Search:

Type: Posts; User: adm77; Keyword(s):

Search: Search took 0.02 seconds.

  1. Replies
    18
    Views
    10,209

    If you really want to learn security, you should...

    If you really want to learn security, you should get very familiar with TCP/IP.
    You should understand what the 3 way handshake is, SYN, FIN, RST, ACK, ephermal ports, etc...

    I would recommend...
  2. Replies
    47
    Views
    23,459

    I agree.. It does seem that the FBI is getting...

    I agree..

    It does seem that the FBI is getting very serious now about cybercrime. Obviously they do have a ways to go in their investigative and analytical process, not to mention their press...
  3. Replies
    47
    Views
    23,459

    The culprit has been identified as Jeffrey Lee...

    The culprit has been identified as Jeffrey Lee Parson, aka "teekid". He did admit to modifying the original Blaster code and creating several sub-versions.

    Here is the original article as well...
  4. Replies
    13
    Views
    8,583

    Re: Windows XP and Windows 2000

    I have always found Mark Minasi's books quite helpful. For example, "Mastering Windows 2000 Server - Fourth Edition" is quite good and covers every aspect of configuration and administration.
    As...
  5. Replies
    4
    Views
    4,221

    Re: I don understand..

    If you are also looking for the difference between honeypots and honeynets.....
    I believe as noODle said, a honeypot is a computer left relatively unprotected, while a honeynet is a simulated...
  6. Replies
    14
    Views
    12,385

    I've read a lot of books on various security...

    I've read a lot of books on various security topics, but the one I've found that is comprehensive and quite relevant is "Inside Network Perimeter Security" by Stephen Northcutt, Lenny Zeltser, Scott...
  7. Replies
    22
    Views
    14,072

    There is a separate "Hacking Linux Exposed"...

    There is a separate "Hacking Linux Exposed" book...... very comprehensive and EXCELLENT !!!
  8. Replies
    8
    Views
    6,543

    There is also a "Hacking Linux Exposed" book. I...

    There is also a "Hacking Linux Exposed" book. I think it's a must read as well if you have anything to do with a net-facing Linux box....
  9. Thread: firewall

    by adm77
    Replies
    10
    Views
    7,845

    While most virus scanners will find most...

    While most virus scanners will find most notorious trojans, you should also consider adding a trojan scanner to your system.

    One you may consider is BOClean, found at...
  10. Replies
    11
    Views
    8,392

    Re: I need some "Educational" help!

    If you really want to expand your abilities with computers, especially security, you should look toward studying the field and avoid looking for shortcuts.

    I would advise looking into the books...
  11. Replies
    15
    Views
    9,714

    Now I'm intrigued.... I'll be checking out LADS ...

    Now I'm intrigued.... I'll be checking out LADS :)

    Thank you HTRegz !
  12. Replies
    15
    Views
    9,714

    I am aware of TDS-3 from DiamondCS at ...

    I am aware of TDS-3 from DiamondCS at http://tds.diamondcs.com.au/

    It checks for ADS in NTFS files as well as a superb Trojan scanner.
Results 1 to 12 of 12