Type: Posts; User: droby10; Keyword(s):
Search took 0.02 seconds.
no offense, sdk, but given that you're the only one familiar with the objectives of the host/environment - and haven't even mentioned what software applications the users will be running...expecting...
me thinks you are misinterpretting the wording of "an elective credit" for meaning "scott-free". essentially, by having those certs, you get to skip the P.E class if you want. but you're still...
there are a couple of theoretical approaches at a network level, but neither of them are going to yield any form of success in practice. you could do this via multilayered tunneling (which has...
they're in the ntds.dit, there are also a number of internlized ways to provide redundant access to passwords. although some form of discretion must be accounted for.
September 20th, 2002 02:32 AM
i'll try to simplify the clarity of pointers.
when you declare a pointer
the pointer declaration(*) should be assumed to be a part of the type specification.
September 17th, 2002 09:02 PM
the guys hosting your site should have acted quicker...i'd notify them that anyone logging into anywhere in that network segment between now and the time stated above needs to change their password...
September 17th, 2002 08:00 PM
sorry for the delay...been away.
yes, i was saying not to delete it for two reasons both relating to maintaining the state of the system. 1) the timestamp as noted and 2) the contents of the...
September 17th, 2002 03:56 PM
something is attempting to register a com server....when it pops up, leave it open and take a look at the process/application list for anything suspect. it could just be a faulty software...
September 17th, 2002 05:47 AM
pull the plug - you've found the evidence, now you need to analyze without interruption. look at time stamps for the entire system based on the ctime of the setuid cgi script. were the web logs...
September 17th, 2002 05:37 AM
i am jacks aching diaphragm from laughing so hard.
September 15th, 2002 09:00 PM
you could do this...but the real issue is shellcode not extended or embedded sql commands.
September 15th, 2002 08:46 PM
it's always nice to see creativity within a poor case of comprehensive reading skills...if i was "whining", there would have been a 'why'. i made a simple statement; actually i...
September 15th, 2002 07:13 AM
i understand and support your point, but the absoluteness of it can be argued.
for instance, cryptoanalysis is often done prior to developing a new cypher to guard against weaknesses in any...
September 6th, 2002 07:15 PM
a default routing setup will route regardless of network and host address; the rfc indicates that the reserved blocks _should_ not be routed in public networks; and are in most cases implemented as...
September 5th, 2002 06:23 PM
well, then i wouldn't be as concerned as previously illustrated as you don't have a ethernet interface (ppp) or it's virtual (some implementations of pppoe).
September 5th, 2002 06:44 AM
theoretically, if the attacking computer is local on the network, i could see how it might be possible to point you at a different dns, gateway, etc. such that you'd be on one end of a...
September 4th, 2002 05:48 AM
consider the logical structure of an assembled program, where offsets are used for execution flow. in the following simplistic example, such a 4 bit change can be seen.
0x80483d0 <main>: ...
September 4th, 2002 05:04 AM
what...like a large group of people at ao, who are supposedly "security-conscience" are the first to plug their ears, gag their neighbors, and blind-fold their children when anything controversial...
September 3rd, 2002 10:59 PM
here's an easy...
September 3rd, 2002 10:52 PM
there is a duality in aspect with certifications and jobs. i think everyone is aware that certifications don't really mean anything with regard to performance levels. granted it is a token of...
September 3rd, 2002 05:21 PM
the use of commenting features is database dependent (which you didn't list). my guess, is that you are using access - which doesn't provide this functionality.
but i've also experienced similar...
August 31st, 2002 06:05 PM
hey, since all the heavy hitters are giving out greens....i could use a bigger buffer for those times where i play devils advocate and get slammed for it.
or you can neg me for trying...but you...
August 31st, 2002 06:00 PM
the distinction between this guy's actions and those who do "good hacking" is obvious, isn't it? "good hacking" does exist, is valued, and even pays well. had max stayed on the straight and narrow,...
August 31st, 2002 05:46 PM
i've posted another one of my older tutorials on my site. again, leaving it there so that i can make modifications/edits as needed and the formatting abilities. this reproduction was in response to...
August 29th, 2002 11:06 PM
along with the above suggestion for tcp/ip illustrated (these top my list).
Title: Applied Cryptography, 2nd ed.
Author: Bruce Schneier
Publisher: John Wiley & Sons