Search:
Type: Posts; User: cashmoney; Keyword(s):
Search:
Search took 0.02 seconds.
-
September 6th, 2005, 03:46 AM
There is a work around for this, but I have not been able to find that clear text passwords are stored.
-
September 3rd, 2005, 01:22 AM
I had the exact same scenario two weeks ago. Nail.exe was easily removed, but 8 billable hours later I was finally able to get to the hive and clean the system.
-
September 3rd, 2005, 12:42 AM
Yeah, we began receiving spam related to Katrina at work. I published a small advisory in the weekly company newsletter yesterday to warn all the employees to be careful if they planned to donate.
-
August 30th, 2005, 12:50 AM
Does it keep the LUser from clicking the hyperlink to update his bank account information?
-
August 26th, 2005, 12:48 AM
ik - i'll buy that. sorry if I offended anyone, by the looks of my only antipoints now gone I must have.
-
August 25th, 2005, 11:44 PM
catch - if Iwere to setup a honeypot in my environment, someone could use it as a legal defense of entrapment.
I in no way was giving legal advice. What I was saying is that there are in fact...
-
August 25th, 2005, 04:07 AM
After an obvious reinstall, consider using tripwire next time and monitor it. Tripwire will alert you to any file changes that occur, tipping you off that something is happening to your system...
-
August 20th, 2005, 08:19 PM
Work: CyberGuard
Home: Smoothwall and Sygate on windoze boxes
-
August 20th, 2005, 08:16 PM
I think all he wants to do is open PC files on a MAC. What OS are your running on the PC and what kind of MAC and OS version are you using? What kind of files are you wanting to transfer? This...
-
August 20th, 2005, 08:06 PM
The trick is to do packet capturing prior to the need for forensics. Most people want to find out what happened to their systems after the fact but they didn't do any logging or any other type of...
-
August 20th, 2005, 07:46 PM
Thought I would share one that I just received.
Of course, I don't bank at Armed Forces Bank. If you mouse over www[dot]afbank[dot]com you will be taken to a site located at...
-
August 17th, 2005, 06:41 PM
Don't get rid of it. This is the monitor installed for AC '97 sound drivers which is most likely your on board sound.
O4 - HKLM\..\Run: [AGRSMMSG] AGRSMMSG.exe
O4 - HKLM\..\Run: [NvCplDaemon]...
-
July 16th, 2005, 05:53 AM
try using certificate authentication or some type of 3-factor authentication like RSA
-
The only thing I can find that will allow you to send two SYN packets is using the -PS option in addition to the standard -p option.
-PS sends a TCP SYN ping to a specified port.
-
I'm seeing the same thing as HTRegz and th13. No matter what I do to the timing only one SYN is sent out.
-
June 30th, 2005, 04:18 PM
I would have to disagree with this statement. If you are going to hire a consultant to advise you on the security of your network. The consultant is going to have to do some hands on to provide a...
-
June 29th, 2005, 09:23 PM
Funny you bring this up. This just came out today.
Cisco buys Netsift
By Peter Sayer, IDG News Service, 06/27/05
Cisco Monday said it has agreed to pay $30 million for a
year-old start-up,...
-
June 29th, 2005, 08:25 PM
pack as much memory as you can in the box. VMWare uses 256M per OS. A good rule of thumb is 256 x each OS + the host OS.
-
June 28th, 2005, 05:04 PM
Sorry if the last post was harsh, but like everyone else is saying we are trying to keep you out of trouble. Adhere to the AUP. One more thing, make sure encryption does go against the policy. ...
-
June 28th, 2005, 04:54 PM
I could read your aim message no matter what laptop your using. Changing the mac has nothing to do with sniffing the network. If I own the network, I have the authority to sniff it.
-
June 28th, 2005, 04:18 PM
There are several resources on the web for cloning mac addresses.
I'm with SirDice though. Illegal activity or not, violating policy is something I wouldn't recommend. I'm guessing your a...
-
June 28th, 2005, 02:44 PM
A book I would recommend:
Hacking Exposed
You cannot understand security fully, if you don't understand how you can be hacked. This book is good a taking you through the methodology of an...
-
June 28th, 2005, 01:32 AM
I agree passing compliance means that you are at least providing the security that is required. It's funny how you can have a little non-compliance to get the funding to increase or upgrade your...
-
June 28th, 2005, 01:26 AM
XTC46,
You're right about WPA. If implemented correctly (basic rule, use a complex passphrase) it is very hard to break. WPA requires someone to capture an enormous amount of packets in crack it....
-
June 28th, 2005, 12:59 AM
Great post. I came across this once before but couldn't remember what the site was.
|
|