Search:

Type: Posts; User: MK19; Keyword(s):

Search: Search took 0.27 seconds.

  1. Replies
    9
    Views
    8,641

    Measures are usually taken into account to hide...

    Measures are usually taken into account to hide the algorithm. thats part of the security of cryptography.
  2. Replies
    8
    Views
    8,841

    I have it. Its a great book. I just read a...

    I have it. Its a great book. I just read a chapter on rogue wireless devices. It reads like a spy novel. Based on scenerios and such. I recommend it. i picked up some good stuff out of it. i...
  3. Replies
    18
    Views
    22,060

    The militery is still running Windows 98 in some...

    The militery is still running Windows 98 in some places. The technology may be state of the art in the militery but its still using Vietnam equipment. I am in a Signal Bn and we are using at least...
  4. Thread: 680180.net

    by MK19
    Replies
    6
    Views
    5,811

    Also try using Mozilla Firefox. I started using...

    Also try using Mozilla Firefox. I started using it with spyblaster and I haven't gotten anything since. I recommend it to all my friends

    http://www.mozilla.com
  5. Thread: Centrino sucks?

    by MK19
    Replies
    6
    Views
    6,249

    You should be able to use either one. I just...

    You should be able to use either one. I just wouldn't use both at the same time. Just remember to turn off the internal one if you use the card. You don't want one running WEP and the other wide...
  6. Replies
    47
    Views
    19,479

    Good test........ 100%.... I'm so smart!!!!!!...

    Good test........

    100%.... I'm so smart!!!!!!

    Some you had to pay attention to.

    Post some more things I can do while I should be working!!!!
  7. Replies
    133
    Views
    59,330

    We know too little about his idea to validate or...

    We know too little about his idea to validate or criticize. But just the fact that he is not willing to share anymore info about it makes it a little fishy.

    Security is a on-going process. The...
  8. Replies
    10
    Views
    8,318

    You can also look into getting a more...

    You can also look into getting a more "directional" attenea. A parabolic is kinda expensive but it offers more direct signal and some of them you will have to either be in the line of sight or...
  9. There is another way of doing polyalpebetic...

    There is another way of doing polyalpebetic ciphers. It may be the same idea though.

    You have a key word KEY and the message Break this cipher

    you arrange the tables according to the keyword...
  10. Replies
    12
    Views
    7,318

    Give something that they can relate to in both...

    Give something that they can relate to in both the office and real life. like shoulder surfing and spyware. Maybe you can somehow show them how much information spyware can actually send out. The...
  11. Replies
    41
    Views
    45,167

    For all the "newbies" in security. ISC2 also...

    For all the "newbies" in security. ISC2 also offers the SSCP which is a down-scale version of the CISSP. It is geared more toward people with limited security experience and requires 1 year in a...
  12. Thread: Just In

    by MK19
    Replies
    0
    Views
    3,681

    Just In

    Just saying hi to everyone

    I'm sorta new to the practice of computer security but not completely. I've spent a few years in telecom in the militery so I have a militant state of mind when it...
Results 1 to 12 of 12