Search:
Type: Posts; User: Guus; Keyword(s):
Search:
Search took 0.08 seconds.
-
August 2nd, 2005, 06:38 AM
I'm exploring some of Java's Cryptography Extension. I'm trying to create a function that lets me calculate a hash of some string (for storing passwords in a database, for example). Using various...
-
After gore's first four parts, I'd like to contribute a little on the subject as well. So far, gore touched these topics:
Part 1: Determine a security policy
Part 2: Password safety
Part 3:...
-
udpcast worked for me about two years ago. I used it in a netboot/backup-situation where the used ramdisk (for booting) was under four mb's. You'll find more information at http://udpcast.linux.lu/
-
April 15th, 2005, 08:52 AM
All the "you're all morons, I'm never posting here again" bullshit aside: Congressman Tom Davis dropped a bill that makes internet hunting punishable by up to five years in prison. (source:...
-
April 14th, 2005, 04:58 PM
I never used perlscript before, but as I'm seeing it, you're never suppling a value for your textfield. That way, the contents of that textfield will always be empty. Try this:
<HTML>
<HEAD>...
-
April 14th, 2005, 08:30 AM
Dude, about one third of your posts are Java-related. You do know that there's a huge Java-forum at http://forums.java.sun.com, do you? There's a list of topics that covers most questions you could...
-
March 27th, 2005, 11:14 PM
This could be the first time that I can use a "All your base are belong to us" reference in a context that actually makes sense! ;)
Translated by someone not familiar with botnets, probably.
-
March 8th, 2005, 06:50 PM
There are less attacks on a product that hasn't been around that long, that's common sense. Wait a year, try again, and I'll bet you that you'll see significantly more attacks on SP2 machines.
-
March 2nd, 2005, 08:15 PM
Disregard me, I have my head stuck up my ass. I was quoting sshd_config, not ssh_config. In ssh_config, the order -does- indicate preference.
-
March 2nd, 2005, 08:10 PM
I'm not an expert, but as far as I know specifying "Protocol 2,1" doesn't force the client to use SSH2. You're merely giving the client the choice between two versions. The order of the numbers...
-
February 18th, 2005, 10:09 AM
You can block port 80 perfectly fine. You will be able to keep browsing. You won't be able to host your own webserver though (not configured to use that default port anyways).
Identd is typically...
-
February 15th, 2005, 08:13 AM
I know I'm from a backward place, but we already have something like this! It's called 'dog' and works on ambulances and fire-engines too!
Seriously, I don't think you'll be hearing much of this:...
-
February 13th, 2005, 01:20 PM
I'm not sure what you mean by this. Did you actually install a SQL-server (or do you have access to a SQL-server?)
What your message is saying is that it cannot connect to a SQL server. It's...
-
February 13th, 2005, 01:13 PM
I registered on EBay yesterday and when I was registering, I had to make up a password. When I entered my new password, EBay showed me how safe my password was while I typed it. That made me add...
-
February 9th, 2005, 03:46 PM
I enrolled in a CCNP course today. I'd like to run some of the assignments at home, but I don't have any suitable hardware laying around. Does any of you know of some software to simulate a Cisco...
-
February 4th, 2005, 10:47 AM
If I understand correctly, you're having troubles positioning the pictures within your pages. I think a technique called CSS (or Cascading Style Sheets) will make your life easier: You can group some...
-
February 3rd, 2005, 09:03 PM
Thanks, Ega, but I had it figured out. count(*) did the trick :)
-
February 3rd, 2005, 01:47 PM
Thought: You're mostly concentrating on removing the concequenses of the hack, you're not really looking for the origin of it. You might get lucky and find some trojan, but that trojan had to come...
-
February 3rd, 2005, 10:57 AM
Using tables for text-alignment is getting a bit outdated. Preferred way to format HTML nowadays is using CSS.
There are a lot of usages for CSS - it's quite powerful - but I'll give you just a...
-
February 2nd, 2005, 01:57 PM
I'm using some sentenced-based passwords too, but I've wondered what whould happen if instead of bruteforcing using every combination of, say, the letters of the alfabet, someone whould write...
-
February 1st, 2005, 09:56 PM
I'm a little pressed for time right now (finishing up my internship, still have loads of documentation to write), can't look into it any further.
-
February 1st, 2005, 09:53 PM
MSM, the first few lines of that code (the section with all the %-signs) unescape to something like this:
function k(m)
{
var d='',t,f,v,r;
for(t=0;t-1)
{
r=((v+1 )%i-1);
-
February 1st, 2005, 10:06 AM
This should be an easy question for someone who's a little more experienced in XML/XSLT than me. :) Please help me out!
I'm displaying an object (java graph) that needs a varying number of...
-
January 30th, 2005, 04:09 PM
You'll find the security alert that Mysql.com issued for this worm at the address below. A word on detecting it:
http://dev.mysql.com/tech-resources/articles/security_alert.html
-
January 30th, 2005, 03:06 PM
|
|