Search:
Type: Posts; User: smirc; Keyword(s):
Search:
Search took 0.03 seconds.
-
February 19th, 2004, 08:48 AM
No this won't work. The MAC address of all the PING replies will be the MAC of the local gateway for his subnet. The only way to find out MAC addresses on another network is if your have access to...
-
February 13th, 2004, 02:10 AM
source: http://francisco.terawap.co.uk/file_tree_list.txt
-
February 10th, 2004, 07:58 AM
Just to clarify, the general rule is:
Swtich to Switch (or Router to Router) = use a cross over
NIC to NIC = use a cross over
NIC to Switch (or NIC to Router) = use a straight through
It's...
-
October 15th, 2003, 05:40 AM
It's cause you're only reading in the first part of the file. You probably want something more like:
use MIME::Base64 qw(encode_base64);
open(FILE, "/var/log/wtmp") or die "$!";
while...
-
June 14th, 2003, 04:12 AM
Just knowing the address of a router on your network/subnet, does not mean that someone can get your IP address. But they can narrow it down substantially. eg if the router's address is a class B...
-
June 14th, 2003, 03:54 AM
Hmmm...the article was pretty vague and contains little information to increase security at the application level. However the link at the bottom contains a lot of good information on securing BIND...
-
I could say the same thing about a lot of industries.
LOL
Red one's go faster. ;)
-
It's true that for some mail servers that are poorly configured, you can use SMTP to get lists of user names. The commands you're probably interested in are VRFY and EXPN. Take a look at RFC 821...
-
Like mike, if I could be like mike. :P
Dick head.
-
Good point but it's also worth noting that rand and srand are both inherently *unsafe* for generating random numbers for things such as crypto keys ie. anything that you don't want someone to be able...
-
Exactly right. It's not google's responsibility to babysit slack web site administrators. If you're a web admin and you've never heard of robots.txt, now you have so there's no excuse. ;)
-
swiftstyles: You're a dick. You probably cut and pasted that when you could have written a l33t Perl script. Grow up. And I can tell from just seeing the top of your head that you are ugly. :cool:
-
Korpdeath: Sounds like a pretty obscure sort of problem. You problably won't have much luck with your question here, since the level of BSD enthusiasts is quite low at AO by all accounts. You might...
-
The weird bit is the fact that your machine is conected to this other box (which looks like your ISP machine for handling modem connections) on port 12. Port 12 is a low port AND it's not assigned. ...
-
Damn...it's in VB. I can't open it. :-)
-
-
It takes processing power to drop packets too. This is why DOS/DDOS attacks are so hard to defend against. If it was as simple as "limiting the amount of packets" DOS attacks wouldn'
t be a...
-
This looks sweet. I'll have to try it out. Once I graduate I'll have more time to get back into some more hackering/programming. :)
-
It's worth noting that the same thing applies to HTTP POSTs for some applications. For example squid is configured by default to reject HTTP POSTs greater then 1MB in size which can be an annoying...
-
A port scanner is essentially a program that probes a number of TCP/UDP ports on a machine to see if it's possible to connect. A connection idicates a service/deamon is running on that port.
...
-
April 22nd, 2003, 03:39 AM
This is typical of girls who are too gutless to tackle the real issue. There's no such thing as letting someone down nicely. Rejection is bad enough. Prolonged rejection is downright cruel. She's...
-
April 17th, 2003, 07:56 AM
If you think she's cheating on you, you've got bigger problems than learning how to install a keylogger. Have you tried talking to her about it?
-
April 11th, 2003, 10:32 AM
Can't connect eh? Try the following:
1.) Do you have sshd/telnetd running? Do a netstat -atunp | grep LISTEN and see if ports 22 and/or 23 are listening.
2.) Is iptables/ipchains in the way? ...
-
April 11th, 2003, 10:26 AM
Performance. If you want performance and security...there's always OpenBSD. ;)
-
April 5th, 2003, 04:59 AM
I had a look at your code and I noticed a few things to start with:
1.) You're falling into one of the common newbie traps of code:
if ( choice = '1' ) { // do blah!!! }
Wrong. This is...
|
|