Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: i2c; Keyword(s):

Page 1 of 20 1 2 3 4

Search: Search took 0.03 seconds.

  1. Thread: Convicted hacker

    by i2c
    Replies
    8
    Views
    1,124

    How in gods name do you use wordpad as a...

    How in gods name do you use wordpad as a messenging client to?

    i2c

    edit: I suppose can save to it and then open it? is that what he means by chatting over wordpad?
  2. Replies
    24
    Views
    3,997

    Ebay will most likely use systems to detect...

    Ebay will most likely use systems to detect suspicious actions, likely using neural networks, banks use similar for finding odd transactions and detecting debt risk assessment, among many other...
  3. Thread: Tracing the URLs?

    by i2c
    Replies
    18
    Views
    1,746

    Use Tor, it encrypts traffic before your first...

    Use Tor, it encrypts traffic before your first hop to your first onion router, so that way the traffic won't be easily readable at the cache.

    i2c
  4. Replies
    10
    Views
    4,305

    The worst ones are soldered to the motherboard or...

    The worst ones are soldered to the motherboard or built inside the connector bodies, or placed under discrete components.

    It really wouldnt be beyond the realms of possibility to modify the bios...
  5. Replies
    6
    Views
    2,095

    Surely you only need to know how threads work...

    Surely you only need to know how threads work then and then thread the application so that you have x number of threads scanning x number of ports at anyone time so if some take longer than others...
  6. Replies
    13
    Views
    3,388

    Use FPGAs so you can do it all in parralel,...

    Use FPGAs so you can do it all in parralel, although a nice Xilinx Virtex-4 will set you back a couple of grand...

    i2c
  7. Replies
    30
    Views
    2,436

    Im glad I don't have an inbox :) This project...

    Im glad I don't have an inbox :)

    This project is effectivly like saying, "I don't want a virus on the laptop". Your trying to guard agaisnt a constantly changing market with new games released...
  8. Replies
    30
    Views
    2,436

    Simplest method I can think of is to monitor key...

    Simplest method I can think of is to monitor key stroke frequency. For instance in action shooters we know that the main keys that are used are (w,a,s,d) and the arrow keys. For given that you could...
  9. Replies
    30
    Views
    2,436

    It was actaully proved recently that games can...

    It was actaully proved recently that games can increase intellegence.

    http://news.bbc.co.uk/1/hi/education/1879019.stm
    http://news.bbc.co.uk/1/hi/education/730440.stm...
  10. Replies
    19
    Views
    2,157

    My thinking was that you might be able to get a...

    My thinking was that you might be able to get a shell account that will allow you to use SSH tunnelling, im unsure whether shell accounts allow in and outbound sockets? i dont know.

    All about the...
  11. Replies
    19
    Views
    2,157

    Encrpyt your traffic with SSH a tunnel thats out...

    Encrpyt your traffic with SSH a tunnel thats out of your ISP's reach, check this link - http://neworder.box.sk/newsread.php?newsid=12498

    You could also try Tor from EFF, that encrypts traffic...
  12. Thread: Ip and forums

    by i2c
    Replies
    25
    Views
    1,845

    check out this page,...

    check out this page, http://tor.eff.org/overview.html.en

    basically your connection hops through a series of computers and then becuase the last computer on that series of computers is one to...
  13. Thread: Ip and forums

    by i2c
    Replies
    25
    Views
    1,845

    nuthin: check out Tor, from EFF, it uses a trick...

    nuthin: check out Tor, from EFF, it uses a trick called onion routing - the new installer makes it easier than ever before to set it up

    Im in a good mode today so spare google just this once -...
  14. Thread: Ip and forums

    by i2c
    Replies
    25
    Views
    1,845

    Are you talking about somewhere like Neworder??...

    Are you talking about somewhere like Neworder?? where they display part of the address, which is usually the name of the DSL provider?? Cos its possible then that you and someone else are posting...
  15. Replies
    14
    Views
    4,261

    ASDL uses frequencys higher (why you dont hear...

    ASDL uses frequencys higher (why you dont hear it, check out the ear frequency response, google) than that of the standard method of communication on a PSTN, your modem connects to a DSLAM (go google...
  16. Replies
    14
    Views
    4,261

    Heh, that was the first question I ever asked on...

    Heh, that was the first question I ever asked on a usenet security board when I got interested in the internet to a more technical level. (and damn what a flaming I got, im still putting honey on the...
  17. Replies
    3
    Views
    1,982

    hijack functions/inject code windows

    Hi,

    I've been reading with interest information about hijacking fuctions with LD_PRELOAD on the Linux operating system.

    As such I am interested to find out (i've searched google) whether this...
  18. Replies
    3
    Views
    9,333

    Interesting tutorial! With regards to the...

    Interesting tutorial!

    With regards to the strings program, theres plenty of windows ports so theres no need to arse about with cygwin. If you grab the bloodshed c++ IDE (based on GCC) you'll find...
  19. Replies
    15
    Views
    1,658

    nihil i think there is information that the...

    nihil i think there is information that the creative could use, for instance i could plan an attack bassed on the typical policy thats discussed widely here, the addicts forum even had a subject in...
  20. Replies
    15
    Views
    1,658

    Its a shame that the ethics of people must...

    Its a shame that the ethics of people must nannyied with the use of AP's.

    Surely information the majority of the information on this site could be used for misdoings, however it is the...
  21. Thread: Roomate a suspect?

    by i2c
    Replies
    30
    Views
    4,454

    Buy a webcam, use Motion (motion.sf.net, if your...

    Buy a webcam, use Motion (motion.sf.net, if your on linux, otherwise bit of python and the video capture module) and have the images shipped to a server so that you can see if he's been on your...
  22. Ping can be used to guess a footprint, look it up...

    Ping can be used to guess a footprint, look it up

    i2c
  23. Learning to search is all the information you...

    Learning to search is all the information you need regarding partitioning, the ability to find out information for yourself is going to be the key to your success in using projects such as linux.
    ...
  24. Thread: Crawlers / Spiders

    by i2c
    Replies
    3
    Views
    1,029

    I got so annoyed with trying to find an effective...

    I got so annoyed with trying to find an effective spider that did what I wanted that I gave up and wrote my own in Python, I would recommend it as it does provide you a useful insight.

    I have...
  25. Replies
    0
    Views
    1,222

    Disk recovery software

    Hiya,

    Thought i would share with you an amazing piece of software I found, when my harddisk was properly f**ked and "cat /dev/hdd" wouldnt show anything that looked like data at all, i was in...
Results 1 to 25 of 500
Page 1 of 20 1 2 3 4