Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: Maestr0; Keyword(s):

Page 1 of 20 1 2 3 4

Search: Search took 0.06 seconds.

  1. http://www.downloadsquad.com/2008/01/17/n-dakota-j...

    http://www.downloadsquad.com/2008/01/17/n-dakota-judge-rules-that-host-l-command-constitutes-hacking/

    Just remember reading this a while ago. I guess its not technically 'illegal' since this was a...
  2. As HT pointed out most servers today use the...

    As HT pointed out most servers today use the hostname from the HTTP request to determine the site served. If your IP address serves no site, you didn't set it up to do so. The only way you could...
  3. Replies
    5
    Views
    1,876

    You need an initrd if the modules required to...

    You need an initrd if the modules required to pivot root to your root device are not statically compiled in the kermel. eg. If your root drive is an Nvidia SATA the nvsata needs to be compiled in,...
  4. Replies
    32
    Views
    3,020

    NTFS stores a backup copy of the boot sector at...

    NTFS stores a backup copy of the boot sector at the end of the partition and a copy of the MFT (Master File Table) somewhere in the middle. If you can recover those you can restore the filesystem....
  5. Replies
    4
    Views
    891

    More information such as wireless card, chipset...

    More information such as wireless card, chipset and current driver you are using in Ubuntu would be useful...


    -Maestr0
  6. Replies
    2
    Views
    577

    Kurt Vonnegut dies at 84

    The world has lost a wonderful author.

    "I think I am trying to clear my head of all the junk in there--the *******s, the flags, the underpants. Yes--there is a picture in this book of underpants....
  7. Replies
    4
    Views
    766

    Apache will not follow symlinks (softlinks) with...

    Apache will not follow symlinks (softlinks) with out a 'FollowSymlink' option in the <Directory /mydir> directive where the symlink resides, in the config file for the site.

    eg.
    <Directory /www>...
  8. Replies
    11
    Views
    1,846

    You can use TTL to determine if the packets are...

    You can use TTL to determine if the packets are making it downstream of the firewall.

    http://www.packetfactory.net/projects/firewalk/

    -Maestr0
  9. Replies
    8
    Views
    1,113

    This behavior is quite normal, but its not DHCP...

    This behavior is quite normal, but its not DHCP causing your problem its WINS. Windows clients that recieve an IP address from a DHCP offer, can also recieve a WINS server address from the DHCP...
  10. Replies
    3
    Views
    1,939

    They aren't sending you multicast per se, what...

    They aren't sending you multicast per se, what you see is an IGMP enabled router. IGMP is what allows you to route multicast traffic. When a router is IGMP enabled it basically tracks all your...
  11. Replies
    24
    Views
    3,997

    If the e-mail address on your account was...

    If the e-mail address on your account was changed, how did you recieve the alert(e-mail?)? A common phishing scam is to send these "alerts" so you will log in via the phishing site to check the...
  12. You will still need the output from ldd from rpm...

    You will still need the output from ldd from rpm and up2date in the jail so rpm can run. If you can get rpm to run it should begin to take care of dependencies after that.

    ...
  13. You'll probably need to build an rpm database in...

    You'll probably need to build an rpm database in the jail (put rpm in there as well) Trial and error can get you a long way. I'm an apt man myself, but I would try using rpm itself to install...
  14. Replies
    51
    Views
    3,761

    "a whoreson jackanapes must take me up for...

    "a whoreson jackanapes must take me up for swearing, as if I borrowed mine oaths of him and might not spend them at my pleasure.
    When a gentleman is disposed to swear, it is not for any standers-by...
  15. Thread: Hijacked by HP

    by Maestr0
    Replies
    11
    Views
    1,455

    http://www.nirsoft.net/utils/myuninst.html ...

    http://www.nirsoft.net/utils/myuninst.html

    -Maestr0
  16. Replies
    2
    Views
    1,997

    Hardware RAID arrays are invisble to the OS,...

    Hardware RAID arrays are invisble to the OS, mdadm and raidtools in Linux are software RAID arrays. The Adaptec controller is used to create the drive configuration and presents the configured arrays...
  17. Replies
    19
    Views
    3,262

    Looking over the event log shows the last message...

    Looking over the event log shows the last message before the reboot is:
    2/10/2006 10:04:33 AM EventLog Error 6004
    A driver packet received from the I/O subsystem was invalid. The data is the...
  18. Replies
    31
    Views
    1,975

    from root: sax.sh -l ...

    from root:

    sax.sh -l


    -Maestr0
  19. Replies
    29
    Views
    2,893

    Short Answer: A reverse DNS lookup should only...

    Short Answer:
    A reverse DNS lookup should only resolve to one host.

    Long Answer:

    A reverse lookup is just another zone. In a forward lookup the record that relates an IP address to a...
  20. Replies
    5
    Views
    1,831

    Pre-computed hashes are meant for computing all...

    Pre-computed hashes are meant for computing all keyspace (aka pre-computed bruteforce). Since you only want to use a set of passwords, what you a really doing is a dictionary attack. Just make a...
  21. Replies
    8
    Views
    1,184

    If you use only NTLMv2 and dont store LM hashes...

    If you use only NTLMv2 and dont store LM hashes in the database, the only way precomputed hashes (Rainbow tables) would help would be if an attacker already has admin on an AD server and can dump the...
  22. Replies
    8
    Views
    1,184

    I dont think you want a msgina.dll replacement....

    I dont think you want a msgina.dll replacement. GINA is the process called by winlogon which performs the authentication and returns success or failure to winlogon. Replacing GINA is useful if you...
  23. Replies
    11
    Views
    1,984

    Oh yeah, forgot to mention Suse also has a weird...

    Oh yeah, forgot to mention Suse also has a weird /etc/sudoers file that uses the "rootpw" by default instead of "targetpw". If you change it to "targetpw" you might want to change %users ALL=(ALL)...
  24. Replies
    11
    Views
    1,984

    Sudo, without alot of work (there is stuff you...

    Sudo, without alot of work (there is stuff you can do but I dont think sudo is really thwe answer you need), is not by any means a security feature in my opinion. Its good for accounting purposes so...
  25. Replies
    2
    Views
    993

    1. Is DES 'secure enough'? Well, that...

    1. Is DES 'secure enough'?

    Well, that depends. Its probably secure against individuals, but anyone with access to a large computer lab or part of a distributed network would be able to crack it...
Results 1 to 25 of 500
Page 1 of 20 1 2 3 4

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides