Search:
Type: Posts; User: droby10; Keyword(s):
Search:
Search took 0.06 seconds.
-
June 15th, 2004, 02:20 PM
no offense, sdk, but given that you're the only one familiar with the objectives of the host/environment - and haven't even mentioned what software applications the users will be running...expecting...
-
June 12th, 2004, 07:08 PM
me thinks you are misinterpretting the wording of "an elective credit" for meaning "scott-free". essentially, by having those certs, you get to skip the P.E class if you want. but you're still...
-
June 12th, 2004, 06:50 AM
there are a couple of theoretical approaches at a network level, but neither of them are going to yield any form of success in practice. you could do this via multilayered tunneling (which has...
-
June 12th, 2004, 05:04 AM
they're in the ntds.dit, there are also a number of internlized ways to provide redundant access to passwords. although some form of discretion must be accounted for.
...
-
September 20th, 2002, 02:32 AM
i'll try to simplify the clarity of pointers.
when you declare a pointer
char *p;
the pointer declaration(*) should be assumed to be a part of the type specification.
so after...
-
September 17th, 2002, 09:02 PM
the guys hosting your site should have acted quicker...i'd notify them that anyone logging into anywhere in that network segment between now and the time stated above needs to change their password...
-
September 17th, 2002, 08:00 PM
sorry for the delay...been away.
yes, i was saying not to delete it for two reasons both relating to maintaining the state of the system. 1) the timestamp as noted and 2) the contents of the...
-
September 17th, 2002, 03:56 PM
something is attempting to register a com server....when it pops up, leave it open and take a look at the process/application list for anything suspect. it could just be a faulty software...
-
September 17th, 2002, 05:47 AM
pull the plug - you've found the evidence, now you need to analyze without interruption. look at time stamps for the entire system based on the ctime of the setuid cgi script. were the web logs...
-
September 17th, 2002, 05:37 AM
i am jacks aching diaphragm from laughing so hard.
-
September 15th, 2002, 09:00 PM
you could do this...but the real issue is shellcode not extended or embedded sql commands.
-
September 15th, 2002, 08:46 PM
anonymous neg:
it's always nice to see creativity within a poor case of comprehensive reading skills...if i was "whining", there would have been a 'why'. i made a simple statement; actually i...
-
September 15th, 2002, 07:13 AM
i understand and support your point, but the absoluteness of it can be argued.
for instance, cryptoanalysis is often done prior to developing a new cypher to guard against weaknesses in any...
-
September 6th, 2002, 07:15 PM
a default routing setup will route regardless of network and host address; the rfc indicates that the reserved blocks _should_ not be routed in public networks; and are in most cases implemented as...
-
September 5th, 2002, 06:23 PM
a modem...?
well, then i wouldn't be as concerned as previously illustrated as you don't have a ethernet interface (ppp) or it's virtual (some implementations of pppoe).
-
September 5th, 2002, 06:44 AM
hmmm....
theoretically, if the attacking computer is local on the network, i could see how it might be possible to point you at a different dns, gateway, etc. such that you'd be on one end of a...
-
September 4th, 2002, 05:48 AM
consider the logical structure of an assembled program, where offsets are used for execution flow. in the following simplistic example, such a 4 bit change can be seen.
0x80483d0 <main>: ...
-
September 4th, 2002, 05:04 AM
what...like a large group of people at ao, who are supposedly "security-conscience" are the first to plug their ears, gag their neighbors, and blind-fold their children when anything controversial...
-
September 3rd, 2002, 10:59 PM
more than likely it's done through the detection of whether or not the test browser is the active window (which is accomplishable in javascript, no extra perms or controls needed).
here's an easy...
-
September 3rd, 2002, 10:52 PM
there is a duality in aspect with certifications and jobs. i think everyone is aware that certifications don't really mean anything with regard to performance levels. granted it is a token of...
-
September 3rd, 2002, 05:21 PM
the use of commenting features is database dependent (which you didn't list). my guess, is that you are using access - which doesn't provide this functionality.
but i've also experienced similar...
-
August 31st, 2002, 06:05 PM
hey, since all the heavy hitters are giving out greens....i could use a bigger buffer for those times where i play devils advocate and get slammed for it.
or you can neg me for trying...but you...
-
August 31st, 2002, 06:00 PM
the distinction between this guy's actions and those who do "good hacking" is obvious, isn't it? "good hacking" does exist, is valued, and even pays well. had max stayed on the straight and narrow,...
-
August 31st, 2002, 05:46 PM
i've posted another one of my older tutorials on my site. again, leaving it there so that i can make modifications/edits as needed and the formatting abilities. this reproduction was in response to...
-
August 29th, 2002, 11:06 PM
along with the above suggestion for tcp/ip illustrated (these top my list).
Title: Applied Cryptography, 2nd ed.
Author: Bruce Schneier
Publisher: John Wiley & Sons
ISBN: 0-471-11709-9
...
|
|