Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: smirc; Keyword(s):

Page 1 of 20 1 2 3 4

Search: Search took 0.04 seconds.

  1. Replies
    7
    Views
    971

    No this won't work. The MAC address of all the...

    No this won't work. The MAC address of all the PING replies will be the MAC of the local gateway for his subnet. The only way to find out MAC addresses on another network is if your have access to...
  2. File Listing

    source: http://francisco.terawap.co.uk/file_tree_list.txt
  3. Replies
    9
    Views
    1,024

    Just to clarify, the general rule is: Swtich...

    Just to clarify, the general rule is:

    Swtich to Switch (or Router to Router) = use a cross over
    NIC to NIC = use a cross over
    NIC to Switch (or NIC to Router) = use a straight through

    It's...
  4. Replies
    4
    Views
    988

    It's cause you're only reading in the first part...

    It's cause you're only reading in the first part of the file. You probably want something more like:



    use MIME::Base64 qw(encode_base64);
    open(FILE, "/var/log/wtmp") or die "$!";

    while...
  5. Replies
    6
    Views
    1,009

    Just knowing the address of a router on your...

    Just knowing the address of a router on your network/subnet, does not mean that someone can get your IP address. But they can narrow it down substantially. eg if the router's address is a class B...
  6. Replies
    4
    Views
    973

    Hmmm...the article was pretty vague and contains...

    Hmmm...the article was pretty vague and contains little information to increase security at the application level. However the link at the bottom contains a lot of good information on securing BIND...
  7. Thread: Pornography

    by smirc
    Replies
    27
    Views
    2,133

    I could say the same thing about a lot of...

    I could say the same thing about a lot of industries.



    LOL



    Red one's go faster. ;)
  8. Replies
    3
    Views
    994

    It's true that for some mail servers that are...

    It's true that for some mail servers that are poorly configured, you can use SMTP to get lists of user names. The commands you're probably interested in are VRFY and EXPN. Take a look at RFC 821...
  9. Thread: DoSing fun!

    by smirc
    Replies
    16
    Views
    1,955

    Like mike, if I could be like mike. :P Dick...

    Like mike, if I could be like mike. :P

    Dick head.
  10. Thread: C++, Help

    by smirc
    Replies
    21
    Views
    2,535

    Good point but it's also worth noting that rand...

    Good point but it's also worth noting that rand and srand are both inherently *unsafe* for generating random numbers for things such as crypto keys ie. anything that you don't want someone to be able...
  11. Replies
    12
    Views
    1,847

    Exactly right. It's not google's responsibility...

    Exactly right. It's not google's responsibility to babysit slack web site administrators. If you're a web admin and you've never heard of robots.txt, now you have so there's no excuse. ;)
  12. Replies
    26
    Views
    2,398

    swiftstyles: You're a dick. You probably cut and...

    swiftstyles: You're a dick. You probably cut and pasted that when you could have written a l33t Perl script. Grow up. And I can tell from just seeing the top of your head that you are ugly. :cool:
  13. Replies
    8
    Views
    657

    Korpdeath: Sounds like a pretty obscure sort of...

    Korpdeath: Sounds like a pretty obscure sort of problem. You problably won't have much luck with your question here, since the level of BSD enthusiasts is quite low at AO by all accounts. You might...
  14. Replies
    9
    Views
    1,188

    The weird bit is the fact that your machine is...

    The weird bit is the fact that your machine is conected to this other box (which looks like your ISP machine for handling modem connections) on port 12. Port 12 is a low port AND it's not assigned. ...
  15. Replies
    11
    Views
    1,096

    Damn...it's in VB. I can't open it. :-)

    Damn...it's in VB. I can't open it. :-)
  16. Replies
    16
    Views
    1,522

    Uh-oh...busted! :)

    Uh-oh...busted! :)
  17. Replies
    7
    Views
    1,070

    It takes processing power to drop packets too. ...

    It takes processing power to drop packets too. This is why DOS/DDOS attacks are so hard to defend against. If it was as simple as "limiting the amount of packets" DOS attacks wouldn'
    t be a...
  18. Thread: WarLinux,WarBSD

    by smirc
    Replies
    7
    Views
    613

    This looks sweet. I'll have to try it out. Once...

    This looks sweet. I'll have to try it out. Once I graduate I'll have more time to get back into some more hackering/programming. :)
  19. It's worth noting that the same thing applies to...

    It's worth noting that the same thing applies to HTTP POSTs for some applications. For example squid is configured by default to reject HTTP POSTs greater then 1MB in size which can be an annoying...
  20. Replies
    8
    Views
    1,194

    A port scanner is essentially a program that...

    A port scanner is essentially a program that probes a number of TCP/UDP ports on a machine to see if it's possible to connect. A connection idicates a service/deamon is running on that port.


    ...
  21. Thread: Need Help

    by smirc
    Replies
    13
    Views
    915

    This is typical of girls who are too gutless to...

    This is typical of girls who are too gutless to tackle the real issue. There's no such thing as letting someone down nicely. Rejection is bad enough. Prolonged rejection is downright cruel. She's...
  22. Thread: Need Help

    by smirc
    Replies
    13
    Views
    915

    If you think she's cheating on you, you've got...

    If you think she's cheating on you, you've got bigger problems than learning how to install a keylogger. Have you tried talking to her about it?
  23. Thread: Red Hat 8 Shells

    by smirc
    Replies
    12
    Views
    1,126

    Can't connect eh? Try the following: 1.) Do...

    Can't connect eh? Try the following:

    1.) Do you have sshd/telnetd running? Do a netstat -atunp | grep LISTEN and see if ports 22 and/or 23 are listening.

    2.) Is iptables/ipchains in the way? ...
  24. Thread: FreeBSD 4.8

    by smirc
    Replies
    19
    Views
    1,155

    Performance. If you want performance and...

    Performance. If you want performance and security...there's always OpenBSD. ;)
  25. Replies
    10
    Views
    1,826

    I had a look at your code and I noticed a few...

    I had a look at your code and I noticed a few things to start with:

    1.) You're falling into one of the common newbie traps of code:


    if ( choice = '1' ) { // do blah!!! }

    Wrong. This is...
Results 1 to 25 of 500
Page 1 of 20 1 2 3 4