Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: deadpaperplate; Keyword(s):

Search: Search took 0.01 seconds.

  1. Replies
    8
    Views
    584

    I like it cause I have multiple monitors speakers...

    I like it cause I have multiple monitors speakers and other stuff crowding my desk, the new Imac could fit nicely in a corner, and the screen sit to the side.
    Though I do have to agree, it is pricy...
  2. Replies
    14
    Views
    1,502

    services

    ok, time for my 2 cents, hope I'm not off topic here, but you had mentioned trying to find info on the services.

    Since you are running RH 7.1 you don't have to bother with /etc/services to disable...
  3. Replies
    9
    Views
    703

    you can never trust a biased magazine

    As everyone else pointed out the article is false in its statments of IIS being superior in stability and security, I could go into the details but I think thats already been covered. My main beef...
  4. Replies
    18
    Views
    2,245

    Actually I have a copy of XP home, and the remote...

    Actually I have a copy of XP home, and the remote assistance function was turned ON by default. . . ooops.

    And as far as my opinion goes on all this, I honestly I belive that Microsoft's OS's are...
  5. Replies
    33
    Views
    2,345

    If you left the file system as FAT32 when you...

    If you left the file system as FAT32 when you upgraded to XP, then that is probibly 99.9% of your problems. XP is essentially win2k with windowblinds, and a bit of 98 code (they brough back...
  6. Replies
    17
    Views
    1,077

    If you get to the logon prompt, then telnet...

    If you get to the logon prompt, then telnet services are running fine.

    The reason you can't login as root, is because telnet does not alow that.(there is no way to change this, that I know of)...
  7. Replies
    2
    Views
    1,199

    Well, windows systems recognize wireless cards...

    Well, windows systems recognize wireless cards just like any other NIC. So do linux systems, except that they are started differnetly, and run off of different scripts.
    I figure as long as the card...
  8. Replies
    2
    Views
    1,199

    bypassing an access list

    I have an 802.11b wireless network setup here, with access point and a few clients, that I am using for testing. My objective is to find as many ways to break into it as I can.
    with 802.11 there...
  9. Replies
    57
    Views
    4,750

    Nearly everyone I have talked to about winXP said...

    Nearly everyone I have talked to about winXP said the same thing.
    Its great, and never crashes.

    This reminds me of when win2K came out, everyone said the same thing about it.
    Then 4 months...
  10. Replies
    13
    Views
    7,161

    actually Terr you are half right. both spellings...

    actually Terr you are half right.
    both spellings are valid, just depends on personal preference. nybble is more of a tech slang spelling of it, but they are both commonly used.

    bite-->byte, ...
  11. Replies
    13
    Views
    7,161

    Mmmmmm. . . subnetting. . verynice. I liked...

    Mmmmmm. . . subnetting. . verynice.

    I liked the way you handled the binary explanation Terr, very good.
    Any time someone asks me about subnetting I like to tell them its much easier to understand...
  12. Replies
    15
    Views
    1,747

    iptables docs

    cybermike_dk,

    There are actually several howtos for iptables.
    do a search in google for:
    advanced routing howto
    iptables howto
    packet filtering howto

    of course this requires a net...
  13. Replies
    11
    Views
    1,127

    oops

    that last

    chkconfig --level

    should have been

    chkconfig --list
  14. Replies
    11
    Views
    1,127

    switch the runtime

    Kapper, you are obviously in runtime 5 (X), you would be better off in runtime 3 (console).
    edit the file /etc/inittab
    the first uncommented line should be
    id:5:initdefault:

    change the 5 to a...
  15. Replies
    6
    Views
    1,090

    Of course you can alway delete the log file, then...

    Of course you can alway delete the log file, then recreate it as a symbolic link to /dev/null. of course the admin will wonder why the log is always empty, and a simple ls -l will tell you its...
  16. Replies
    2
    Views
    916

    its an ISDN voice box/answering machine package...

    its an ISDN voice box/answering machine package for linux

    I think if you take a look at those 2 entries, (one for michael, and one for nicole right?) you will notice the # at the start of the...
  17. Replies
    10
    Views
    1,242

    Realy they are all the same thing, the only...

    Realy they are all the same thing, the only difference is what packages are installed, the type of init system, and distro specific tools (ie RH linuxconf).
    Most would go for something like RH when...
  18. Replies
    48
    Views
    3,653

    screen lock in X

    Actually the screen lock in X is only good for security if your box is in run level 5.
    If its in run level 3, then you can use Ctrl + Alt + Backspace to kill X, and land at the command prompt...
Results 1 to 18 of 18

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides