Search:

Type: Posts; User: tatui; Keyword(s):

Page 1 of 4 1 2 3 4

Search: Search took 0.02 seconds.

  1. Replies
    29
    Views
    21,221

    An updated antivirus may be useful, since they...

    An updated antivirus may be useful, since they detect such programs.. There are also programs aimed to remove and detect keyloggers. Try them.

    While you dont fetch a brand new antilogger...
  2. Replies
    13
    Views
    9,824

    Scanning for a small set of ports, as well as...

    Scanning for a small set of ports, as well as having a large time gap between scans is also a measure to avoid being blocked by IDS. The idea is being stealth, isnt it? You may need some more effort...
  3. Replies
    5
    Views
    4,653

    Slarty, you may use ulimit. (i think it's a shell...

    Slarty, you may use ulimit. (i think it's a shell built-in :D.
    ulimit -u 20
    ulimit -n 50
    Would allow the user to create 20 processes and open 50 files. There are plenty of options, check man...
  4. Replies
    20
    Views
    20,198

    Answer to Ma_purol: Well, after all these...

    Answer to Ma_purol: Well, after all these answers, I don't think I have a lot to say. What I would suggest is that you check your computer for running services you don't need (how to do it will...
  5. Replies
    1
    Views
    1,603

    Indeed, it is really useful :). The IETF working...

    Indeed, it is really useful :). The IETF working groups are developing them, so it's no wonder we would use RFCs as sources for info on protocols.. :D . Anyway, unless you have the RFC number, a...
  6. Thread: Vim

    by tatui
    Replies
    3
    Views
    5,337

    www.vim.org , check documentation and download...

    www.vim.org , check documentation and download the vimbook :) . You can use vimtutor as well, and you will find an user guide at /usr/doc/vim or something like this. Anyway, something to help you...
  7. Replies
    21
    Views
    9,137

    I can´t write about tools I use at work just...

    I can´t write about tools I use at work just because I don´t have this kind of job (no job at all, probably changin in a couple of months). So, I will just mention 3 tools I am very fond of:
    1)...
  8. Replies
    11
    Views
    4,654

    One option would be 1st page, really handy...

    One option would be 1st page, really handy because you can just use buttons to insert tags, while still having control on the tags used. And my other option, since I am not a table fan, is using Vim...
  9. Replies
    15
    Views
    11,016

    Based on all above, make sure she will change the...

    Based on all above, make sure she will change the password from another computer, better yet, connected through another ISP. This will allow you (and her) to relax a bit while checking for malware...
  10. Replies
    10
    Views
    7,931

    As already said before, these aggressive...

    As already said before, these aggressive countermeasures may harm innocent people, and might also warn them that you are aware of the attack. There are cases (example, honeypots) where you want to...
  11. Thread: Winbackup.

    by tatui
    Replies
    1
    Views
    4,456

    Liked the interface ;) . The encryption feature...

    Liked the interface ;) . The encryption feature seems quite handy as well. I could do with some testing soon, it seems to deserve the 4 stars award.
  12. Replies
    5
    Views
    10,665

    doxical:: There´s a way to do it, quite easy....

    doxical:: There´s a way to do it, quite easy. Use the (surprise) base64 program
    http://www.fourmilab.ch/webtools/base64/
    There´s a link to an *nix version and a windows one.
  13. Replies
    12
    Views
    4,761

    Apart from the VB vs C affairs that might appear,...

    Apart from the VB vs C affairs that might appear, I think you should learn something that gives you freedom of choice, and doesn't bind you to a specific operating system (btw, vb is a bit expensive...
  14. Replies
    5
    Views
    2,576

    The best way to massage a cracker´s, kiddie´s...

    The best way to massage a cracker´s, kiddie´s whatever´s ego is calling them hacker. Perhaps we could use: A moron, a dork, a loser, and so on.. :D .
    Damn, access to milions of cc is really scary.
  15. Replies
    20
    Views
    5,808

    AFAIK (i am not a satanist, and not into it, so I...

    AFAIK (i am not a satanist, and not into it, so I can´t say much), there are two "satanisms". A group believes that there is the devil portraited in the bible, and that they must worship him. And...
  16. Thread: Ao Irc???

    by tatui
    Replies
    6
    Views
    5,087

    Once you have installed an irc client (mirc,...

    Once you have installed an irc client (mirc, klient, kvirc, bitchx, xchat whatever), and configured your nick (you may use /nick nickyouwant )
    type:
    /server irc.antionline.com
    and Bingo!
  17. Thread: what trojan?

    by tatui
    Replies
    5
    Views
    6,643

    hatebreed2000, you are better off with a firewall...

    hatebreed2000, you are better off with a firewall or a firewall/local ids (Oh, program X wants to run this: alow?), like latest versions of tiny and kerio. Well, supposing it´s a trojan like netbus,...
  18. Thread: Acces over LAN ?

    by tatui
    Replies
    7
    Views
    5,086

    slewrate, there's a post from phishphreek80...

    slewrate, there's a post from phishphreek80 linking to this arcticle: http://www.antionline.com/showthread.php?s=&postid=600309
    credits to him for finding it :)
    There's something you might be aware...
  19. Indeed, a great service. You may learn a lot, and...

    Indeed, a great service. You may learn a lot, and use several *nix tools that wouldn't be available to you otherwise (in case you cant install any *nix version). I don't know if they allow you to...
  20. Thread: Buffer Overflows

    by tatui
    Replies
    4
    Views
    3,121

    Hmm.. the text from Aleph1, "Smashing the stack...

    Hmm.. the text from Aleph1, "Smashing the stack for fun and profit", has some examples as well, and I found some buggy example code in a page, but it is in portuguese. I will paste some examples...
  21. Replies
    5
    Views
    4,271

    Lol.. I do like vi, though. At least vim. damn, i...

    Lol.. I do like vi, though. At least vim. damn, i am not leet! And my first experience, I must confess, was a bit like this.. "how do i quit it?!" hehe..
    Back to our IE, I noticed that there are...
  22. Replies
    1
    Views
    3,814

    hmm I know you can do it with CD, by placing a...

    hmm I know you can do it with CD, by placing a file called autorun.inf in the root directory. You could get an autostart CD and check how it is made. If you burn a cd, its the only thing you will...
  23. Replies
    5
    Views
    4,271

    *Cough*....

    *Cough*. http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=Internet+Explorer
  24. Replies
    25
    Views
    7,722

    Well, it might be quite hard to be sure that the...

    Well, it might be quite hard to be sure that the intruder didn't do anything. Ok, he/she said so, but would you believe? To be sure, you will need to do an extensive check (and costly), and very...
  25. Thread: IM security risk

    by tatui
    Replies
    11
    Views
    16,848

    There is also icq2go.. wich runs in your browser....

    There is also icq2go.. wich runs in your browser. Indeed, they might be a security issue. Anyway, there are some ways you can stop your nice employees that think they will get away with it.. proxies,...
Results 1 to 25 of 88
Page 1 of 4 1 2 3 4