Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: Guus; Keyword(s):

Page 1 of 20 1 2 3 4

Search: Search took 0.04 seconds.

  1. Replies
    0
    Views
    996

    Message Digests in Java 1.5

    I'm exploring some of Java's Cryptography Extension. I'm trying to create a function that lets me calculate a hash of some string (for storing passwords in a database, for example). Using various...
  2. Replies
    0
    Views
    3,242

    Intro to securing FreeBSD, part 5

    After gore's first four parts, I'd like to contribute a little on the subject as well. So far, gore touched these topics:
    Part 1: Determine a security policy
    Part 2: Password safety
    Part 3:...
  3. Replies
    2
    Views
    889

    udpcast worked for me about two years ago. I used...

    udpcast worked for me about two years ago. I used it in a netboot/backup-situation where the used ramdisk (for booting) was under four mb's. You'll find more information at http://udpcast.linux.lu/
  4. Replies
    68
    Views
    3,721

    All the "you're all morons, I'm never posting...

    All the "you're all morons, I'm never posting here again" bullshit aside: Congressman Tom Davis dropped a bill that makes internet hunting punishable by up to five years in prison. (source:...
  5. Replies
    7
    Views
    953

    I never used perlscript before, but as I'm seeing...

    I never used perlscript before, but as I'm seeing it, you're never suppling a value for your textfield. That way, the contents of that textfield will always be empty. Try this:



    <HTML>
    <HEAD>...
  6. Thread: Java Help NEEDED

    by Guus
    Replies
    5
    Views
    720

    Dude, about one third of your posts are...

    Dude, about one third of your posts are Java-related. You do know that there's a huge Java-forum at http://forums.java.sun.com, do you? There's a list of topics that covers most questions you could...
  7. Replies
    4
    Views
    756

    This could be the first time that I can use a...

    This could be the first time that I can use a "All your base are belong to us" reference in a context that actually makes sense! ;)

    Translated by someone not familiar with botnets, probably.
  8. Replies
    2
    Views
    1,080

    Re: Operation Honey Pot.

    There are less attacks on a product that hasn't been around that long, that's common sense. Wait a year, try again, and I'll bet you that you'll see significantly more attacks on SP2 machines.
  9. Replies
    4
    Views
    850

    Disregard me, I have my head stuck up my ass. I...

    Disregard me, I have my head stuck up my ass. I was quoting sshd_config, not ssh_config. In ssh_config, the order -does- indicate preference.
  10. Replies
    4
    Views
    850

    I'm not an expert, but as far as I know...

    I'm not an expert, but as far as I know specifying "Protocol 2,1" doesn't force the client to use SSH2. You're merely giving the client the choice between two versions. The order of the numbers...
  11. Replies
    20
    Views
    1,846

    You can block port 80 perfectly fine. You will be...

    You can block port 80 perfectly fine. You will be able to keep browsing. You won't be able to host your own webserver though (not configured to use that default port anyways).

    Identd is typically...
  12. Replies
    29
    Views
    1,519

    I know I'm from a backward place, but we already...

    I know I'm from a backward place, but we already have something like this! It's called 'dog' and works on ambulances and fire-engines too!

    Seriously, I don't think you'll be hearing much of this:...
  13. Thread: Sql

    by Guus
    Replies
    11
    Views
    787

    Re: Sql

    I'm not sure what you mean by this. Did you actually install a SQL-server (or do you have access to a SQL-server?)

    What your message is saying is that it cannot connect to a SQL server. It's...
  14. Replies
    0
    Views
    543

    Calculate password-safety as you type

    I registered on EBay yesterday and when I was registering, I had to make up a password. When I entered my new password, EBay showed me how safe my password was while I typed it. That made me add...
  15. Replies
    2
    Views
    858

    Simulating a network

    I enrolled in a CCNP course today. I'd like to run some of the assignments at home, but I don't have any suitable hardware laying around. Does any of you know of some software to simulate a Cisco...
  16. Thread: html help

    by Guus
    Replies
    3
    Views
    886

    If I understand correctly, you're having troubles...

    If I understand correctly, you're having troubles positioning the pictures within your pages. I think a technique called CSS (or Cascading Style Sheets) will make your life easier: You can group some...
  17. Replies
    3
    Views
    722

    Thanks, Ega, but I had it figured out. count(*)...

    Thanks, Ega, but I had it figured out. count(*) did the trick :)
  18. Thread: Hacked network...

    by Guus
    Replies
    35
    Views
    2,431

    Thought: You're mostly concentrating on removing...

    Thought: You're mostly concentrating on removing the concequenses of the hack, you're not really looking for the origin of it. You might get lucky and find some trojan, but that trojan had to come...
  19. Replies
    7
    Views
    652

    Using tables for text-alignment is getting a bit...

    Using tables for text-alignment is getting a bit outdated. Preferred way to format HTML nowadays is using CSS.

    There are a lot of usages for CSS - it's quite powerful - but I'll give you just a...
  20. Replies
    10
    Views
    1,493

    I'm using some sentenced-based passwords too, but...

    I'm using some sentenced-based passwords too, but I've wondered what whould happen if instead of bruteforcing using every combination of, say, the letters of the alfabet, someone whould write...
  21. Replies
    9
    Views
    2,459

    I'm a little pressed for time right now...

    I'm a little pressed for time right now (finishing up my internship, still have loads of documentation to write), can't look into it any further.
  22. Replies
    9
    Views
    2,459

    MSM, the first few lines of that code (the...

    MSM, the first few lines of that code (the section with all the %-signs) unescape to something like this:


    function k(m)
    {
    var d='',t,f,v,r;
    for(t=0;t-1)
    {
    r=((v+1 )%i-1);
  23. Replies
    3
    Views
    722

    XML / XSLT question (how to count elements?)

    This should be an easy question for someone who's a little more experienced in XML/XSLT than me. :) Please help me out!

    I'm displaying an object (java graph) that needs a varying number of...
  24. Replies
    1
    Views
    1,048

    You'll find the security alert that Mysql.com...

    You'll find the security alert that Mysql.com issued for this worm at the address below. A word on detecting it:



    http://dev.mysql.com/tech-resources/articles/security_alert.html
  25. Replies
    9
    Views
    1,357

    *ironical grin*

    *ironical grin*
Results 1 to 25 of 500
Page 1 of 20 1 2 3 4