Search:
Type: Posts; User: Neptune0z; Keyword(s):
Search:
Search took 0.05 seconds.
-
June 28th, 2006, 10:23 PM
The older pdf encryption schemes were very weak, and mainly relied on encryption thru obscurity and can be cracked very easily with a 100% success rate. Just goolge around a bit to learn the...
-
June 28th, 2006, 10:10 PM
"Thanks, but cipher does the seem to have an option for just doing a few files, it only want's to do whole voulmes which takes too long." --irongeek
Just as sdewis said...
"cipher /W:C:\ where...
-
June 28th, 2006, 03:24 PM
Check out the cipher.exe that comes standard with Windows XP...I only use the professional version, but im pretty sure it's included in the home version as well...I beleive this is what your looking...
-
June 16th, 2006, 04:24 AM
"With what you said above, more options would equal less security. KISS"
-- gore
Ya...I see where your going with that one, but what about usability and customization?
Give a child a tablesaw...
-
June 16th, 2006, 04:17 AM
Sounds like a job for metasploit!
Check out the link...
www.metasploit.org
-
June 16th, 2006, 04:02 AM
Sorry bro...I didn't mean to insult SUSE...lol...I was saying things as I saw em thats all...I'd post a reply to your comments but im afraid too, lol...you nit picked every one of my reasons...
...
-
June 16th, 2006, 03:26 AM
"OpenBSD does something any OS could do. They ship with everything turned off by default. SUSE could do the same thing...
Why not go over WHY you like OpenBSD? I'd personally like to know the...
-
June 10th, 2006, 06:34 PM
An entire book could be written on custom *nix security mods, but i'll just try to cover the high points...P.S...Im specifically talking about OpenBSD here, but the principles should apply to almost...
-
Essentially what your talking about is blocking or filtering active content at the TCP layer...I mean sure you can setup your browser to filter out active content, but that data is still making it to...
-
Ideally, You would only provide him with the data that he needs...Why not just burn it to a CD?
Sure you can use something like TrueCrypt for XP to encrypt various partitions, but what happens if he...
-
Honestly, I think you might be taking the wrong approach here...A good authentication system will require a user to provide two things:
Something you know, and something you have...
...
-
"TCP Wrapper and SSH Port Forwarding for 1000 Alex" -RoadClosed
There's your fix...
If it is using some form of filtering higher up in the OSI model, your going to have to "wrap" the SSH...
-
Well...The simplest way would probally be to just mention some links in your inbox...Maybe you could mention that FTP server that will be running next week on your home system, so you can share your...
-
You didnt get over your head with that resume you posted on monster.com did you? lol
The actions you should take are going to depend on a policy that you've decided BEFORE the incident occurs....
-
"I wonder if Ms can get in trouble as this would come under antitrust or something like that.?" -front2back
M$ looks out for itself pretty good in the EULA...Unknowing to most users, after they...
-
What the ?
Sorry about that triple post.Im not sure what happened, my browser acted like it was timing-out. Guess I should have checked it before resending.On an unrelated note: I was using...
-
I doubt you will have any luck getting Earthlink or an ISP to release any IP records. However, there are always simpler methods you could take into your own hands...
Why not spread a little honey...
-
nice thread...
Anyhow...Attacks using techniques like your talking about, work on the principle that it is possible under the right circumstances to alter the return address of a function to allow...
-
This depends on exactly what you mean by "software restriction". Basically you can enforce a security policy and restrict software two different ways on a *nix system. Of course the methods you...
-
January 4th, 2006, 12:15 AM
Interesting idea...There's a lot of talk right now about using worms/trojans and such to scan and identify hosts that are vulnerable to new exploits. These systems are then "infected" with a patch...
-
November 21st, 2005, 09:01 PM
Your DLL would contain some basic functions like
InstallHook
UninstallHook
HookProc
The first two are self explanitory, HookProc is the code you want to execute qhwn your hook is called...
-
November 21st, 2005, 03:48 PM
Sounds like your code is creating a local hook instead of a remote one...Did you include your hook procedure in a DLL (Global hooks require the procedure to be in a DLL)? It's also very import to use...
-
November 16th, 2005, 09:21 AM
When using wireless it's very important to use WPA. This is because WEP is totally insecure and easily crackable, and has been for some time. Those people buying wireless access points this year for...
-
November 16th, 2005, 09:00 AM
Your talking about cookie managment, which really has little to do with a firewall. Most web browsers allow you to control how internet sites can interact with your computer. Cookie managment allows...
-
November 15th, 2005, 01:16 AM
"In the real world..that just doesnt happen..............I have yet to find a basic end user with a 14 character password...I have been able to get better passwords...using pass phrases instead."
...
|
|