Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: Tuskin; Keyword(s):

Page 1 of 5 1 2 3 4

Search: Search took 0.03 seconds.

  1. Replies
    3
    Views
    808

    PHP wont connect to MySQL!

    Alright I hope to make this very easy to follow and easy to answer... rofl! ha! I have now idea what's going on and I'm a little annoyed at it!

    First I didnt have the extensions directory stated...
  2. Replies
    11
    Views
    1,841

    Thanks everyone. I'll take a look at process...

    Thanks everyone. I'll take a look at process supervisor. I cant use it yet but I'll try it at home. Thanks again.
  3. Replies
    11
    Views
    1,841

    Windows XP Priority Levels

    Hey everyone! I have looked on google and around here but I havent found an answer. I want to perminantly set the priority for iexplore.exe to high. Right now I am at someone's computer - not mine or...
  4. Replies
    2
    Views
    758

    Well I thought it would be a simple act of...

    Well I thought it would be a simple act of checking the data before submitting it... maybe a select case? You could check if it's html or sql code... look for keywords. it's not supposed to be text...
  5. Replies
    4
    Views
    606

    I was going to paste it up here but that is the...

    I was going to paste it up here but that is the exact same thing as mine
    (Waste of space) so if anyone has any ideas please lend a hand
  6. Replies
    4
    Views
    606

    I know the .sh is a shell script. I dont have a...

    I know the .sh is a shell script. I dont have a copy of the file avaliable right now but it's streight from divx.com and it should be correct. If you have installed Divx or any other player that will...
  7. Replies
    4
    Views
    606

    Linux - cant get install.sh to do anything

    I've looked all over google and I cant find anyone who has had problems installing divx. I dont know if I'm the only one who doesnt know what he is doing but i just cant figure it out. I extracted...
  8. Replies
    32
    Views
    5,999

    no0Dle, if you are interested I did do a review...

    no0Dle, if you are interested I did do a review on how to undelete in Linux but it's a little complicated. I made the 'review' as basic as possible and it's source is there as well. If you are indeed...
  9. I just read that 2 minutes before I came here and...

    I just read that 2 minutes before I came here and of course I am not supprised it's already on the boards. The idea of a controlale worm that attacks with a specific pattern I am sure has been...
  10. Replies
    9
    Views
    1,663

    I am looking to 'cheat' but I want to make my...

    I am looking to 'cheat' but I want to make my own. I'm not looking for some pre-packaged one click there ya go type thing. I am actually looking to learn and hopefully use that in a security related...
  11. Replies
    50
    Views
    3,923

    mine is simple and I didnt read any of the ones...

    mine is simple and I didnt read any of the ones above because I am tired... if you want to make something better I'd say the load time. Even on a T1 or DSL I have had slow load times (most times the...
  12. Replies
    6
    Views
    691

    what about the thread about user handles? That...

    what about the thread about user handles? That thing is about a year old if not that old and I remember reading it when it was first out there... why the heck is it back up? No one replyed to it, i...
  13. Replies
    15
    Views
    1,503

    i took the dateable one and got a 75... u suck...

    i took the dateable one and got a 75... u suck JCHostingAdmin
  14. Replies
    8
    Views
    868

    He wants a silver spoon... He has gotten links...

    He wants a silver spoon... He has gotten links and locations for all the resources he needs (really helpful links) and now started another thread... We cant know every single detail of the problem...
  15. Replies
    9
    Views
    1,663

    what would that mean for exploitation? They would...

    what would that mean for exploitation? They would have to be working with 'texts'? What kinds of measures do they have to prevent tampering with packets and other authentification protocals. If the...
  16. Replies
    10
    Views
    1,370

    Great

    That has to be one of the FUNNIEST ones I have ever read! That was the best laugh I have had all week! Keep the FBI off your back or they might connect to your dynamic LCD connection errr something.
  17. Replies
    9
    Views
    1,663

    thanks everyone, I'd add greenies to ya but I'm...

    thanks everyone, I'd add greenies to ya but I'm way over on my pos and I'm being forced to give out negs (I think I'll stay where I am on AOpts) but anyways thanks a whole lot. hollow_man, I was...
  18. Replies
    9
    Views
    1,663

    Online Game Vulnerablilities

    I've decided to take a 'turn' in my focus and I am looking for a place where I can find information on how to know when there is a hole and understand how to manipulate it and correct it. Both have...
  19. Replies
    17
    Views
    997

    the first thing that would come to my mind... how...

    the first thing that would come to my mind... how the heck would someone I met at a booth or 'communication centre' to make calls would get my email address... I dont tell people in the real world my...
  20. Replies
    23
    Views
    1,549

    orbits are 99% of the time not circles but...

    orbits are 99% of the time not circles but eliptical (I say 99 and not 100 because it's possible but I dont know of any perfect orbits)
  21. Replies
    16
    Views
    1,132

    yeah you have a complete freeze and everything in...

    yeah you have a complete freeze and everything in the house locks down... the air starts to fade.... then you black out... it'd be the new black screen of death but this time it's all you'll see from...
  22. Replies
    9
    Views
    803

    well I'm just trying to eliminate all unnecessary...

    well I'm just trying to eliminate all unnecessary ports. When I get all those UDP blocked messages it's telling me I cant connect somewhere using IE. I have set up programs that I allow access and...
  23. Replies
    9
    Views
    803

    OK, my understanding of what I think is going...

    OK, my understanding of what I think is going on... it will send for the information on any random port over 1024 and it will either recieve it back on 80 or just another random port. My...
  24. Replies
    9
    Views
    803

    that isnt when I'm getting the messages. I start...

    that isnt when I'm getting the messages. I start IE and www.google.com is my homepage... It starts to open and boom message UDP XXXX is blocked and it wont go anywhere... I allow all and it'll let me...
  25. Replies
    15
    Views
    972

    yanksfan, yeah that is alright for 'sensitive'...

    yanksfan, yeah that is alright for 'sensitive' materials but I'm talking everything... if it's got the ability to be traced back to others or it's even my email from sears.com that I'm 'trashing' I'd...
Results 1 to 25 of 121
Page 1 of 5 1 2 3 4

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides