Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: Lone1337; Keyword(s):

Search: Search took 0.01 seconds.

  1. Replies
    0
    Views
    539

    C'etait bien...

    Hey all! This'll be the last time I'm visiting AO, so I thought I just post a goodbye thang. So here it goes:

    Goodbye AO chat folk! You made AO worthwhile, which is approximately 1.5 years :p
    ...
  2. Replies
    7
    Views
    3,658

    I'm ashamed of the comments I've recieved from...

    I'm ashamed of the comments I've recieved from this post. Its all how you interpret it. Is not "Hacking Exposed" (a great read) just a book of 'sploits? Is Kevin Mitnick just a low down criminal? ...
  3. Replies
    7
    Views
    3,658

    A Professional Hack

    What separates a "newbie" and an "experienced" hacker is defined by two ideas: finding/researching security flaws in a target system, and hiding one's location. For many, its a simple matter to...
  4. Replies
    29
    Views
    2,124

    What the heck are you talking about?

    What the heck are you talking about? The Jewish conspiracy to take over the world? Hold up, lets reconsider:

    1. Israel has nuclear missles. Wait, why not blow everthing up? Why does it...
  5. Replies
    4
    Views
    839

    Those Pesky Metal Detectors

    This was done by me and a few of my buddies at the local university, and it all happened by chance.

    While walking past the metal detectors (illegal book detectors? what the hell do you call...
  6. Using PS

    Hey buddy, I recommend you do a little "man ps" and "man top" for yourself. In ps, there should be an option that shows the program and its related sockets. What you can do is type "ps -p" (or...
  7. Replies
    4
    Views
    960

    Learning Network Architectures

    Hey, I just finished a tutorial on Network Architectures. Please read it. You'll learn something, I promise ;)

    If you like it, gimme a holla!
  8. Replies
    32
    Views
    2,150

    Black Hawk Down

    When one wonders why the US isn't involved, let history be your gide. Early in the 90s, under President Clinton, Somalian rebels systematically starved millions of their own people. To the rebels,...
  9. Replies
    8
    Views
    1,226

    Hacker Diaries

    After finishing The Hacker Diaries : Confessions of Teenage Hackers I found my time better spent playing a marathon Bingo tournament at an elderly person's home, or doing something worthwhile. This...
  10. Thread: Sexuality

    by Lone1337
    Replies
    56
    Views
    3,268

    Lets get running

    Wow, someone's getting attention here :p What's this controversy over sexual orientation... just accept people for the way they are. 'nuff said.

    Note- While she's pointing out how cool athletic...
  11. Replies
    8
    Views
    513

    Theory of Computer Warfare

    Just some thoughts I'd like to put out.

    Rip 'em apart, boys (and girls, depending on what kind of luggage the Lord bequeathed you).

    The Structure of Computer Warfare:

    There are 3 Kinds of...
  12. Replies
    6
    Views
    471

    Bug in Trillian

    I have recently found a bug in the Trillian messager program. When you check your email, your username and password are transfered in cleartext. For example, if I want to check hotmail:
    ...
  13. Replies
    4
    Views
    812

    Distributed Root Kits

    Playing around and reading, I thought about creating a "distributed rootkit". Essentially, once you have rootkitted one system, the kit will install itself to other systems, and the process repeats...
  14. Thread: Hey all

    by Lone1337
    Replies
    0
    Views
    399

    Hey all

    Hey, this is Lone... just introducing myself. I've been around for about half a year now... I got interested in security a month after 9-11. I was a proggie for a couple of years before then, and...
  15. Replies
    1
    Views
    794

    The service handles requests by spawning another...

    The service handles requests by spawning another process that handles your request (forking). Its like, if you go to a bank, the security guard points you to a teller. The security guard would be...
Results 1 to 15 of 15

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides