Search:

Type: Posts; User: InfiniteL00p; Keyword(s):

Page 1 of 4 1 2 3 4

Search: Search took 0.03 seconds.

  1. Replies
    3
    Views
    4,526

    Not at all... you should be fine without having...

    Not at all... you should be fine without having to do anything with the IP stack of your operating system. Check into the docs on the classes you plan to import into your java code - all of the...
  2. Got it..

    The Trendmicro site you pointed me toward got me on the right track. After a little looking around I found it out to be this:

    <snip>
    Discovered: February 18, 2007
    Updated: February 19, 2007...
  3. TCPview isn't really telling me anything - if...

    TCPview isn't really telling me anything - if there's a rootkit involved it wouldn't surprise me if it's hiding itself from WinXP. That IP address may be registered to Level3, but I'm guessing...
  4. Unknown Trojan (reaching out to kicker555.no-ip.info)

    Hey all, long time no see.

    I've discovered a trojan that may include a keylogger on one of my computers today. Quite by accident while repairing some damage done to my DSL modem (my fault!), I...
  5. Replies
    5
    Views
    5,251

    But spam is informative and interesting. I...

    But spam is informative and interesting. I refinanced my home to buy that herbal Viagra.

    But seriously, I read a letter to the editor in the most recent issue of Technology Review - the author...
  6. Replies
    3
    Views
    5,210

    Good article, offers more insight than the...

    Good article, offers more insight than the rank-and-file press release. I took two of Foundstone's courses (Hacking Exposed, and Incident Response) over the past few months. Good stuff, I wonder if...
  7. Thread: Router

    by InfiniteL00p
    Replies
    8
    Views
    7,443

    It also really depends on what type of router...

    It also really depends on what type of router you're talking about. The common home systems (gateways, etc.) are usually administered via a web-like interface on port 80 or 8080, and usually only...
  8. Replies
    3
    Views
    5,210

    Seems like consolidation happens in spurts. ...

    Seems like consolidation happens in spurts. McAfee announced a buy-out of Foundstone on the 16th. Something like $84 in cash. Not bad for a five-year-old company.

    Official press release here:...
  9. Replies
    7
    Views
    7,075

    I promise to have more papers posted there in the...

    I promise to have more papers posted there in the next few months.. I've got a few now, but I'm trying to refrain from the overly-academic papers that look like "homework". No one's interested in...
  10. Replies
    7
    Views
    7,075

    Ish... that's true. That's is also one reason...

    Ish... that's true. That's is also one reason why I haven't posted it there first, although the thesis website is basically a full disclosure of what the project entails and will deliver. Perhaps...
  11. Replies
    7
    Views
    7,075

    Security Papers, etc..

    I've finally got around to posting some of my graduate work on my website.. I've got a small "reading room" with papers on various computer security topics. WiFi, BO2K, Information Warfare...
  12. Carnegie Mellon/InformationWeek Study: Call for Participation!

    Transnational cyber-extortion and its impact on U.S. business is a poorly understood and rarely discussed topic. A Carnegie Mellon University graduate student (that's me), in conjunction with...
  13. Replies
    2
    Views
    4,918

    I just saw that article over on Inquirer, too,...

    I just saw that article over on Inquirer, too, and started looking around for info. Nothing, really, although I did punch in "Kintama" into my Mozilla address bar and accidently hit enter, only to...
  14. Replies
    18
    Views
    11,789

    Here's a finny aside.. a friend of mine called...

    Here's a finny aside.. a friend of mine called mi2g claiming he was a lawyer representing a class action suit against an ISP that failed to take steps to secure its services. (he did this after...
  15. Replies
    11
    Views
    11,136

    Looks like a 2hr advertisment to get...

    Looks like a 2hr advertisment to get people/companies to sign up for highly-priced weekend workshops. Is it cool to post ads here on the open message boards? I think not.

    There's 49 topics...
  16. Replies
    1
    Views
    6,312

    Can you elaborate a bit on your question? This...

    Can you elaborate a bit on your question? This is in the crypto/steganography section.. to what are you referring? Encrypting control characters?

    l00p
  17. Replies
    7
    Views
    13,337

    Tedob1 - isn't PHATBOT a P2P based virus? Even...

    Tedob1 - isn't PHATBOT a P2P based virus?

    Even so, it would be good form to check if anyone in your company (mainly that person with the untrusted laptop) is using P2P services across your...
  18. Replies
    11
    Views
    11,031

    This is, as noted above, the age old question of...

    This is, as noted above, the age old question of security vs. functionality. The article misses this point, with just one allusion to it on the last page. Overall, though, this is what has to...
  19. Thread: comp sec

    by InfiniteL00p
    Replies
    9
    Views
    9,521

    lessthanzero - good suggestion. I've read...

    lessthanzero - good suggestion. I've read Security in Computing. Good reference, too.

    l00p
  20. Replies
    7
    Views
    13,337

    Haven't seen this specifically, but it sure looks...

    Haven't seen this specifically, but it sure looks like it's a RAT or listening Trojan. It takes commands from those IRC channels (much like the other fools). The destination port of 53 is usually...
  21. Replies
    7
    Views
    7,031

    Privacy on the internet is also a good topic... ...

    Privacy on the internet is also a good topic... it leads to identity theft, computer compromise, and all the wonderful things that come along with it.

    Ohh.. better yet, how about a paper on the...
  22. Thread: comp sec

    by InfiniteL00p
    Replies
    9
    Views
    9,521

    Learn about networking first. Too many folks...

    Learn about networking first. Too many folks jump into computer security (or at least try) before they know about OSI layers, TCP and UDP structures, and how all the hardware fits together in the...
  23. Replies
    18
    Views
    11,789

    True indeed - I've read that this group may have...

    True indeed - I've read that this group may have questionable statistics, so here's what I've done:
    1) Emailed them.

    I got a quick response, with a pointer to their FAQ. It talks about how they...
  24. Replies
    18
    Views
    11,789

    Linux Servers: Hacked Most?

    Grabbed a look at this article over at the Inquirer the other day.Mi2G claiming Linux-based servers are the most hacked, in a review conducted in January of over 17,000 "successful" hacks.

    We've...
  25. I didn't know about this MBSA.. just picked it...

    I didn't know about this MBSA.. just picked it up. Good show, MrCoffee!

    l00p
Results 1 to 25 of 81
Page 1 of 4 1 2 3 4