Search:

Type: Posts; User: droby10; Keyword(s):

Page 1 of 7 1 2 3 4

Search: Search took 0.05 seconds.

  1. Replies
    20
    Views
    16,946

    no offense, sdk, but given that you're the only...

    no offense, sdk, but given that you're the only one familiar with the objectives of the host/environment - and haven't even mentioned what software applications the users will be running...expecting...
  2. Thread: Security Cert

    by droby10
    Replies
    18
    Views
    13,636

    me thinks you are misinterpretting the wording of...

    me thinks you are misinterpretting the wording of "an elective credit" for meaning "scott-free". essentially, by having those certs, you get to skip the P.E class if you want. but you're still...
  3. Replies
    7
    Views
    4,977

    there are a couple of theoretical approaches at a...

    there are a couple of theoretical approaches at a network level, but neither of them are going to yield any form of success in practice. you could do this via multilayered tunneling (which has...
  4. Replies
    25
    Views
    30,102

    they're in the ntds.dit, there are also a number...

    they're in the ntds.dit, there are also a number of internlized ways to provide redundant access to passwords. although some form of discretion must be accounted for.
    ...
  5. Replies
    7
    Views
    3,559

    i'll try to simplify the clarity of pointers. ...

    i'll try to simplify the clarity of pointers.

    when you declare a pointer

    char *p;

    the pointer declaration(*) should be assumed to be a part of the type specification.

    so after...
  6. Replies
    19
    Views
    15,516

    the guys hosting your site should have acted...

    the guys hosting your site should have acted quicker...i'd notify them that anyone logging into anywhere in that network segment between now and the time stated above needs to change their password...
  7. Replies
    19
    Views
    15,516

    sorry for the delay...been away. yes, i was...

    sorry for the delay...been away.

    yes, i was saying not to delete it for two reasons both relating to maintaining the state of the system. 1) the timestamp as noted and 2) the contents of the...
  8. Thread: Error Msg Help

    by droby10
    Replies
    5
    Views
    2,269

    something is attempting to register a com...

    something is attempting to register a com server....when it pops up, leave it open and take a look at the process/application list for anything suspect. it could just be a faulty software...
  9. Replies
    19
    Views
    15,516

    pull the plug - you've found the evidence, now...

    pull the plug - you've found the evidence, now you need to analyze without interruption. look at time stamps for the entire system based on the ctime of the setuid cgi script. were the web logs...
  10. Thread: AO club rulez

    by droby10
    Replies
    20
    Views
    20,639

    i am jacks aching diaphragm from laughing so hard.

    i am jacks aching diaphragm from laughing so hard.
  11. you could do this...but the real issue is...

    you could do this...but the real issue is shellcode not extended or embedded sql commands.
  12. Replies
    8
    Views
    4,462

    anonymous neg: it's always nice to see...

    anonymous neg:


    it's always nice to see creativity within a poor case of comprehensive reading skills...if i was "whining", there would have been a 'why'. i made a simple statement; actually i...
  13. Replies
    11
    Views
    13,911

    i understand and support your point, but the...

    i understand and support your point, but the absoluteness of it can be argued.

    for instance, cryptoanalysis is often done prior to developing a new cypher to guard against weaknesses in any...
  14. Thread: Private IPs

    by droby10
    Replies
    21
    Views
    11,447

    a default routing setup will route regardless of...

    a default routing setup will route regardless of network and host address; the rfc indicates that the reserved blocks _should_ not be routed in public networks; and are in most cases implemented as...
  15. Replies
    9
    Views
    5,691

    a modem...? well, then i wouldn't be as...

    a modem...?

    well, then i wouldn't be as concerned as previously illustrated as you don't have a ethernet interface (ppp) or it's virtual (some implementations of pppoe).
  16. Replies
    9
    Views
    5,691

    hmmm.... theoretically, if the attacking...

    hmmm....

    theoretically, if the attacking computer is local on the network, i could see how it might be possible to point you at a different dns, gateway, etc. such that you'd be on one end of a...
  17. Thread: Byte Patches

    by droby10
    Replies
    2
    Views
    1,932

    consider the logical structure of an assembled...

    consider the logical structure of an assembled program, where offsets are used for execution flow. in the following simplistic example, such a 4 bit change can be seen.



    0x80483d0 <main>: ...
  18. Replies
    12
    Views
    4,023

    what...like a large group of people at ao, who...

    what...like a large group of people at ao, who are supposedly "security-conscience" are the first to plug their ears, gag their neighbors, and blind-fold their children when anything controversial...
  19. Replies
    12
    Views
    4,023

    more than likely it's done through the detection...

    more than likely it's done through the detection of whether or not the test browser is the active window (which is accomplishable in javascript, no extra perms or controls needed).

    here's an easy...
  20. Replies
    7
    Views
    3,112

    there is a duality in aspect with certifications...

    there is a duality in aspect with certifications and jobs. i think everyone is aware that certifications don't really mean anything with regard to performance levels. granted it is a token of...
  21. Replies
    1
    Views
    3,122

    the use of commenting features is database...

    the use of commenting features is database dependent (which you didn't list). my guess, is that you are using access - which doesn't provide this functionality.

    but i've also experienced similar...
  22. Replies
    8
    Views
    4,462

    hey, since all the heavy hitters are giving out...

    hey, since all the heavy hitters are giving out greens....i could use a bigger buffer for those times where i play devils advocate and get slammed for it.

    or you can neg me for trying...but you...
  23. Replies
    9
    Views
    3,665

    the distinction between this guy's actions and...

    the distinction between this guy's actions and those who do "good hacking" is obvious, isn't it? "good hacking" does exist, is valued, and even pays well. had max stayed on the straight and narrow,...
  24. Replies
    2
    Views
    4,940

    spoofing in a nutshell

    i've posted another one of my older tutorials on my site. again, leaving it there so that i can make modifications/edits as needed and the formatting abilities. this reproduction was in response to...
  25. Thread: Books

    by droby10
    Replies
    7
    Views
    3,323

    along with the above suggestion for tcp/ip...

    along with the above suggestion for tcp/ip illustrated (these top my list).


    Title: Applied Cryptography, 2nd ed.
    Author: Bruce Schneier
    Publisher: John Wiley & Sons
    ISBN: 0-471-11709-9
    ...
Results 1 to 25 of 165
Page 1 of 7 1 2 3 4