Search:
Type: Posts; User: DragonK; Keyword(s):
Search:
Search took 0.01 seconds.
-
March 4th, 2003, 07:41 PM
The sendmail vuln is not related in any way to the exchange server, but it's possible that this one, too, might have a bug not discovered yet...
-
March 4th, 2003, 06:33 PM
Like tampabay420 said, there are this signatures which basically work like this:
|------------------------------------------------------------------|
| Executable .... | attached virus .. 01 02...
-
March 4th, 2003, 06:27 PM
We don't need a war on the Internet, caused by script kiddies with their brand new tools... Imagine the following case: 2 companies have a reactive IDS which attacks back. Our script kiddie spoofs...
-
March 4th, 2003, 05:53 PM
Linear algebra and groups and stuff I studied in my first year (Computer Science) but... you don't want to know how good I am :PP
-
March 4th, 2003, 05:01 PM
Tiger Shark is right, Google doesen't do something it's not supposed to...
-
March 4th, 2003, 04:58 PM
Yeah, I know about john the ripper, but that is definetly not cryptanalysis, but mere bruteforcing... I'm looking for more delicate ways to do it... But don't get me wrong, don't think that I have...
-
March 4th, 2003, 04:55 PM
FreeBSD is not that hard to install, but it takes a lot of time (there are a LOT of packages)... The harder part comes to configuring it... that's where i'm having problems... Seems like IT doesen't...
-
March 4th, 2003, 03:03 PM
Well, these forensic challenges seem to be cool (i.e. analyzing network traffic or a weird binary file), breaking encryptions, and, why not, a network security contest? (i.e. you are given a network...
-
March 4th, 2003, 02:16 PM
-
March 4th, 2003, 02:13 PM
There are some standards like ANSI, POSIX and as long as your compiler supports them and you write your program according to the standard, it should work.
-
March 4th, 2003, 02:09 PM
Seems unfair not to make public a threat this big...
ehh...power of the money...
-
March 4th, 2003, 02:02 PM
Yeah, 3 wrong guesses + you need a card which is not yours, don't you? :) + the ATM's security cam = trip to jail...
-
March 4th, 2003, 01:53 PM
Interesting...but seems very theorethical... :)
-
March 4th, 2003, 01:38 PM
I'm trying to learn cryptanalysis methods for various ciphers and I could use some tools to help me with that...
I've already tried crank (not good, only pen+paper ciphers) and cryptool...
-
March 4th, 2003, 01:33 PM
Does enybody know where can I find some Forensic challenges sites?
-
March 4th, 2003, 01:30 PM
Can you give me some examples of what software you have written?
-
March 4th, 2003, 01:27 PM
Try this one: http://www.physcip.uni-stuttgart.de/heby/ltmodem/
-
March 4th, 2003, 01:23 PM
Try using a debugger: OllyDBG. It can register itself to popup when such errors occur... Maybe it can help you
-
March 4th, 2003, 01:20 PM
There's a very good book about asembly language (using MASM), called The Art of Assembly (programming?)
You can learn a lot of things from it...
|
|