0n1n, I suppose it depends on the router you are using and the manufacturer's interpretation of NAT. If your router has a built in firewall, then some protection will be afforded, however, NAT by...
  9. Thread: Bypassing NAT

    by tomdaq
    Replies
    17
    Views
    3,227

    Why would NAT have to be "bypassed" for you to...

    Why would NAT have to be "bypassed" for you to see this traffic. I think you're missing an important piece of network address translation. Key point - NAT does not provide any security whatsoever. ...
  10. Replies
    2
    Views
    665

    You definitely want the access-list on the...

    You definitely want the access-list on the outside to be as granular as possible. If you are running an IOS with the firewall feature set, the access-list provides several features not present in...
  11. Replies
    27
    Views
    3,514

    A few more thoughts... Try searching for...

    A few more thoughts...

    Try searching for 'passive OS scanning' on Google. If your class is on a shared network i.e. a hub, you might be able to use a passive OS scanner to find more information...
  12. Replies
    18
    Views
    3,266

    On the HIDS note; check out SamHain. It has way...

    On the HIDS note; check out SamHain. It has way more features than Tripwire and it's still open source!

    http://la-samhna.de/samhain/

    -Tomdaq
Results 1 to 12 of 12

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides