Search:

Type: Posts; User: sandcraft; Keyword(s):

Search: Search took 0.04 seconds.

  1. Replies
    8
    Views
    15,108

    Nothing really, use Scandisk and or CHKDSK /r...

    Nothing really, use Scandisk and or CHKDSK /r (http://vlaurie.com/computers2/Articles/chkdsk.htm). The only big advantages the mfg's tools may have is in formatting, usually they can do it faster...
  2. Replies
    10
    Views
    24,860

    It always comes down to the weakest link, the...

    It always comes down to the weakest link, the people, the people who don't keep their security up to date and get a trojan or the people who code crappy banking software.

    I use Swiss Bank's online...
  3. Replies
    33
    Views
    38,598

    All backup media decays over time, you backup to...

    All backup media decays over time, you backup to be able to restore so just make a restore schedule to restore a few test files from your media and stick with it.

    Light, humidity and moisture...
  4. Replies
    12
    Views
    22,882

    http://www.netoptics.com/products/product_family.a...

    http://www.netoptics.com/products/product_family.asp?cid=1 All these are good, get the 10 GigaBit SR to LR Tap and tell us it's tiny and cheap looking ;) Seriously don't be fooled by looks at all,...
  5. Yup, they are unintended honeypots ;) like the...

    Yup, they are unintended honeypots ;) like the DOD and Mastercard honeypots.
  6. Replies
    55
    Views
    41,613

    Your NOT breaking SSL at all with that procedure,...

    Your NOT breaking SSL at all with that procedure, I can't stop lol'ing long enough to explain where the "fundamental" problem is here, and that too would result in some roflol'ing.
  7. Replies
    55
    Views
    41,613

    Wet Dream

    READ the SSL RFC to see why this is just a wet dream.
  8. Replies
    20
    Views
    16,136

    You didn't post the whole log. So everyone will...

    You didn't post the whole log. So everyone will be guessing. Check here:

    http://seclists.org/lists/bugtraq/2001/Feb/0123.html

    If your log looks the same download the patch. If not my next...
  9. Replies
    27
    Views
    14,480

    For the average Joe, but I can own that thing in...

    For the average Joe, but I can own that thing in the time it takes to boot Austrum Latvijas Linukss and type three commands. Always plan for the worst case scenario and use strong encryption on any...
  10. Replies
    20
    Views
    16,136

    Log into the router and run the show version...

    Log into the router and run the show version command (sh ver). Note the version and download the most compatible version from CISCO . The included doc will help you with the install. If this is...
  11. Replies
    27
    Views
    14,480

    If that is all you REALLY care about!? Right...

    If that is all you REALLY care about!? Right click My Computer > Properties > System Restore Tab. Restore your system to a timepoint where the password didn't show.

    If you live alone, no one...
  12. Replies
    6
    Views
    5,337

    LOL! Have you ever called the FBI for an IT...

    LOL! Have you ever called the FBI for an IT attack? My job requires it; and it really is just procedural. Doesn't matter if you have a 10 dollar network or a 10 billion dollar network you are...
  13. Replies
    26
    Views
    19,010

    2600 ran an article on this a few years back. ...

    2600 ran an article on this a few years back. The 'hacker' was able to get a credit bureau to update someone’s record with just a persons name and address. Then they applied for a card with a...
  14. Replies
    26
    Views
    19,010

    Katja is exactly right, get them to come to you. ...

    Katja is exactly right, get them to come to you.

    As for gore...


    Incorrect. Your gateway needs to boradcast if you want to receive traffic. That is the extent of it. You could have an...
  15. Replies
    26
    Views
    19,010

    keezel 576869746568617 is correct. Port 139 and...

    keezel 576869746568617 is correct. Port 139 and others of NetBios are the ugly stepchild of vulnerabilites.

    With common available tools even a secure network can be owned in half the time via...
  16. Replies
    26
    Views
    19,010

    All good questions...

    All good questions...

    Check this site to see how vulnerable the information your boradcasting makes you.
    http://www.grc.com/x/ne.dll?rh1dkyd2

    The nice thing about the ShieldsUp site is the...
Results 1 to 16 of 16