Search:

Type: Posts; User: j3r; Keyword(s):

Page 1 of 5 1 2 3 4

Search: Search took 0.02 seconds.

  1. Replies
    20
    Views
    11,473

    No. X display security is entirely host-based....

    No. X display security is entirely host-based. (Yay!) (X was developed back in the days when, if you knew how to use Unix, you knew everyone else who knew how to use Unix. Security was not much of an...
  2. Replies
    20
    Views
    11,473

    br: are you doing it in the right order? You have...

    br: are you doing it in the right order? You have to xhost +whatever first, then open the xterm.
  3. Replies
    20
    Views
    11,473

    Try "xterm -display 10.10.10.1:0.0" Edit:...

    Try "xterm -display 10.10.10.1:0.0"

    Edit:
    Perhaps a bit more explanation is in order. X windows can have multiple session per machine, and multiple screens per session. The ":0.0" specifies...
  4. Replies
    20
    Views
    11,473

    It's not a feature of telnet or xterm. Attackers...

    It's not a feature of telnet or xterm. Attackers replace the existing copies of the telnet/xterm/ssh/etc. programs with ones that more-or-less appear to work the same, but actually do something evil,...
  5. Replies
    10
    Views
    20,897

    Of course, the problem with "just firewall them"...

    Of course, the problem with "just firewall them" is that sometimes, you'll be blocking an address that is actually owned by someone you want to talk to. Just be careful, is all.
  6. Another profile of crackers/attackers/malicious hackers/whatevers

    As seen on slashdot:

    An Israeli student did her doctoral dissertation by profiling Israeli hackers (using this term as her interviewees seem to be a cut above the average skrypt kiddie). Not sure...
  7. Replies
    32
    Views
    18,571

    Actually, Cisco's scheme is a way to provide...

    Actually, Cisco's scheme is a way to provide lock-in for Cisco and the big anti-virus companies. It lets Cisco sell new hardware, and lets the cabal decide which AV products get to be deployed on a...
  8. Replies
    18
    Views
    12,043

    Basically what you said, I image internal routers...

    Basically what you said, I image internal routers get BGP info from the VPN server to determine what ports to open to what VLANs. I haven't actually seen this done, but imagine it might be done on a...
  9. Replies
    18
    Views
    12,043

    tekno: I would not be surprised if some Cisco VPN...

    tekno: I would not be surprised if some Cisco VPN solutions used BGP to open up various VLANs based on your VPN credentials.

    That said, yeah, you're generally right.
  10. Replies
    18
    Views
    12,043

    Most FW admins are not worth their salt. :-/

    Most FW admins are not worth their salt. :-/
  11. Replies
    18
    Views
    12,043

    With regard to the BGP &c., that only applies...

    With regard to the BGP &c., that only applies (AFAIK) to VPNs that terminate on the router. So, if one of your ISPs is friendly, they can help you out. Otherwise, that is not relevant to the current...
  12. Replies
    7
    Views
    2,649

    Why not go to the source...

    Why not go to the source?
  13. Replies
    18
    Views
    12,043

    cheyenne1212, you are, unfortunately, right. I...

    cheyenne1212, you are, unfortunately, right. I believe some VPN solutions have noticed that this is a problem, and tunnel the VPN connection through port 80. (I think Cisco does this?)

    One...
  14. Replies
    7
    Views
    9,658

    deftones You can't just copy the data out of...

    deftones
    You can't just copy the data out of ethereal. Close, but not quite. First off, ethernet packets are small - 1.5K a piece, so the image will be split up among the packets. You can probably...
  15. Replies
    13
    Views
    11,878

    New mice are like 5 euros. You can try taking...

    New mice are like 5 euros. You can try taking your apart and checking for loose solder connections, dirt, etc. Mice are generally pretty easy to dis and re assemble. And if you break it, well, you...
  16. Thread: Hex Editing

    by j3r
    Replies
    9
    Views
    6,143

    Man, to bad I don't have a VB6 decompiler, I...

    Man, to bad I don't have a VB6 decompiler, I wonder what ShitApp actually does...
  17. Thread: email

    by j3r
    Replies
    7
    Views
    2,918

    If you really don't want spam, you can get one of...

    If you really don't want spam, you can get one of the challenge/response systems like Mailblocks (not an endorsement, I use client-side bayesian filtering). Whenever someone new sends you mail, they...
  18. Thread: 2 quick questions

    by j3r
    Replies
    6
    Views
    5,411

    Install linux, use cdrecord :-P

    Install linux, use cdrecord :-P
  19. Replies
    32
    Views
    18,571

    Yeah, this is just silly. Will there be a...

    Yeah, this is just silly. Will there be a certification process for anti-virus software? How much will it cost? If AV software doesn't have to be certified, I'll just define SETI@Home to be AV...
  20. Thread: Proxy Check...

    by j3r
    Replies
    7
    Views
    6,382

    What mark_boyle2002 said, except that if they do...

    What mark_boyle2002 said, except that if they do not match, your are either going through a proxy server or are behind a NAT device. They are not the same thing, and depending on what you're trying...
  21. Replies
    8
    Views
    6,156

    http://lists.insecure.org/lists/bugtraq/2003/Nov/0...

    http://lists.insecure.org/lists/bugtraq/2003/Nov/0120.html
    http://lists.insecure.org/lists/bugtraq/2003/Nov/0134.html
    etc...
  22. Replies
    18
    Views
    12,043

    It's easy. You need something that does port...

    It's easy. You need something that does port forwarding (stunnel is best, if you can get it on your platform) to be run on the machine you're using, and the remote machine. So say you wanted to use...
  23. Replies
    13
    Views
    7,996

    In the US, any device (except garage door...

    In the US, any device (except garage door openers) that bypasses copy-protection methods is generally illegal. In the US and pretty much the rest of the world (all of Europe, for instance), the act...
  24. Thread: Server security

    by j3r
    Replies
    8
    Views
    7,739

    Setting a single file's mode to 777 can be very...

    Setting a single file's mode to 777 can be very dangerous. OTOH, is can be totally harmless. If the file contains shell commands that are then executed, then you must be totally sure that nobody can...
  25. Replies
    2
    Views
    3,848

    You could set up a streaming mp3 server on one of...

    You could set up a streaming mp3 server on one of the machines, then connect the players on the various computers to connect to the stream. Just make sure that you're using the same amount of...
Results 1 to 25 of 114
Page 1 of 5 1 2 3 4