Search:

Type: Posts; User: qod; Keyword(s):

Page 1 of 7 1 2 3 4

Search: Search took 0.07 seconds.

  1. Thread: securitydocs.com

    by qod
    Replies
    1
    Views
    3,878

    This is a great site, it is growing very fast. I...

    This is a great site, it is growing very fast. I should have started the same thing when i had the idea.
  2. Replies
    1
    Views
    2,226

    Hmm first time i knew that SCO sells software,...

    Hmm first time i knew that SCO sells software, just thought they were on a sueing spree.

    Just kidding although that is what they are doing right now. :D
  3. Thread: XOR Cryptography

    by qod
    Replies
    18
    Views
    16,421

    User.dat is part of the registry, and they might...

    User.dat is part of the registry, and they might contain some information such as serial numbers and such. The user name and password are stored in the SAM file in windows NT based, and in the .pwl...
  4. Replies
    2
    Views
    4,946

    there is a good review on it at slashdot and...

    there is a good review on it at slashdot and probably 300 replies more ;)
  5. Replies
    2
    Views
    3,988

    what C book did you use and would advise...

    what C book did you use and would advise beginners to do.
  6. Replies
    4
    Views
    5,817

    the best bet to do is to try to scan your system...

    the best bet to do is to try to scan your system with an antivirus. If you formated you harddrive you should not see the error. Unless you have a floppy in your machine and you forgot all about it.
  7. Thread: Sniffer log files

    by qod
    Replies
    1
    Views
    5,547

    Sniffer log files

    my friend wanted to know if there is a site, or book that will teach him how to read hex log files from sniffers. Is there any books or sites that cover such topics indeapth.

    thanks
  8. Thread: wake on lan

    by qod
    Replies
    3
    Views
    4,081

    wake on lan

    hi, i do not know which forum to post this message in but if you could please help.
    Has anyone tried to make an Intel pro 10/100 Nic to wake on lan remotely, or evel locally.
    If so could you please...
  9. consider me in. I will probably have something...

    consider me in. I will probably have something about IDS, or some Security thing.
  10. Thread: Hacked Red Hat 7.3

    by qod
    Replies
    18
    Views
    20,422

    the best way to aviod to get hacked is to upgrade.

    the best way to aviod to get hacked is to upgrade.
  11. Replies
    8
    Views
    25,519

    i like the tutorial, although i would like to see...

    i like the tutorial, although i would like to see some tutorial that goes deap and not just repeat what was said in some other articles. How does it work, what are there pros/cons, why should i use...
  12. Replies
    6
    Views
    45,797

    i find it amazing that this tutorial was featured...

    i find it amazing that this tutorial was featured here
    http://www.enterpriseitplanet.com/security/features/article.php/3299971

    just found it today, was searching for snort news and there was link...
  13. using a passive scanning you are able to be...

    using a passive scanning you are able to be invisable, look at tools such as p0f and as said, READ ALOT. :)
  14. Replies
    6
    Views
    45,797

    i tried to make it as indepth as possible, but i...

    i tried to make it as indepth as possible, but i could not put everything i knew into it, i simply do not have time
  15. looks good i will probably read it tommorow.

    looks good i will probably read it tommorow.
  16. Replies
    40
    Views
    19,381

    i would like the book to be advanced, although...

    i would like the book to be advanced, although that is not good for making money it would be good for reading it.
  17. Replies
    11
    Views
    9,735

    Thanks for this great rule files.

    Thanks for this great rule files.
  18. Replies
    6
    Views
    45,797

    you could use any part of it if you want, just...

    you could use any part of it if you want, just put the name, email, and link to the article in the paper you will use it in, also your paper must also be GPL, or The GNU Free documentation licence.
    ...
  19. Replies
    23
    Views
    22,615

    will going into runlevel 1 bypass the password...

    will going into runlevel 1 bypass the password authentication??
  20. Replies
    40
    Views
    19,381

    A walkthough and how to make and use an exploit.

    A walkthough and how to make and use an exploit.
  21. Replies
    8
    Views
    7,343

    passive monitoring will work best against active...

    passive monitoring will work best against active ones, look into RNA (Realtime network awarenes) by sourcefire, or you could modify a program such as p0f to do your needs.
  22. Replies
    6
    Views
    45,797

    here is also the text, so you could edit it and...

    here is also the text, so you could edit it and play with it, just remember to give credit to QoD and put the email address of my self and the date.
  23. Replies
    6
    Views
    45,797

    A look into IDS/Snort Whole thing by QoD

    Here is the full article, all 3 parts.

    ---------------------------------------------------------------------------------------------------


    A look into IDS/Snort

    By: Q.o.D...
  24. Replies
    0
    Views
    5,819

    A look into IDS/Snort part 3 of 3 by QoD

    Well this article was featured in the Antionline newsletter 11 but i decided to post it here as well, because some people do not know where on the world it is, any ways lets dive into this article...
  25. Thread: AO Newsletter #11

    by qod
    Replies
    11
    Views
    50,094

    Cool, I might be writting one for the #12...

    Cool, I might be writting one for the #12 newsletter, still do not know what though.
Results 1 to 25 of 162
Page 1 of 7 1 2 3 4