Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: stonee; Keyword(s):

Search: Search took 0.01 seconds.

  1. Replies
    5
    Views
    2,268

    Some of these commands are not found anywhere on...

    Some of these commands are not found anywhere on the file system. I have also tried the following and did not produce any results.

    find /etc -print | xargs -I '{}' grep -li [command] '{}'

    Also,...
  2. Replies
    5
    Views
    2,268

    My initrd script

    #!/bin/nash

    mount -t proc /proc /proc

    setquiet
    # nash: cause any late echos in this start script not to be displayed

    echo Mounting proc filesystem
    echo Mounting sysfs filesystem
    mount...
  3. Replies
    5
    Views
    2,268

    Unknown Fedora initrd commands

    This weekend I have been messing around a little with the boot process, and found myself inspecting the default initrd shipped with Fedora.

    Where are all of the commands listed in the init script...
  4. Replies
    14
    Views
    2,230

    That's true.. while it's running there is no...

    That's true.. while it's running there is no protection. Of course, it does not imply that the encryption should not be used to begin with, as it certainly provides an additional degree of protection...
  5. Replies
    14
    Views
    2,230

    It isn't that my password showed up by default,...

    It isn't that my password showed up by default, but rather there is a hardware problem that required me to enable the showing of the password to have geli work.

    I have a few computers here at...
  6. Replies
    14
    Views
    2,230

    I agree with all of your responses: nothing is...

    I agree with all of your responses: nothing is perfect, and there are certainly some operating systems that are better than others.

    As an example, I've seen in the past that some Slackware...
  7. Replies
    14
    Views
    2,230

    Base Operating System Platform

    I am in the process of getting several computers up and running that I've had sitting for some time as I got my life together. I find myself short on time and finding a safe, secure, and slow moving...
  8. Replies
    6
    Views
    961

    I want to be able to view everything CD/DVD/HDD...

    I want to be able to view everything CD/DVD/HDD...
  9. Replies
    6
    Views
    961

    Thanks for the reply. I am currently running a on...

    Thanks for the reply. I am currently running a on a Knoppix livecd, but was previously running linux. I know it is possible to read devices in /dev, and grab information from /proc, but it would be...
  10. Replies
    6
    Views
    961

    Reader/Writer for System ROM

    Hi,

    Does anyone know of an application that can be used the system ROMs throughout the system? Like an application that will tell me the address of the BIOS, keyboard ROM, etc... I have a feeling...
  11. Replies
    7
    Views
    1,646

    Secure Web Hosting Company

    I'm searching for a new web hosting company as my term is ending with my current company. I am not happy with my current company because they do not seem competent.

    Moreover, their webmail client...
  12. Replies
    2
    Views
    1,079

    How does this differ from the Sysinternals...

    How does this differ from the Sysinternals Process Explorer?

    I like this process explorer because it comes from a more respectable source.
  13. But then my paranoia is just redirected towards...

    But then my paranoia is just redirected towards their company. Can I then trust their software?
  14. Can these LiveCD Firewall Solutions be trusted?

    Hi,

    I'm in the process of securing my home network. I have come across a great solution: firewall livecd. This solution is advantageous for several reasons. However, I am concerned about whether...
  15. Replies
    19
    Views
    2,444

    When you are browsing new web sites (especially...

    When you are browsing new web sites (especially less reputable web sites), turn off java and javascript.
  16. Replies
    4
    Views
    1,678

    Try these commands, they seemed to work for me: ...

    Try these commands, they seemed to work for me:

    whois -h whois.crsnic.net acme.net
    whois acme.net

    I'm not exactly sure what your goal is, or what you're trying to do. But both of these...
  17. Replies
    12
    Views
    2,619

    Keeping the laptop out of the network is...

    Keeping the laptop out of the network is beneficial for two reasons. One is that my roommate is always using Limewire to download music and other software. He doesn't believe that anything will...
  18. Replies
    13
    Views
    2,324

    You might want to consider buying some books. One...

    You might want to consider buying some books. One of them that might be hepful for you is Secure Architectures with OpenBSD with something like this: Network Security Architectures.

    This will...
  19. Replies
    12
    Views
    2,619

    That's a very good point. Now that I think that...

    That's a very good point. Now that I think that it, your comment makes a lot of sense. If I don't have any services running, the only issues I can run across are those that I bring in.

    For some...
  20. Replies
    12
    Views
    2,619

    I am going to be making the gateway OpenBSD. The...

    I am going to be making the gateway OpenBSD. The gateway will have no services running on it, and serve only as a router/firewall.

    An internal server will host an SSH/VPN server. There will also...
  21. Replies
    12
    Views
    2,619

    How to setup a secure network

    Hi,

    I'm not sure why, but I feel really paranoid about using my home computer network. I feel as if someone has gotten in, and I don't trust anything (wireless router firmware, notebook firmware,...
  22. Replies
    10
    Views
    3,326

    A few weeks ago I wrote my first servlet that...

    A few weeks ago I wrote my first servlet that contained a primitive login system. The system simply took the password field, sent it across the network, and compared it to an encrypted file stored...
  23. Replies
    4
    Views
    1,214

    Consider the situation when you download an mp3...

    Consider the situation when you download an mp3 from some p2p application. You download the file and try to play it on xmms. What should you be concerned with?

    As an alternative situation,...
  24. Replies
    4
    Views
    1,214

    Infection via playing an mp3?

    Hi,

    I guess I already know the answer to this (yes), but I would like a more information rationale behind my thinking. Is it possible to infect a Linux system by playing an mp3?

    Consider the...
Results 1 to 24 of 24

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides