Search:
Type: Posts; User: pavs; Keyword(s):
Search:
Search took 0.02 seconds.
-
December 28th, 2007, 12:23 AM
Well, now you know :)
http://www.linuxhaxor.net/2007/12/27/what-happens-when-you-do-sudo-rm-rf/
Seriously don't try this at home. Obviously in this video sudo was used because this was a debian...
-
November 27th, 2007, 02:31 AM
http://www.linuxhaxor.net/2007/11/26/8-ways-seriously-screwup-your-linux-system/
1) Delete all files
2) Reformat
3) Block device manipulation
4) Forkbomb
5) Tarbomb
6) Decompression bomb
7)...
-
November 27th, 2007, 02:21 AM
Thanks guys for the foollowups
-
November 22nd, 2007, 06:21 PM
The following is a list of rules and tips you might find useful in dealing with basic security concerns:
1) Avoid doing your regular jobs when you are logged in as root. This reduces the risk of...
-
September 26th, 2007, 03:04 AM
Vulnerability scanner does automated search for security weaknesses in web applications, computers and theirs services and reports them in details about possible vulnerabilities and probable defense...
-
September 13th, 2007, 03:16 AM
I have compiled a list of five easter eggs that I came accross over time. Ofcourse none of them are original and most of them has been around for as long as you can remember but I though it would be...
-
August 15th, 2007, 01:47 AM
Top 20 Movies about Computer Hacking And Geeks
http://www.linuxhaxor.net/2007/08/14/top-20-movies-about-computer-hacking-and-geeks/
-
July 31st, 2007, 07:45 PM
PowerShell is built on top of the .NET Framework and replaces the old process of using text to pass data like the current CMD shell. PS is a scriptable language that provides an alternative to the...
-
July 31st, 2007, 07:39 PM
To download a torrent file just copy and paste the torrent metafile address (e.g. http://www.example.org/file.torrent) in the input box at http//www.bitlet.org/ and press the “Download torrent”...
-
July 27th, 2007, 11:02 AM
Hey whatever makes you happy.
Anyways, for anyone interested:
http://www.windowhaxor.net/index.php/2007/07/27/how-to-customize-apache-server-banner-and-error-page/
Using apache modsecurity...
-
July 26th, 2007, 06:01 PM
My article got mentioned in the first page of hackszine.
http://hackszine.com/
Cheers,
pavs
-
July 26th, 2007, 01:14 AM
I still think it's false advertisement, But we can have different opinions.
cheers,
pavs
-
July 26th, 2007, 12:12 AM
Ok bballad hear me out. With all due respect I don't know what you guys think unlimited means, but this is EXACTLY what unlimited means:
http://dictionary.reference.com/browse/unlimited
1. not...
-
July 25th, 2007, 04:30 PM
Ok I will admit I am wrong...
As long as you give me atleast one site that supports your point.
cheers,
pavs
-
July 25th, 2007, 04:01 PM
Actually there is a limit to the bandwidth, it's not just about hardware. let's say I will host a video streaming server, they will just not allow you to do it for 68 bucks a month.
It's just a...
-
July 25th, 2007, 03:04 PM
Just a note, there is nothing known as unlimited bandwidth. It's not possible.
http://www.findmyhosting.com/truthunlimited.htm
cheers
pavs
-
July 25th, 2007, 02:52 PM
sure you can keep posting. read the end of the link where it says "Original javascript came from hackszine.com ."
never denied it.
pavs
-
July 25th, 2007, 09:24 AM
I suggest you do some more research through google and follow forums which are fully dedicated to website hosting and such. I would strongly suggest spend some quality time going through posts in...
-
July 25th, 2007, 08:57 AM
Most of the time when you are trying to download videos from youtube either you have to use a third party software or you have to post the link to auto-download site which will download and convert...
-
July 24th, 2007, 11:58 PM
Metguru--> yes it is kinda odd I guess. I am been a member of antinonline for years and been following this forum for just as long. But only now I am posting something, because I am trying to promote...
-
July 23rd, 2007, 09:09 PM
Security Cloak is designed to protect against TCP/IP stack fingerprinting and computer identification/information leakage via timestamp and window options by modifying relevant registry keys. The...
-
July 10th, 2007, 04:15 PM
If you look carefully I did mention the source.
-
July 10th, 2007, 11:13 AM
What is Nmap?
Nmap (”Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against...
|
|