January 14th, 2003 06:23 PM
Thanks for the above link, I have been reading it in parts.
I know that exploits seem to be a large category to speak of, but besides the buffer overflows, are there other common vulnerabilities...
January 14th, 2003 05:54 PM
Thanks for the information about the mp3 exploit but what about other exploits?
I mean, how do people figure this stuff out? How do they write these codes to exploit these vulnerabilities?
January 13th, 2003 07:28 PM
Thanks guys so far, but after reading some stuff I have some more questions.
I read about the Windows XP vulnerability with bad mp3 files which can crash your computer.
Now, my question is, how do...
January 9th, 2003 12:52 AM
Hey guys, thanks for the information.
I'll check out those sites and read some of the suggested readings. I guess there's no straight answer to it, is there? At least it isn't that easy for anyone...
January 8th, 2003 09:14 PM
I'm completely new to this set of mind, and I tried reading a tutorial by someone called Revelation and got completely lost.
So I figured I'd ask you guys. :)
Exactly how does a hacker get into a...
January 8th, 2003 09:10 PM
Hello everyone at AntiOnline.
I'm quite new to this computer thing but I want to find out as much as I can about them.
They seem to be quite interesting, but also very complicated.
I just recently...