Search:
Type: Posts; User: Gump; Keyword(s):
Search:
Search took 0.03 seconds; generated 39 minute(s) ago.
-
April 23rd, 2007, 02:59 AM
First off, my family and I have prayed for the VT victims, their families and the community every day since it happened.
I thought I would post this, it is kind of the anti-gun free zone.
...
-
September 30th, 2006, 11:01 AM
snax,
Basic things to help secure WAP are:
Turn off your SSID broadcast - This will help, but only a little bit, it does not keep someone from getting your SSID only keeps your WAP from...
-
September 16th, 2005, 02:29 AM
BS,
Kerio also has a free version that I highly recommend. It is free for personal use and is one of th emost configurable of all the software firewall products on the market.
...
-
September 5th, 2005, 03:13 AM
For my kids I use We-blocker:
http://weblocker.fameleads.com/
Itis completely free and fully functional at that price.
It has fully functional filters and can block by any URL you add to the...
-
On A GSM network it works like this:
Each GSM tower location is known, either plotted during installation and fed in manually, or since each one has a GPS in it nowadays, they just turn it on and...
-
March 13th, 2005, 03:38 PM
Yes a trojan can bypass netstat, usually with a little help.
In addition to the excellent advise of nihil , I would recommend a utility that has the same functionality as netstat but is external...
-
November 2nd, 2004, 03:55 AM
Kezman,
Seperate your commands with a ; and Linux should execute them one after another:
"mount /dev/hda1;mount /dev/sda2;cp /dev/hda1/windows/syatem32/config/* /dev/sda2/.;umount...
-
October 11th, 2004, 04:56 PM
SANS toook it a bit further this year. They added info on how to patch, mitigate the effeects of the vulnerabilitites.
Somethings are new to the lists from years past and others have just...
-
October 3rd, 2004, 03:18 AM
aeallison, I have had the same type of problem with AVG, can't get the d/l e-mail. I think I narrowed it down to the SPAM filters at my ISP. Since the info is auto generated, maybe?
Somebody...
-
September 5th, 2004, 10:28 PM
Just a couple of sites dedicated to this sort of thing:
http://www.seattlewireless.com/
http://nocat.net/
Lots of really good info and links to related information.
I Love these 2 sites...
-
July 27th, 2004, 01:48 AM
Security on SAT is pretty good. Most of that stuff is C-Band or L-Band, though some are in the K, X, or even Ka bands ( http://history.acusd.edu/gen/recording/spectrum.html ). Other than the...
-
July 23rd, 2004, 02:40 AM
Tiger, (I'm a certified card carrying RAIDERHATER, just thought you should know that)
To drive home a point on password policy, demo PWDUMP and John or L0pht crack. Like your hacking demo they...
-
July 23rd, 2004, 02:33 AM
Nice intro, a couple of add ons to anyone interested. hidden is right on track with the letter frequency gig, first step in breaking a simple code like the example. Frequency of letters in english...
-
July 23rd, 2004, 02:19 AM
Good steps from Spyrus,
I would add to be careful if you choose the passphrase option to generate your keys. It will generate 4 keys and you will have to select the one you want to use. You...
-
July 17th, 2004, 10:22 PM
Been to Tracks I and IV, both were excellent.
FYI, when I attended Track IV in Wash DC. There were a couple of guys in the track with us who were working for the conference. They had signed on...
-
Soda,
The way it works here is that the E-mail is forwarded but the attachment is stripped off, there is a reference to the stripped file left in the E-mail. Looks like:
<<blahblah.exe>>
...
-
Yes you would have to go with one of those two options. You could put a hub (notice not a switch or router) on the same segment as the server and use a second box to run snort. Or upu could run it...
-
April 29th, 2004, 09:48 PM
There are several ways to Enumerate (check your spelling) an OS. Since you already know it is Red Hat 7.3 you can check out Bugtraq and know exactly what to look for. Founstones' Hacking Exposed...
-
April 26th, 2004, 01:41 PM
A great resource for wireless info and advice is
http://www.nocat.net
For 3ntropy and Jinxy this may help with your antenna issues, or be fun to play with.
...
-
April 6th, 2004, 01:29 PM
For a variety of general information, that is both informative and entertaining you should ceck out Ed Skoudis' page.
http://www.counterhack.net/
He periodically issues hacker challenges done...
-
April 1st, 2004, 04:44 PM
Ran accross this and couldn't resist.
http://bbspot.com/News/2000/4/linux_distros.html
Hope everyone enjoys it as much as I did!!
-
March 19th, 2004, 10:04 PM
Okay,
HiJackThis is an executeable, run it and save the log. Easy enough, then go through the log line by line and check it against the attached HTML based help file.
Anything that stands...
-
March 19th, 2004, 09:54 PM
<0
They write all of their own code for the product in PYTHON. During the demo they showed the code but I don't remember if it came with the product or they only gave us a glimpse as part of the...
-
March 19th, 2004, 06:29 PM
<0
I went to a demo of Core Impact during a SANS conference in Dec. It is written in Python and maintained with all of the latest public, and some not so public, exploits. It is fast and easy...
-
March 18th, 2004, 03:18 AM
Good advice, HiJackThis is the way to go. Makes life easy for this sort of thing.
|
|