Type: Posts; User: str34m3r; Keyword(s):
Search took 0.04 seconds.
December 1st, 2013, 02:32 PM
Dino unless your planning on using it on a 2.* installation it is kinda out-dated and would require a fair bit of "Hacking" to make it work on 3.* / 4.* vb versions. Why not just mod the current...
January 13th, 2011, 07:17 AM
I dont see a problem with it. Sure, the business have to get involved, but for most organisations they simply cannot function on paper alone. So while they have a immediate use for paper, over the...
October 14th, 2010, 11:53 AM
Irong33k has info on he's site:> http://www.irongeek.com/i.php?page=security/madmacs-mac-spoofer
I'm also positive that he's got a tutorial or 2 located here on these very forums regarding...
March 29th, 2010, 08:01 AM
Spent a bit reading this thread, and i guess the original dwindle in numbers may of been due to this?
if i remember correctly i was not the only person to recieve these "Spam Pm's" a few years...
September 27th, 2004, 07:31 PM
We get quite a few of these at work. It's entertaining to play with these emails to see how far the rabbit hole really goes. Some of them are simple phishing scams, but they're not much fun. The best...
September 24th, 2004, 01:59 AM
I'm not quite gone - I just don't poke my head in here nearly as often as I used to.
Edit: I miss the trivia too. :)
September 21st, 2004, 11:34 PM
I've had a lot of success with Spybot - Search & Destroy. Would you be willing to give it a try?
September 18th, 2004, 03:10 PM
There are lots of IDS's out there that claim to be anomaly detection systems. Most of them end up being just another expensive signature-based IDS once you look under the hood (if they'll even allow...
October 28th, 2003, 02:51 AM
While I agree that it might be useful to make people earn the right to upload code, I don't see much use for controlling the download of code. If I ever have some code that I thought might be...
October 25th, 2003, 02:15 AM
Once you pass a certain threshold (2048 bits may be over that threshold), it becomes easier to brute force the key's password than it is to break the encryption itself. If you're going to go hog wild...
October 18th, 2003, 03:36 PM
The simple answer is that if you're using lynx to surf the web, I don't think you're going to have any issues getting the bandwith you need - even without dividing the bandwidth.
The slightly more...
October 16th, 2003, 11:32 PM
Most of the time, I would agree with thehorse13, but I suppose that there is always room for new ideas and new ways of doing things.
What port scanner do you suppose was the best before nmap? What...
October 14th, 2003, 10:58 PM
Compression is always a computationally intense project, but generic file compression has been done again and again and again and again and again (sensing a theme?). Try selecting one specific type...
October 12th, 2003, 01:15 PM
As part of my job, I occasionally do some work very similar to the officer in the story, so I can empathize with his frustrations. Sometimes you go home at the end of the day feeling very dirty for...
September 27th, 2003, 01:46 AM
I think the point that most of you are missing here is that this paper was written as INDEPENDENT RESEARCH. He was not promoting this paper as if it were @Stake's opinion, just writing a paper about...
September 25th, 2003, 10:10 PM
Have you noticed the search feature in the upper right hand corner? Try doing a search for anitvirus or firewall, you should find hundreds of matches that answer your exact question.
September 25th, 2003, 09:53 PM
Sometimes, if you don't have the most recent service pack installed, new patches won't install properly and will fail silently. While this is not true for all MS patches, I have run into it on more...
September 25th, 2003, 08:25 PM
That IP is the default IP that all windows boxes use when dhcp requests fail. I'd check your cables and the dhcp service on the xp pro box if it ever happens again.
August 5th, 2003, 02:15 AM
Check out this post for a discussion on raw sockets:
If you're really interested in learning, you'd probably be better off learning a...
July 27th, 2003, 02:54 PM
Hey, Would you mind posting the zip file for us to pick apart? Call me crazy, but I enjoy doing computers forensics and reverse engineering malware.
July 24th, 2003, 10:10 PM
I'm going to have to go with jdenny on this one. You never instantiated mb and inside the contructor you have the line :
That's most likely where your null exception is coming from.
July 24th, 2003, 09:06 PM
If you're interested in more tools and links to those tools, try out the Top 75 list from insecure.org:
July 19th, 2003, 09:31 PM
Basic 'net send' probably doesn't work because a lot of ISP's now block ports 135, 137-139, and occasionally 445. There is however another way around. For Windows 2000 and later, net send attempts to...
July 19th, 2003, 03:12 AM
Were you asking a question or just making an announcement?
July 19th, 2003, 03:09 AM
I'll ask a potentially stupid question, but do you have arctic silver or some other heat transfer compound between them? I've had a system shut itself down before because I didn't cover the entire...