Type: Posts; User: slarty; Keyword(s):
Search took 0.05 seconds.
A CAPTCHA is only going to be broken if:
1. It's a common kind of CAPTCHA which is installed on so many sites that someone will put the effort into breaking it
2. It's a very high-value target...
December 21st, 2007, 03:47 PM
One possible idea would be to have your inbound/outbound mail routes through a secure hosted machine elsewhere (outside the ISP).
Ensure that mail in and out only goes via that host, and is...
December 19th, 2007, 11:38 PM
It would be fairly simple for them to block you, even if you disguise your user agent. However, instead of blocking you, they could simply send back rubbish data to your bot, causing you to make...
December 8th, 2007, 12:52 PM
Most uses of the system() function will be incorporating user supplied data in some way into the command line.
If this isn't checked or escaped very carefully, it will be possible that a malicious...
August 25th, 2007, 09:09 AM
The Atheros chipset seemed considerably more capable than any other I've tried... its main cool feature is operating in several modes at once (e.g. it can be an accesspoint AND a station).
It basically boils down to:
1. Don't pass any string directly into SQL without appropriate escaping - ideally use prepared queries
2. Audit use of dangerous functions such as eval(), system()...
April 5th, 2007, 03:00 PM
McKinnon was an idiot for what he did and deserves justice, but not what the US have in store for him.
I hope the lords see sense and block his extradition, at which point he can be tried here...
March 11th, 2007, 06:38 PM
Consider analysing large files etc that are using most of your bandwidth. Assuming you have direct access to the log files, you can see which files are responsible for most of the bandwidth and...
March 10th, 2007, 11:09 AM
If the web mail account uses HTTPS, you're safe.
Otherwise, you're probably at risk.
Open wifi networks are easy to intercept from some distance away - this makes them very risky. If you're...
March 10th, 2007, 11:06 AM
You should set up a separate virtual host on the HTTP site, and simply configure it with a redirect to the HTTPS site.
For example, if you were using Apache,
March 3rd, 2007, 08:02 PM
Yes, all Atheros chipsets have these advanced features.
"Monitor mode" is not the same as promiscuous mode. "Promiscuous" mode accepts packets from any host on the same wireless network, whereas...
February 19th, 2007, 09:09 PM
Most routers will behave as a wireless access point anyway. As mentioned by stevel, you need to disable the router's DHCP server.
I use this configuration:
- Disable DHCP server
- Assign a...
January 26th, 2007, 08:28 PM
Session timeout can also be set on a per-session basis in the application, and there are other reasons for sessions timing out.
In ASP-classic (Which I assume is what you're referring to),...
December 9th, 2006, 12:50 PM
Running a honeypot without egress filtering is a REALLY bad idea.
Your machine will start doing all manner of bad egress once it is compromised, and subsequently your IP will get blacklisted, your...
November 30th, 2006, 10:19 AM
If all these devices are logically on the same ethernet segment, they should probably be in the same IP range.
If you're running out of IPs, consider using a LAN IP range bigger than class C. The...
November 30th, 2006, 10:06 AM
I think I completely misread the question- I described a scenario for having two wireless nodes out of range of each other talking via a pair of accesspoints and a wired network.
What the OP...
November 25th, 2006, 11:54 AM
Rather than using wireless routers, if you shun their routing ability, and just make them behave as bridges, then you can certainly do this.
Routing is a red herring- you don't need any routing to...
November 21st, 2006, 10:02 AM
I second Wireshark (previously known as Ethereal). It works on Linux and Windows, and is (relatively) easy to use with a GUI.
There are a few weird things, like the capture filter syntax is a bit...
November 15th, 2006, 11:19 PM
Rather than increasing the maximum number on the server, try reducing the number of client connections instead.
If you have one or more web servers connecting to the MySQL, try reducing the number...
November 14th, 2006, 02:42 PM
You can run several IP networks on the same ethernet LAN. This is not a normal configuration, but it is a valid one.
Provided there aren't any duplicate addresses (e.g. non-overlapping IP ranges),...
November 6th, 2006, 11:54 PM
Open wireless access points don't have any encryption or authentication. So unless you're using a protocol which has some built in (e.g. HTTPS), your traffic may be compromised by a sniffing and/or...
October 20th, 2006, 11:20 AM
You could rename the main() method in a.c and then declare it in an external header file (a.h).
Then include that header file in b.c and just call the renamed main method. When compiling the...
September 29th, 2006, 02:39 PM
You're not going to be able to configure those types of options without root access to the server. Apache needs quite a few of those options in httpd.conf (or its includes).
If you can't do it in...
September 26th, 2006, 11:20 PM
Don't let your web site being hit by worms alarm you; this happens to every web server, all the time- in fact often many times per day.
These worms pick random IP addresses and/or hostnames to...
September 20th, 2006, 06:27 PM
It's a web client limitation. It's built into the client application and is completely deliberate, and is a feature not a bug.
The W3C recommend that a web client application creates no more than...