Search:

Type: Posts; User: seiferaistlinlp; Keyword(s):

Search: Search took 0.02 seconds.

  1. Replies
    10
    Views
    7,367

    And don't you dare go to websites you haven't...

    And don't you dare go to websites you haven't heard of! Screw discovering new things!
  2. Pretty much exactly like that.

    Pretty much exactly like that.
  3. Easy to use Network Protocol Analyzer

    I've been searching for a network protocol analyzer (read: packet sniffer) that is not only easy to use, but doesn't require a C, Perl, etc. compiler. Does anyone know of any good ones? Please...
  4. 17. Take your laptop with wireless connection...

    17. Take your laptop with wireless connection and see how many people just like you try to hack your connection (using something like AirSnare). I get enough kicks out of just doing this at home. ...
  5. Replies
    34
    Views
    26,723

    lol good job TheSpecialist...I might have been...

    lol good job TheSpecialist...I might have been offended if I got offended by brutish jackasses. Nah, how about YOU go **** YOURself? I think I might enjoy that a little more.

    But, seriously, I...
  6. Replies
    34
    Views
    26,723

    They seem to be up to no good. They have...

    They seem to be up to no good. They have keyloggers and Trojans, for God's sake. Yeah, they don't seem to be the "White" hat kind of guys. I'll post over at hackthissite.org and see if anyone...
  7. Driver Installation Error 1F6 (Windows 98)

    I just purchased (and had activated) SBC Yahoo! DSL. Well, I have two computers that I need to install the service on: one connected directly to the router (called a "HomePortal..." whatever), and...
  8. Replies
    3
    Views
    6,281

    VNC (http://www.realvnc.com) works quite well,...

    VNC (http://www.realvnc.com) works quite well, too, though I am not sure if it can get past most firewalls. I know that Kerberos (the XP firewall) does indeed block it.
  9. Replies
    1
    Views
    5,574

    MD5 Hash Algorithm

    I really don't understand the MD5 Hash Algorithm. I have Ankit Fadia's Network Security: A Hacker's Perspective (which, I know, is just plaigerised material from the Net) and it describes it, but I...
  10. Replies
    18
    Views
    11,519

    You're probably right cgkanchi, but it's a good...

    You're probably right cgkanchi, but it's a good source nontheless. It has all those things in one place, which is a good reference.
  11. Replies
    18
    Views
    11,519

    Most of the time it is under a second. ...

    Most of the time it is under a second. Traceroute, for example, almost always takes less than a second. You have to be careful when pinging systems. There are ways to detect people pinging your...
Results 1 to 11 of 11