Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: owensleftfoot; Keyword(s):

Page 1 of 4 1 2 3 4

Search: Search took 0.01 seconds.

  1. Replies
    5
    Views
    1,287

    Most of the implementations on...

    Most of the implementations on http://www.portknocking.org appear to be alpha or beta - I wouldnt use them yet anyway.
  2. Replies
    5
    Views
    842

    Add chroot_local_user=yes to your...

    Add chroot_local_user=yes to your /etc/vsftpd/vsftpd.conf
  3. Replies
    5
    Views
    842

    Add chroot_local_user=yes to your...

    Add chroot_local_user=yes to your /etc/vsftpd/vsftpd.conf
  4. Replies
    2
    Views
    835

    That would be...

    That would be http://www.k-otik.com/exploits/04212004.THCIISSLame.c.php
  5. Replies
    4
    Views
    431

    I use mutt myself, but in a gui mozilla-mail is a...

    I use mutt myself, but in a gui mozilla-mail is a good bet.
  6. Replies
    5
    Views
    584

    Share a directory on the windows 2000 box. On the...

    Share a directory on the windows 2000 box. On the redhat box make a new directory under /mnt ie mkdir /mnt/win
    then use the command mount -t smbfs //windowsboxname/sharename /mnt/win on the redhat...
  7. Replies
    39
    Views
    2,993

    The strings command under linux comes up with -...

    The strings command under linux comes up with -
    WSAGetLastError
    WSAStartup
    __WSAFDIsSet
    accept
    bind
    closesocket
    connect
    gethostbyname
    htonl
  8. Replies
    6
    Views
    840

    Not so long ago there were only a couple of...

    Not so long ago there were only a couple of soundcards. Your AC 97 is probably just a sound blaster clone. The enviroment variable is there for dos compatabilty. It allows dos games etc to know what...
  9. Replies
    6
    Views
    757

    I get exactly the same errors compiling spike on...

    I get exactly the same errors compiling spike on fedora - gcc version 3.3.2
  10. Replies
    12
    Views
    2,677

    According to...

    According to http://vil.nai.com/vil/content/Print99296.htm the name of the trojan is configurable by by the hacker who customises it.
  11. http://geodsoft.com/howto/password/cracking_passwo...

    http://geodsoft.com/howto/password/cracking_passwords.htm has what you are looking for.
  12. Replies
    18
    Views
    2,065

    Attrition.org...

    Attrition.org dont seem to have much time for them any way.
  13. Languard network scanner is a good freeware...

    Languard network scanner is a good freeware security scanner - you can get it here -

    http://www.gfi.com/lannetscan/networkscanner_freeware.htm
  14. "What amazes me though, is that out of the entire...

    "What amazes me though, is that out of the entire post of how Microsoft security is improving, you bypass all of it and focus on a comment I sided out about nix."

    It was the bit that caught my eye...
  15. Replies
    29
    Views
    3,197

    "Bill Gates was a brilliant businessman but no...

    "Bill Gates was a brilliant businessman but no programmer."

    Gate wrote a basic interpreter for the altair which had to fit in less than 4k of memory. I would call that quite a programming feat. I...
  16. "*nix has just as many security problems as...

    "*nix has just as many security problems as windows, and patches are made for both. You can not critisize windows for creating patches to HELP security, while Linux does the exact same thing."
    ...
  17. Replies
    4
    Views
    1,127

    Go into device manager and remove your network...

    Go into device manager and remove your network card. Reboot and windows should reinstall your network card along with tcpip.
    HTH.
  18. I dont use a personal firewall. I dual boot with...

    I dont use a personal firewall. I dual boot with redhat (I use iptables) and win98. I dont have file and print sharing enabled - let them scan away.
  19. Replies
    10
    Views
    1,139

    /etc/pam.d/authconfig is just the pam permissions...

    /etc/pam.d/authconfig is just the pam permissions file for running the authconfig program. The actual program is /usr/bin/authconfig or /usr/bin/authconfig-gtk for the x version.
  20. Replies
    10
    Views
    1,139

    Try "chkconfig ypserv off" without the quotes.

    Try "chkconfig ypserv off" without the quotes.
  21. There is also a freeware program specifically...

    There is also a freeware program specifically made to identify devices which windows only shows as a yellow question mark in device manager. You can get it here - http://www.zhangduo.com/udi.html
  22. Replies
    8
    Views
    889

    Have you installed the msblast patch? Its worth a...

    Have you installed the msblast patch? Its worth a go anyway. You can get it at http://msblast.maruhn.com/msblast-patch.html
  23. Replies
    13
    Views
    1,112

    From "man grep". -q, --quiet, --silent -q,...

    From "man grep".

    -q, --quiet, --silent -q, --quiet, --silent
    Quiet; do not write anything to standard output. Exit immedi-
    ately with zero status if any match is...
  24. Replies
    7
    Views
    842

    I would guess the option is grayed out because...

    I would guess the option is grayed out because windows cant find your modem.
  25. Replies
    18
    Views
    1,857

    Uninstalling bonzi buddy should do the trick :)

    Uninstalling bonzi buddy should do the trick :)
Results 1 to 25 of 95
Page 1 of 4 1 2 3 4

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides