Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: ommy; Keyword(s):

Page 1 of 6 1 2 3 4

Search: Search took 0.01 seconds.

  1. Replies
    21
    Views
    2,142

    Finally, I did this DoS attack on my friend's...

    Finally, I did this DoS attack on my friend's machine (Syn flooding different ports) and managed to take it down for some time. But the bottom line is that I learnt alot. I atleast managed to move a...
  2. Replies
    21
    Views
    2,142

    |3lack|ce: No comments on whatever you...

    |3lack|ce: No comments on whatever you said...Because I strongly discourage bashing/flaming of newbies who are lost and looking for a direction/guidance from the people already in the industry...
    ...
  3. Replies
    21
    Views
    2,142

    |3lack|ce: I understand the fact that you are a...

    |3lack|ce: I understand the fact that you are a "senior member" here..But I give you no rights (what so ever) to doubt my intentions of learning. I find myself extremely honest with my network...
  4. Replies
    21
    Views
    2,142

    zencoder: A very smart piece of advice..Thank you...

    zencoder: A very smart piece of advice..Thank you for this. Guide me a little further with this in context of DDosing. :)

    ric-o: I am going to try this with hping. Does anyone have an idea that...
  5. Replies
    21
    Views
    2,142

    Raion: May be I am not putting things clearly.I...

    Raion: May be I am not putting things clearly.I can take down his machine messing around with the switches or DoS.. But the real motive is'nt "taking the machine down"..It is to figure out operating...
  6. Replies
    21
    Views
    2,142

    well..first of all..seeing the negative status of...

    well..first of all..seeing the negative status of the thread is "disappointing".. :(

    steve.milner: This is against the agreed rules of war game. So I wo'nt go for it. Secondly, he is not using...
  7. Replies
    21
    Views
    2,142

    .:front2back:. I forgot to mention that we are...

    .:front2back:. I forgot to mention that we are on the same subnet/LAN set up internally in our homes. So no bandwidth/ISP issues. That might be easy to do this ICMP reflection or D'DoSing the...
  8. Replies
    21
    Views
    2,142

    Moving onto the next level

    Hi all,
    umm..To begin with (before guys start falming me or anything), let me ******** that I completely understand and know about Antionline rules and I am just looking for an...
  9. Replies
    7
    Views
    1,138

    Overwhelmed

    everyone,
    umm..I am overwhelmed with the kind of concern you guys have shown regarding the earthquake disaster here in Pakistan. I was not expecting it at all. All I thought was that I...
  10. Replies
    7
    Views
    1,138

    reterieving data??

    Hi all,
    I am kinda little stuck with this.Seeking your help on this. Infact the problem is that we tried to run a ghost image on machine from a USB storage and someone removed the USB...
  11. Replies
    2
    Views
    834

    Nessus 3 going commercial

    HI,
    Sadly, but truly, Nessus 3 is going commercial. Only binary distribution will be available and no source code would be included. However, Fyodor announced (on the mailing list) that nmap...
  12. Thread: Knoppix STD

    by ommy
    Replies
    20
    Views
    2,811

    That is true. Knoppix STD is a must have toolkit....

    That is true. Knoppix STD is a must have toolkit. I always carry it with me. You can find plenty of live cd security framework distribution. You would love going through man pages and help given with...
  13. Replies
    5
    Views
    797

    IKnowNot, I do this from several machines,...

    IKnowNot, I do this from several machines, depending upon the criticality of the problem. Anyways 24 hours are about to past and didnt get too much response. :(
  14. Replies
    5
    Views
    797

    approach towards troubleshooting??

    Hi all,
    I have a very basic question and hope it would contribute to the community. What would be your approach if an end user comes upto you and tell you that his corporate portal is...
  15. Replies
    10
    Views
    1,443

    sniffing network traffic

    hi everyone,
    here I am to learn again and again again :).. Since I feel a little awkward now, for the reason that I have never contributed to this community other then asking for...
  16. Thread: JTR and Cisilia

    by ommy
    Replies
    2
    Views
    1,216

    HTRegz, I ll surely write a tutorial for this,...

    HTRegz, I ll surely write a tutorial for this, once I get my hands dirty on this. But still require more feedback from AO.
    lookin forward
  17. Thread: JTR and Cisilia

    by ommy
    Replies
    2
    Views
    1,216

    JTR and Cisilia

    This post in in context of some great fun tutorials written by IronGeek[1] and Neutron[2]. And I would appreciate if both IronGeek and Neutron could reply to this thread. I was going through...
  18. Replies
    7
    Views
    1,383

    repairing .mdb file

    hello AO,
    recently bumped across a problem and after googling it alot, i decided to share it with AO. I recovered an accedently deleted database (Microsoft Access .mdb file) by using a...
  19. Replies
    10
    Views
    1,355

    Thank you everyone for your valuble input. Let me...

    Thank you everyone for your valuble input. Let me work out with my security policy and i ll soon show it to AO members.
    Besides XTC46, a guard with an automatic riffle is the only security...
  20. Replies
    13
    Views
    2,255

    ss2chef..FYI...Link is broken

    ss2chef..FYI...Link is broken
  21. Replies
    10
    Views
    1,355

    The room is pretty big and its security is...

    The room is pretty big and its security is critical for the operational activities of business. We have almost all of our regional servers in that room.i.e. domain controllers,mail servers,web...
  22. Replies
    13
    Views
    2,255

    okie..May be I am not looking for exactly a...

    okie..May be I am not looking for exactly a network auditing tool. I am looking for a tool which could gather the information about computers hardware and softwares on the network. To be more...
  23. Replies
    10
    Views
    1,355

    Physical security and biometrics

    We all know that how much important and critical is the issue of physical security of server machines. Infact, I am looking for a security solution to be implemented for my server room and I am...
  24. Replies
    13
    Views
    2,255

    Network auditing tools

    hello everyone,
    I was just wondering that what tools do you people use for network auditing. By this I mean that what different applications do you deploy to gather the...
  25. Replies
    10
    Views
    1,480

    Hey dude nihil.. Thanx alot...let me look into...

    Hey dude nihil..
    Thanx alot...let me look into the link..
Results 1 to 25 of 142
Page 1 of 6 1 2 3 4