Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: tenzenryu; Keyword(s):

Page 1 of 3 1 2 3

Search: Search took 0.01 seconds.

  1. Replies
    23
    Views
    2,615

    Hi, It depends on what you want to achieve....

    Hi,

    It depends on what you want to achieve. Most taught Masters teach a mixture of technical and business skills and are particularly suited to someone with a bit of industry experience who wants...
  2. Replies
    23
    Views
    2,615

    Royal Holloway, University of London also runs a...

    Royal Holloway, University of London also runs a distance learning course at about 10000 pounds. These taught Masters courses seem to come in at around the same price. Have you considered a...
  3. Replies
    13
    Views
    3,235

    Hi, The problem with what you are describing...

    Hi,


    The problem with what you are describing is the maths. Essentially, an ennumerator program (which can be quite easily written using C++ for example using a data structure to hold 24 x 255...
  4. Replies
    13
    Views
    1,575

    Hi, Human beings live in a hierarchical social...

    Hi,

    Human beings live in a hierarchical social system (i.e. there is a pecking order) which is a necessity for the kind of social cooperation (i.e. team work) which is the root of all successful...
  5. Hi, Wouldn't another reason be that the...

    Hi,

    Wouldn't another reason be that the Rainbow project is nearly in which will seriously undermine password cracking as a pastime?

    Yurt Ennez
  6. Hi, I am neither anti estab nor non anti...

    Hi,

    I am neither anti estab nor non anti estab. I just think MS are headed in a direction which will include security but is not security up to the eyebrows in the way we would like to see it.
    ...
  7. Replies
    1
    Views
    1,073

    Hi, Why don't you put the RSS feed from The...

    Hi,

    Why don't you put the RSS feed from The Register on the site? If nothing else, you get to see some of my articles.

    Ntyru Zene
  8. Hi, Actually this is quite amusing when you...

    Hi,


    Actually this is quite amusing when you think of it in terms of the Internet. It was not designed with security in mind (or at least not what we mean by security) and I haven't heard anyone...
  9. Hi, D**n, I'll have to up the 'anti'. I...

    Hi,

    D**n, I'll have to up the 'anti'.

    I think you have to remember the background to all OS security development over the past few years. The previous thing was 'functionality' up to the gills,...
  10. Hello-o It's just I am really getting tired...

    Hello-o


    It's just I am really getting tired of people who declare themselves l33t because a) they dis MS and b) they can spell l33t - get a life!


    I don't think MS have got it wrong - they...
  11. Replies
    23
    Views
    2,397

    Hi, Google Earth would work in some areas....

    Hi,

    Google Earth would work in some areas. Although slightly out of date, the pictures could give away features of someone's house, car, nearest shops, restaurants. This would allow you to send...
  12. Hi, I think the main point I was making was...

    Hi,


    I think the main point I was making was that I was tired of people dissing Microsoft. It's old is what I am saying. I also think my argument about network economics stands. While you can't...
  13. Hi, Actually, the discovery of multiple...

    Hi,


    Actually, the discovery of multiple securities in Windows derives exactly from the fact that it is the largest in the marketplace. This is network economics at work. Windows is dissected...
  14. Poll: Hi, There are a lot of problems with Common...

    Hi,

    There are a lot of problems with Common Criteria assessments, not the least of which is that the economics of the way tests are carried out means that CLEFs that test rigorously will go out of...
  15. You are still mixing up a management policy...

    You are still mixing up a management policy (which is normally a bunch of useless platitudes) with an engineering concept that can be used to verify your security architecture. However I agree about...
  16. And this is precisely where the problem lies. ...

    And this is precisely where the problem lies. The threat model should drive the security policy model which in turn should drive the procedural (external legislative and as well as internal...
  17. I rather think you have missed the point. This...

    I rather think you have missed the point. This is an engineering model which should be capable of expressing mathematically or algorithmatically any external legislative requirement.

    It is not...
  18. Security Policy Model Creation for a Networked World

    Devising Information Security Policies

    Introduction

    Is your organisation's information security a bunch of meaningless soundbites or a soundly engineered set of principles by which you devise...
  19. Replies
    10
    Views
    1,827

    Hi O I dunno, I liked the one which invited me...

    Hi

    O I dunno, I liked the one which invited me to participate in criminal fraud for untold sums of money. At least it was reasonably original.

    Richard
  20. Replies
    0
    Views
    684

    At least we still have Paros!

    Hi

    I was on pen testing training recently and we were introduced to the Paros tool which acts as a software proxy for IE (Mozilla has something similar built in) and allows you to trap your POSTS...
  21. Replies
    9
    Views
    1,052

    Hi, SQL injection happens when an improperly...

    Hi,

    SQL injection happens when an improperly validated data field can be used to inject SQL statement or exec commands into your dbms.

    The validation can fail either at the client end (i.e....
  22. Replies
    10
    Views
    1,228

    Thanks for the head's up. what is the best...

    Thanks for the head's up. what is the best software to do this?

    R
  23. Replies
    10
    Views
    1,228

    I would like to know if it is legal to crack the...

    I would like to know if it is legal to crack the copy protection on Playstation 2 games and on computer games. My kids go through the disks like wildfire meaning that I essentially pay 30 or 40...
  24. Replies
    4
    Views
    939

    The implication is then that the hacker sets up a...

    The implication is then that the hacker sets up a script up to scan a range of hosts on a particular port which is likely to be open (one of the common ones that normally has to be open e.g. 53, 80,...
  25. Replies
    16
    Views
    3,095

    I think the problem is that, as The Specialist...

    I think the problem is that, as The Specialist rightly says, the word 'hacker', 'cracker' usw are chucked around too much. It should be clear by now that different people criminally infiltrate...
Results 1 to 25 of 55
Page 1 of 3 1 2 3