Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: yogurtu; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.02 seconds.

  1. Replies
    14
    Views
    2,628

    nice redhead

    Although... she looks like Master Yoda...
    :D :D :D
  2. Replies
    9
    Views
    1,599

    Hi Deeboe!! Well... I didn't supply them...

    Hi Deeboe!!


    Well... I didn't supply them with my IP in the last fiscal year!

    :D

    Cheers !!!
  3. Replies
    9
    Views
    1,599

    Hi Nokia! Thanks for answering! Well, it...

    Hi Nokia!

    Thanks for answering!


    Well, it doesn't ring any bells, unfortunately.


    I wasn't aware of the 'o' flag for netstat. My fault. I should have read more carefully the documentation...
  4. Replies
    9
    Views
    1,599

    Hi HT! Thanks for your really prompt...

    Hi HT!



    Thanks for your really prompt answer! I went there and downloaded the tool. This is now part of my list of favourite tools!
    What I found is that the process listening to that port was...
  5. Replies
    9
    Views
    1,599

    Help needed (port 1040 open)

    Hi all!
    Well, I was trying to secure my box, and I ran netstat -a -n and found the tcp port 1040 open (among other ports which I know why are they there for).
    I tried to find information on how...
  6. Replies
    9
    Views
    1,675

    Hi Csch! Thanks for replying :) I went...

    Hi Csch!
    Thanks for replying :)


    I went here and found some VB6 source code for SHA256. I converted it to VB.Net 2003, and attached it to this post.
    I double checked the final VB.Net app with...
  7. Replies
    9
    Views
    1,675

    Hi Ammo! Thanks for replying. I was thinking...

    Hi Ammo!
    Thanks for replying.

    I was thinking in storing the hash elsewhere. This configuration file will be generated by us, and we want to detect if someone is trying to change config files to...
  8. Replies
    4
    Views
    900

    Hi Spyrus! I am not much of an administrator,...

    Hi Spyrus!

    I am not much of an administrator, but with windows you always have the 'at' command. Can you use this to run the batch programs?

    HTH
  9. Replies
    2
    Views
    796

    I don't believe my eyes... Let's hope they...

    I don't believe my eyes...

    Let's hope they don't charge one billion euros for the source code ;)

    However it'd be great if they actualy share the code.
    Cheers!
  10. Replies
    9
    Views
    1,675

    Hi SirDice! Thank you for replying. Well,...

    Hi SirDice!

    Thank you for replying.
    Well, actually the algorithm is very old, it is a basic thing for scrambling things. To my opinion it is very weak. I believe former developers found it...
  11. Replies
    9
    Views
    1,675

    Thanks Helena! While peeking around, I found...

    Thanks Helena!
    While peeking around, I found this interesting.
    I didn't know of many ways of doing this.
    Since I am most confortable with C#, I will use the C# implementation found here, and...
  12. Replies
    9
    Views
    1,675

    Which one? MD5? SHA-1?

    Hi All,
    I have an application which needs to store some information in a configuration file.
    We decided to encrypt the information with an algorithm that is commonly used across the company.
    I...
  13. Thread: A Bit rude

    by yogurtu
    Replies
    8
    Views
    821

    This makes me think... I should go back to first...

    This makes me think... I should go back to first grade... and stay there!
  14. Replies
    33
    Views
    2,611

    Hello Dynamoo! The latest news I received on...

    Hello Dynamoo!


    The latest news I received on this, was that we were being advised by a very strong law firm in the IT area. I heard they were going to collect evidence of the intrusion. This I...
  15. Replies
    33
    Views
    2,611

    Hello Dynamoo! The latest news I received on...

    Hello Dynamoo!


    The latest news I received on this, was that we were being advised by a very strong law firm in the IT area. I heard they were going to collect evidence of the intrusion. This I...
  16. Replies
    33
    Views
    2,611

    Hi Tiger, Thanks a lot :cool: I will keep...

    Hi Tiger,


    Thanks a lot :cool:
    I will keep in touch.

    Cheers
  17. Replies
    33
    Views
    2,611

    Hi Tiger, Thanks a lot :cool: I will keep...

    Hi Tiger,


    Thanks a lot :cool:
    I will keep in touch.

    Cheers
  18. Replies
    4
    Views
    740

    Re: How much of it changed?

    Hi Tyger Claw!

    Just some thoughts...
    I have developed with VB6 between 1999 and 2002, I even have an MS certification for desktop apps with VB6. Since 2002 I began developing with .Net.
    Usually,...
  19. Replies
    33
    Views
    2,611

    Well, first of all, please accept my apologies....

    Well, first of all, please accept my apologies. English is my second language, and I didn't explain myself correctly.
    I should have said 'I thought that SNORT scans only network traffic'. I didn't...
  20. Replies
    0
    Views
    613

    Almost new here

    Hi all!

    I joined AO last week, and I am glad to say that I am quite enjoying the experience.

    It is my usual behaviour to do things first and then read manuals / FAQs... For that reason, please...
  21. Replies
    33
    Views
    2,611

    Thanks Tiger Shark! Because of ignorance, I...

    Thanks Tiger Shark!

    Because of ignorance, I thought that SNORT 'only' scanned network traffic, and I didn't consider implementing it.
    Thanks to your suggestion we will study how to implement...
  22. Replies
    33
    Views
    2,611

    Status update

    Hi all,
    For all of you that are following this thread, I wanted to let you know what has been decided technically.

    We are going to replace our executable files in all of the workstations, with...
  23. Replies
    33
    Views
    2,611

    Re: Incident Response

    Hello Judgement!


    Yes we were. They did not accessed our SQL tables. They only used the proper stored procedures to perform their business operations. They did not perform any incorrect...
  24. Replies
    33
    Views
    2,611

    Thanks Tiger Shark, Well, as our software...

    Thanks Tiger Shark,


    Well, as our software has errors, so has our company :(
    This is a very small company (less than 50 employees).
    Formally, I hold a position of some importance here, but...
  25. Replies
    33
    Views
    2,611

    Thanks Tiger Shark, Well, yes! It is a very...

    Thanks Tiger Shark,

    Well, yes! It is a very difficult situation, because unless we initiate legal action, we are bound to provide the service. We cannot just shut them down. Not unless we are in a...
Results 1 to 25 of 34
Page 1 of 2 1 2

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides