Type: Posts; User: Gump; Keyword(s):
Search took 0.02 seconds.
April 23rd, 2007 02:59 AM
First off, my family and I have prayed for the VT victims, their families and the community every day since it happened.
I thought I would post this, it is kind of the anti-gun free zone.
September 30th, 2006 11:01 AM
Basic things to help secure WAP are:
Turn off your SSID broadcast - This will help, but only a little bit, it does not keep someone from getting your SSID only keeps your WAP from...
September 16th, 2005 02:29 AM
Kerio also has a free version that I highly recommend. It is free for personal use and is one of th emost configurable of all the software firewall products on the market.
September 5th, 2005 03:13 AM
For my kids I use We-blocker:
Itis completely free and fully functional at that price.
It has fully functional filters and can block by any URL you add to the...
On A GSM network it works like this:
Each GSM tower location is known, either plotted during installation and fed in manually, or since each one has a GPS in it nowadays, they just turn it on and...
March 13th, 2005 02:38 PM
Yes a trojan can bypass netstat, usually with a little help.
In addition to the excellent advise of nihil , I would recommend a utility that has the same functionality as netstat but is external...
November 2nd, 2004 02:55 AM
Seperate your commands with a ; and Linux should execute them one after another:
"mount /dev/hda1;mount /dev/sda2;cp /dev/hda1/windows/syatem32/config/* /dev/sda2/.;umount...
October 11th, 2004 04:56 PM
SANS toook it a bit further this year. They added info on how to patch, mitigate the effeects of the vulnerabilitites.
Somethings are new to the lists from years past and others have just...
October 3rd, 2004 03:18 AM
aeallison, I have had the same type of problem with AVG, can't get the d/l e-mail. I think I narrowed it down to the SPAM filters at my ISP. Since the info is auto generated, maybe?
September 5th, 2004 10:28 PM
Just a couple of sites dedicated to this sort of thing:
Lots of really good info and links to related information.
I Love these 2 sites...
Security on SAT is pretty good. Most of that stuff is C-Band or L-Band, though some are in the K, X, or even Ka bands ( http://history.acusd.edu/gen/recording/spectrum.html ). Other than the...
Tiger, (I'm a certified card carrying RAIDERHATER, just thought you should know that)
To drive home a point on password policy, demo PWDUMP and John or L0pht crack. Like your hacking demo they...
Nice intro, a couple of add ons to anyone interested. hidden is right on track with the letter frequency gig, first step in breaking a simple code like the example. Frequency of letters in english...
Good steps from Spyrus,
I would add to be careful if you choose the passphrase option to generate your keys. It will generate 4 keys and you will have to select the one you want to use. You...
Been to Tracks I and IV, both were excellent.
FYI, when I attended Track IV in Wash DC. There were a couple of guys in the track with us who were working for the conference. They had signed on...
The way it works here is that the E-mail is forwarded but the attachment is stripped off, there is a reference to the stripped file left in the E-mail. Looks like:
Yes you would have to go with one of those two options. You could put a hub (notice not a switch or router) on the same segment as the server and use a second box to run snort. Or upu could run it...
April 29th, 2004 09:48 PM
There are several ways to Enumerate (check your spelling) an OS. Since you already know it is Red Hat 7.3 you can check out Bugtraq and know exactly what to look for. Founstones' Hacking Exposed...
April 26th, 2004 01:41 PM
A great resource for wireless info and advice is
For 3ntropy and Jinxy this may help with your antenna issues, or be fun to play with.
For a variety of general information, that is both informative and entertaining you should ceck out Ed Skoudis' page.
He periodically issues hacker challenges done...
Ran accross this and couldn't resist.
Hope everyone enjoys it as much as I did!!
March 19th, 2004 09:04 PM
HiJackThis is an executeable, run it and save the log. Easy enough, then go through the log line by line and check it against the attached HTML based help file.
Anything that stands...
March 19th, 2004 08:54 PM
They write all of their own code for the product in PYTHON. During the demo they showed the code but I don't remember if it came with the product or they only gave us a glimpse as part of the...
March 19th, 2004 05:29 PM
I went to a demo of Core Impact during a SANS conference in Dec. It is written in Python and maintained with all of the latest public, and some not so public, exploits. It is fast and easy...
March 18th, 2004 02:18 AM
Good advice, HiJackThis is the way to go. Makes life easy for this sort of thing.