Search:
Type: Posts; User: mayhem991; Keyword(s):
Search:
Search took 0.02 seconds.
-
New spy tools--for good or evil?
By Declan McCullagh
CNET News.com
April 21, 2003, 5:13 AM PT
COMMENTARY--Cisco Systems has created a more efficient and targeted way for police and...
-
April 15th, 2003, 11:37 PM
:) I want to thank everyone for their comments, and port lists. Thanks and much appreciation.
-
April 15th, 2003, 02:29 AM
My firewall seems to be stopping a lot of traffic aimed at port 17300. Do you know what it might be. My list of trojans does not list that port.
Thanks
-
April 10th, 2003, 07:55 PM
Look at this site, there are a few you can look at
http://www.chebucto.ns.ca/~rakerman/trojan-port-table.html#Protect-Soft-Win
-
April 10th, 2003, 05:36 PM
I too use ZoneAlarm Pro 3.7.159 and pest patrol for trojans/spyware. I passed the Symantec test. You probably had a problem on the trojan part if you don't use a product for trojans/spyware/ and...
-
March 10th, 2003, 03:36 AM
The internet grew out of military research, the DARP net, then the ARP net, finally the internet. It is an excellent tool for communicating. After the 9-11 disaster only the internet was reliable. ...
-
February 27th, 2003, 01:41 AM
Iraq as a nation is a loose collection of tribes some that have been there since before civilization as we view it existed. Some if not most of these tribes have been terrorized by Saddam or his...
-
February 25th, 2003, 02:04 AM
I looked and didn't see it.
-
February 25th, 2003, 12:24 AM
A Swiss research team claims to have cracked SSL.
-
February 25th, 2003, 12:18 AM
More headlines
E-mail a friend
LovGate worm opens backdoor, hits network shares
By Edward Hurley, News Writer
24 Feb 2003, SearchSecurity.com
-
February 20th, 2003, 03:39 AM
As an old and I do mean old assembler language programmer, I must ask why this fascination with assembler language? You use a language for its advantages. At the moment I must say that C and C++...
-
February 18th, 2003, 02:07 AM
There are probably as many reasons to write virii as there are psychotics who can program. The question is not why they do it, but how we can stop them. The prospects of prison doesn't stop them...
-
February 17th, 2003, 11:59 PM
Credit card security is lax because of the consumers. They want convenience and aren't worried about "A few bucks." After all they are only liabel for a minimal amount if their card is lost or...
-
February 16th, 2003, 04:00 PM
I copied the folllowing:
1. Symantec's Norton Anti-Virus Fails to Work After Loading Corrupt
Anti-Virus Definitions
Received: 2003 Feb 13 11:19 AM
Vendor: Symantec
...
-
February 15th, 2003, 09:45 PM
The questions that come to mind are where do you want to live and what are your interests. Various schools have computer programs and each has its strengths. I'd look on the west coast of the...
-
February 15th, 2003, 01:36 AM
Trojans, RATS, Keyloggers and Spyware are problems as far as I'm concerned. The first three are or at least can be hacker tools and the last is a commercial invasion of your privacy. They are all...
-
February 15th, 2003, 01:06 AM
If they read my e-mails they'd die of boredom. I have serious moral problems with that proposal, as I believe in respecting my fellow man. My question is would it be enforced equally or would they...
-
February 14th, 2003, 04:15 AM
No one firewall is best for everyone. If one were developed all the other companies would have to file for chapter 11. Look at the various features and find the one you like using and use it. I...
-
February 14th, 2003, 03:30 AM
Even though I and most Americans, including those who live in the United States, don't like it, the president of the United States can order the military in without a declaration of war.
-
February 14th, 2003, 03:22 AM
How powerful do the computers using this algorithm have to be? To be useful the algorithm must run on a commonly used computer.
-
February 13th, 2003, 04:09 AM
The IRS uses mainframes, mostly IBM from what I've heard. I don't know of anyone who has sucessfuly written a virus that would run on a mainframe. The next problem would be how to get it on a...
-
February 13th, 2003, 03:59 AM
If you want to know how to hack, read the first few chapters of IIS Security by Marty Jost and Michael Cobb.
The book sellls for about 50.00 USD. It is one of my favorites. It discusses security...
-
February 13th, 2003, 01:26 AM
A cheat learns to mistrust because he/she learns that actions cannot be trusted. They cheat themselves because they fail to learn the lesson. It is a total loss situation.
-
February 12th, 2003, 03:51 AM
Here's the story.
http://eletters1.ziffdavis.com/cgi-bin10/flo/y/eTx30EVLbU0E4J0uOd0Al
-
February 11th, 2003, 04:09 AM
> > You take your dog for a walk and you both use the same tree.
> >
> > You can entertain yourself for more than an hour with a flyswatter.
> >
> > Your property has been mistaken for a...
|
|