Search:

Type: Posts; User: Turing_Machine; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.01 seconds.

  1. Free detection and removal instructions

    A free detection script can be found at http://www.doxdesk.com This script is a very nice beginning point, and has a very comprehensive list of spyware and parasites. Plus, it runs as a javascript...
  2. Replies
    6
    Views
    3,223

    I don't think that Linux needs to be "dumbed down"

    As someone who has struggled with linux on a 386 as my introduction to the *ux world, I remember boot and root disks, a very limited hardware pool, and explicitly adding every piece I would need.
    ...
  3. Replies
    5
    Views
    8,532

    a quick description of when and where things happen

    http://gnumonks.org/ftp/pub/doc/packet-journey-2.4.html

    I assume you are a linux user, considering your username

    from there you could use the standard netfilter workings, etc, to do what it...
  4. hrmm...

    Interesting take on what you have read. In fact, as someone who does look though the kernel source and tries to make things better when he can, I can honestly say that I did not understand the issue...
  5. little howto

    To reset all users to use a false shell (vs sh, bash, csh, etc) on most Linux platforms:

    type who and see which users are currently running a shell

    another way would be to type ps aux | grep sh...
  6. Need user access to the machine

    FYI, it is a system call available to any process that is broken. You need to make a C program with that particular system call, compile it, run it on that machine as a user (you need to have a...
  7. Replies
    20
    Views
    10,175

    Simple math...

    Microsft's so-called "security holes" have been, for the most part, good ideas at attempting for centralized administration.

    BO2k used a highly functional remote control interface originally...
  8. Replies
    0
    Views
    3,202

    OpenSSL Broken

    If you are using Apache 1.3 with mod_ssl or Apache 2 with ssl built in, you are vulnerable
    Any SSL using the OpenSSL libraries are at risk.

    Please review this other thread

    Crypto Thread
  9. Replies
    0
    Views
    4,826

    Serious OpenSSL flaw

    Check out OpenSSL Notification
    OpenSSL, and therefore, maybe some of your programs that depend on OpenSSL for security (Apache, OpenSSH, etc. etc.) may also be vulnerable if they are linked...
  10. Replies
    9
    Views
    8,988

    Glad to help.

    Linux is fun.
  11. Replies
    2
    Views
    3,979

    This may date me, but...

    I remember looking into the NASA Lewis center in Cleveland, Ohio, when the originally connected to the Cleveland Freenet.

    For those who have never heard of the Freenet, it was a precursor to the...
  12. Replies
    18
    Views
    10,199

    Okay.. I used the "complex" version of the...

    Okay.. I used the "complex" version of the conversation for arguements sake. Here is the actual comements in the source.

    On connection:


    1)
    A sends B 16 random bytes (bfhpkA)
    A sends B...
  13. Replies
    18
    Views
    10,199

    And if Bob is your only connection..

    That is great.

    I'm not saying that you CAN'T change your key.

    In fact, you can. Any time you want. And each time, you will need to reinitialize yourself with the entire network, unless they...
  14. Replies
    18
    Views
    10,199

    Clarification

    Looking into the functionality of this particular program, your key is, in fact, broadcast from someone who has decided to trust you to all people who have decided to trust them. Also, if ou change...
  15. Replies
    9
    Views
    8,988

    USB, PS2 or Serial?

    Depending on what type of mouse you are using, you can check the /dev file to see if ther is any input from the mouse, or if it somehow has been eaten.

    Post what you have, and I'll tell you what...
  16. Replies
    18
    Views
    10,199

    One other option...

    I've been using the CryptoAPI top encrypt my file system. Since it isn't broadcast, and it is only dependant on your processor as to how much overhead you can afford, using a 1024bit encryption...
  17. Replies
    8
    Views
    7,289

    Don't forget...

    I need those two files. Also, any specs you have on the computer would probably make it easier.

    Specs on the video, sound, cpu, amount of ram, dual processor or single processor, etc etc.
    ...
  18. Replies
    18
    Views
    10,199

    A Casual Observation

    Having some experience in security and encryption, I find this article's explanation a bit disturbing.

    If it is, as it states, a shared key community, then that means the community has and is...
  19. Replies
    8
    Views
    7,289

    OSS vs. ALS

    RedHat 9 has the dubious distinction of probably being the last distro to keep with the OSS version of sound support.

    My suggestion would be to recompile the kernel (or, better yet, upgrade to...
  20. Replies
    13
    Views
    12,901

    decent description of the wireless security hype

    http://www.eweek.com/article2/0,3959,886910,00.asp?kc=EWAV10209KTX1K0100440

    its a "management" level article that more or less talks about "security" via wireless and via wired connections. Each...
  21. Replies
    13
    Views
    12,901

    Clarification

    Omni-directional antennae do broadcast everywhere. If you are sending a signal in a tight stream, it is called directional. You would not have all that much broadcast information externally to the...
  22. Replies
    13
    Views
    12,901

    a nice company that has it

    http://www.hdcom.com/2.4ghzantennas.html

    they seem to have the equipment and possible antennae indexed.
  23. Replies
    4
    Views
    5,318

    Possibly the best spyware solution

    www.doxdesk.com
    its a very nice solution. I have implemented the JS piece into our intranet, and as that is the default page (forced) of our company, it does the job very nicely and has excellent...
  24. Replies
    13
    Views
    12,901

    option

    http://www.lxe.com/pdf/SpireDatasheet.pdf
    nasty antennae for a serious range.
  25. Replies
    14
    Views
    8,279

    Not to start a flame war, but..

    If you are using Microsoft servers to do the hosting, someone wardriving to grab your WAP security isn't your most obvious security hole.

    That being said, I have had some luck using *smaller*...
Results 1 to 25 of 26
Page 1 of 2 1 2