Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: Dr Toker; Keyword(s):

Page 1 of 20 1 2 3 4

Search: Search took 0.03 seconds.

  1. Replies
    35
    Views
    3,014

    Nah, i spend my money on "Rent" and like...

    Nah, i spend my money on "Rent" and like Bills.... ya know... after that, theres really not a lot left..
  2. Replies
    35
    Views
    3,014

    Grand theft AUTO is a big difference than a video...

    Grand theft AUTO is a big difference than a video game. Come on... get real Neg...



    * uhmm... acctually i guess GTA is a video game too... but i was referring to Negs lets steal an audi...
  3. Replies
    35
    Views
    3,014

    Minimum wage, over seas outsourcing, a poor...

    Minimum wage, over seas outsourcing, a poor education system, and a pop culture that is telling people to be stupid spoiled whores, or only care about money and dey bling. A capitalist society that...
  4. Replies
    19
    Views
    2,098

    Well, I'm not 100% certain about this wireless...

    Well, I'm not 100% certain about this wireless setup you have, but i know that if you plug a switch into your router, then plug all your hosts into that, you can spoof yourself as the gateway, and...
  5. Thread: Lame Aim Worm

    by Dr Toker
    Replies
    12
    Views
    1,851

    awesome, Yeah i figured since it was sent to me,...

    awesome, Yeah i figured since it was sent to me, others would have gotten this same deal. But with me, there was no link to a php script.. it was a direct link to the file.


    What i was...
  6. Thread: Lame Aim Worm

    by Dr Toker
    Replies
    12
    Views
    1,851

    Lame Aim Worm

    I got a message from some obscure, probobly random person on my buddy list, telling me to click here..i know the person the link came from (or at least i think i do)... so i click.. (I have already...
  7. Replies
    4
    Views
    1,033

    Re: How to attack Firefox code

    Is anyone else wondering how this flaw with different charactars being allowed, lets people run arbitrary code? So far I havent found anything technical, only news articals like this one.
  8. Replies
    6
    Views
    706

    I guess...but really the only threat is a Denial...

    I guess...but really the only threat is a Denial of Service. I personally am not too worried with my home box getting DOS'd. But even if I was, I'm certain that these packets could be blocked at...
  9. Replies
    20
    Views
    3,524

    This is a surprise to me. I know you can like use...

    This is a surprise to me. I know you can like use a proxy, or a compromised server to have that machines IP show up as the one making the connection, but thats not really spoofing. What is involved...
  10. Replies
    20
    Views
    3,524

    You cant spoof your IP while maintaining an SMTP...

    You cant spoof your IP while maintaining an SMTP connection. As far as I knew the only way to spoof your IP was with connectionless protocals, or something like that. You cannot maintain a...
  11. Replies
    43
    Views
    2,815

    Re: Disturbing trend - Hiding in plain sight

    At the risk of sounding like an amature, I'm not sure I understand what you mean by tunneling out to C&C. Honestly when i see C&C i think of command and conquer. Heh.. but for real, what is this...
  12. Replies
    5
    Views
    1,286

    Odds are it is someone you know who hacked your...

    Odds are it is someone you know who hacked your email account. Your secret question was prolly something gay like, "Whats your pets name". All your friends know your pets name. Bah.. like i said...
  13. Replies
    10
    Views
    109,741

    How many times has this one been done. You must...

    How many times has this one been done. You must forgive me, as I have seen this thread about 4 times in as many years... But it was definatly well written.
  14. Replies
    13
    Views
    1,481

    Couldnt you just run VNC over SSH? *guesses...

    Couldnt you just run VNC over SSH?


    *guesses he should acctually read the post...
  15. Replies
    5
    Views
    698

    quote: Users are adviced to take immediate...

    quote:
    Users are adviced to take immediate specific action to contain the impact. Example: 'MSBlaster' worm outbreak.

    I dunno if you guys know how much it sucks to have been working a Dial up...
  16. Replies
    29
    Views
    4,792

    This is quite a shock to me. I thought Netstat...

    This is quite a shock to me. I thought Netstat was infallible. With all the different syntax i have always been able to find what I need or suspected.

    I thought Netstat simply checked all TCP/UDP...
  17. Replies
    8
    Views
    1,141

    I thought you had to download some server...

    I thought you had to download some server application(Spyware) for them to be able to search your Desktop.
  18. Replies
    21
    Views
    1,819

    In my experience... I just made a private network...

    In my experience... I just made a private network and flooded my roommate to test vulnerablilties and such. Its safe that way.. just get behind a HUB/Router and you can do what ever you want without...
  19. Replies
    15
    Views
    1,764

    Allow me to be frank... /nick Frank Okay, to...

    Allow me to be frank...
    /nick Frank

    Okay, to me, Spyware is any software installed when I want to view a website, a movie, anything. It is software that I dont want, that you wanna give me...
  20. Replies
    40
    Views
    4,530

    This is crazy. Alot of these numbers work. All...

    This is crazy. Alot of these numbers work. All that comes to my head is.... "Stupid Spoiled Whore, Video Playset!"
    ...
  21. Replies
    7
    Views
    1,966

    So, lemme drop my RX in here.. Computer...

    So, lemme drop my RX in here..

    Computer Crimes are a realativly new concept, and the law makers have had trouble locking down a penalty. I do know that if you cause Monitary loss of up to or over...
  22. Replies
    6
    Views
    1,253

    Re: My Internet Is All Messed Up!!! Help!!

    Why are you even going through a proxy to access the internet at all? Does your entire ISP go through one? If not, I suggest to simply disable the proxy setting in Internet Explorer. ...
  23. Thread: Stopping P2P

    by Dr Toker
    Replies
    11
    Views
    1,303

    If you enter the router' config, you should be...

    If you enter the router' config, you should be able to rate limit Packets matching a specific criteria. So if the P2P client he is using is, Azureus (bittorrent), then you would wanna rate limit...
  24. Replies
    7
    Views
    2,135

    ARP poisoning: In a nutshell it turns a machine...

    ARP poisoning: In a nutshell it turns a machine on the network into the Gateway more or less. That way, all the traffic goes through the machine running an ARP Poisoner, allowing them to packet...
  25. Replies
    14
    Views
    1,023

    Scientific Question

    So, I know this has pretty much NOTHING to do with computer security and all but its driving me crazy. I'll just post it here, cause I have seen more intelligent people on this board over the past...
Results 1 to 25 of 500
Page 1 of 20 1 2 3 4