Search:
Type: Posts; User: Mark_Anderson; Keyword(s):
Search:
Search took 0.01 seconds.
-
I would also recommend bloodshed.net's Dev-C++. I think it's great. It was actually written in Delphi. Delphi is a language that isn't really too hard to learn and get good with for most.. and it has...
-
Keylogging and PWS's are a huge problem on Yahoo! It seems that everywhere you turn someone is trying to *trick* you into entering your acct info into a fake login page or they'll send you a file and...
-
Tiger:
Login.yahoo.com has absolutely nothing to do with Yahoo! Messenger.
Login.yahoo.com is only 1 of the servers that you can use to authenticate yourself onto the network within the...
-
Last I checked using IPSec encryption for Wi-Fi networks only allowed the ip header to be encrypted.
Addressing WEP, yeah, it's weak even @ 128-Bit. It uses the RC4 stream and isn't implemented...
-
If you want to block access just deny cs1.msg.dcn.yahoo.com - cs60.msg.dnc.yahoo.com. Just specify that net range to block. Also deny scs.msg.yahoo.com - scsc.msg.yahoo.com (socket servers) so...
-
Blocking login.yahoo.com won't help. Yahoo! has 3 protocols. YCHT, YMSG, and Chat 2 protocol (a weened YMSG protocol). Yahoo! Messenger operates on YMSG. Currently, the newest Messenger Ver 6 uses...
-
June 30th, 2004, 07:32 PM
Yeah, the packets that were dropped were still analyzed (though not that thoroughly in only a network-layer firewall) and still required resources to be spent. You get a big enough flood of rapid...
-
June 29th, 2004, 03:13 PM
Angelic, you might want to try ditching kerio or whatever you're running at the moment and reinstalling Sygate Pro -unless you had the free one? If you want reinstall it and go with my earlier...
-
June 29th, 2004, 03:07 PM
I recently had SP2 Release Candidate 2 installed on XP Pro a few days ago. I thought it was a great service pack until I found out the SPI firewall had a glitch or two not to mention it breaking...
-
June 29th, 2004, 02:52 PM
Yes, I said pretty much worthless but I meant generally speaking. Most novice shellcoders wouldn't bother with something like this. I could've taken privilege escalation into account but my point...
-
June 29th, 2004, 10:58 AM
Aura, go here: http://www.cyberarmy.com/lists/wingate/
Those are public wingates that you can use. There's also a link to a wingate scanner there called "winscan.exe" which you can use to find...
-
June 29th, 2004, 10:25 AM
Your point basically is to isolate the host offering that specific service(s) to the outside WAN by means of DMZ so that if it becomes compromised more or less the hosts inside the LAN won't be...
-
June 29th, 2004, 08:22 AM
Yeah, it can be used for that. However, there's no protection in that from the router as you already know. DMZ should only be used when absolutely necessary. If NAT is causing problems with an...
-
June 28th, 2004, 11:08 PM
I actually like Mac OS X Panther quite a bit. The Quartz Extreme is amazing too. I also like the fact that it uses FreeBSD commands and uses the Darwin kernel. It even allows you to lock your root...
-
June 28th, 2004, 10:52 AM
Open up Sygate. Go to "Tools" then select "Options". From there... go to "Security". Uncheck 'Enable stealth mode browsing' and uncheck 'Enable driver level protection' if you have those checked. See...
-
June 25th, 2004, 11:33 PM
"Hey all, just curious if anyone can identify this:
3B%2f%2b2cuPYhjQtkWz3xgCtGqxtAgQJKM7U7NWk7u5nrnNKt
%2fM4puXZY6yUti6uynL8CUNJwkkD%2foxrtGj5vqGihZstSV3...
-
June 25th, 2004, 10:19 PM
Screw waiting.. I'm using the stuff right now in my 802.11G wireless nic and my 802.11G wireless Belkin DSL/Cable Router. All 256 bits of AES. Yeah the overhead isn't too great on your performance...
-
June 25th, 2004, 09:21 PM
Well, if you wanna mess around and see what all you can do as suggested before you could check out nessus... and nmap ver. 3.50 would be good too.
For wireless WEP cracking if you wanna see if...
-
June 25th, 2004, 09:47 AM
Yep, I know. The original data sent from say an echo request is "acked" back to you in the form of an echo reply. When I said that it doesn't support direct data encapsulation I'm not talking about...
-
June 25th, 2004, 12:48 AM
"If an echo-request is sent, the target is supposed to send the echo back unaltered (sequence numbers + data)."
I'd like to add to that for the people that might get these confused if you're brand...
-
June 24th, 2004, 04:30 AM
Rob4224, neither products are very good. eEye Digital found several vulns last month in their FireWall.. can't remember which ver. specifically though, maybe it applied to them all....
-
June 24th, 2004, 04:04 AM
He established it of course.. if I would've initiated that with any SPI FireWall then it would've been allowed through based on how SPI works... including it's use around NAT. Therefore, it would've...
-
June 23rd, 2004, 06:37 PM
Point taken. However, in this situation, the configuration (being 'Scope...') of the product (being XP SP2 RC2 SPI FW) doesn't work to suit anyone's needs. As a matter of fact it gives XP SP2 users a...
-
June 23rd, 2004, 06:12 PM
ROFL! If thinking that helps you sleep at night....
You've got a stiffy for gui environments and auto-installations. This didn't need to be reconfirmed. You must really like Windows.
Oh...
-
June 23rd, 2004, 05:40 PM
Amazing, a whole 2 teams out of how many?! They get some cookie-cutter pay compared to what the closed-source MS employees receive. Talk to Michael Abrash sometime (one of MS's lead game software...
|
|