Search:

Type: Posts; User: owensleftfoot; Keyword(s):

Page 1 of 4 1 2 3 4

Search: Search took 0.03 seconds.

  1. Replies
    5
    Views
    5,959

    Most of the implementations on...

    Most of the implementations on http://www.portknocking.org appear to be alpha or beta - I wouldnt use them yet anyway.
  2. Replies
    5
    Views
    6,934

    Add chroot_local_user=yes to your...

    Add chroot_local_user=yes to your /etc/vsftpd/vsftpd.conf
  3. Replies
    5
    Views
    6,934

    Add chroot_local_user=yes to your...

    Add chroot_local_user=yes to your /etc/vsftpd/vsftpd.conf
  4. Replies
    2
    Views
    4,744

    That would be...

    That would be http://www.k-otik.com/exploits/04212004.THCIISSLame.c.php
  5. Replies
    4
    Views
    4,249

    I use mutt myself, but in a gui mozilla-mail is a...

    I use mutt myself, but in a gui mozilla-mail is a good bet.
  6. Replies
    5
    Views
    5,108

    Share a directory on the windows 2000 box. On the...

    Share a directory on the windows 2000 box. On the redhat box make a new directory under /mnt ie mkdir /mnt/win
    then use the command mount -t smbfs //windowsboxname/sharename /mnt/win on the redhat...
  7. Replies
    39
    Views
    28,312

    The strings command under linux comes up with -...

    The strings command under linux comes up with -
    WSAGetLastError
    WSAStartup
    __WSAFDIsSet
    accept
    bind
    closesocket
    connect
    gethostbyname
    htonl
  8. Replies
    6
    Views
    6,393

    Not so long ago there were only a couple of...

    Not so long ago there were only a couple of soundcards. Your AC 97 is probably just a sound blaster clone. The enviroment variable is there for dos compatabilty. It allows dos games etc to know what...
  9. Replies
    6
    Views
    6,836

    I get exactly the same errors compiling spike on...

    I get exactly the same errors compiling spike on fedora - gcc version 3.3.2
  10. Replies
    12
    Views
    11,980

    According to...

    According to http://vil.nai.com/vil/content/Print99296.htm the name of the trojan is configurable by by the hacker who customises it.
  11. http://geodsoft.com/howto/password/cracking_passwo...

    http://geodsoft.com/howto/password/cracking_passwords.htm has what you are looking for.
  12. Replies
    18
    Views
    11,789

    Attrition.org...

    Attrition.org dont seem to have much time for them any way.
  13. Languard network scanner is a good freeware...

    Languard network scanner is a good freeware security scanner - you can get it here -

    http://www.gfi.com/lannetscan/networkscanner_freeware.htm
  14. "What amazes me though, is that out of the entire...

    "What amazes me though, is that out of the entire post of how Microsoft security is improving, you bypass all of it and focus on a comment I sided out about nix."

    It was the bit that caught my eye...
  15. Replies
    29
    Views
    17,991

    "Bill Gates was a brilliant businessman but no...

    "Bill Gates was a brilliant businessman but no programmer."

    Gate wrote a basic interpreter for the altair which had to fit in less than 4k of memory. I would call that quite a programming feat. I...
  16. "*nix has just as many security problems as...

    "*nix has just as many security problems as windows, and patches are made for both. You can not critisize windows for creating patches to HELP security, while Linux does the exact same thing."
    ...
  17. Replies
    4
    Views
    7,037

    Go into device manager and remove your network...

    Go into device manager and remove your network card. Reboot and windows should reinstall your network card along with tcpip.
    HTH.
  18. I dont use a personal firewall. I dual boot with...

    I dont use a personal firewall. I dual boot with redhat (I use iptables) and win98. I dont have file and print sharing enabled - let them scan away.
  19. Replies
    10
    Views
    11,106

    /etc/pam.d/authconfig is just the pam permissions...

    /etc/pam.d/authconfig is just the pam permissions file for running the authconfig program. The actual program is /usr/bin/authconfig or /usr/bin/authconfig-gtk for the x version.
  20. Replies
    10
    Views
    11,106

    Try "chkconfig ypserv off" without the quotes.

    Try "chkconfig ypserv off" without the quotes.
  21. There is also a freeware program specifically...

    There is also a freeware program specifically made to identify devices which windows only shows as a yellow question mark in device manager. You can get it here - http://www.zhangduo.com/udi.html
  22. Replies
    8
    Views
    6,565

    Have you installed the msblast patch? Its worth a...

    Have you installed the msblast patch? Its worth a go anyway. You can get it at http://msblast.maruhn.com/msblast-patch.html
  23. Replies
    13
    Views
    5,519

    From "man grep". -q, --quiet, --silent -q,...

    From "man grep".

    -q, --quiet, --silent -q, --quiet, --silent
    Quiet; do not write anything to standard output. Exit immedi-
    ately with zero status if any match is...
  24. Replies
    7
    Views
    5,253

    I would guess the option is grayed out because...

    I would guess the option is grayed out because windows cant find your modem.
  25. Replies
    18
    Views
    11,117

    Uninstalling bonzi buddy should do the trick :)

    Uninstalling bonzi buddy should do the trick :)
Results 1 to 25 of 95
Page 1 of 4 1 2 3 4