Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: shell_coder; Keyword(s):

Search: Search took 0.01 seconds.

  1. Replies
    7
    Views
    2,248

    I recommend the Senao NL-2511CD PLUS EXT2 200mw. ...

    I recommend the Senao NL-2511CD PLUS EXT2 200mw. It requires an external antenna, but it is a very capable card.

    http://www.wlanparts.com/product/NL2511CDPLUSEXT2

    -SC
  2. Replies
    17
    Views
    1,604

    As stated earlier, the trouble your experiencing...

    As stated earlier, the trouble your experiencing is most likely being caused by a kernel mode rootkit... If it is a desperatley mission critical machine, there is one thing you could 'try' to...
  3. Replies
    6
    Views
    985

    scary... but related link ...

    scary... but related link http://www.evilscheme.org/defcon/


    -shell coder
  4. Replies
    22
    Views
    1,733

    This may seem like to simple a fix, but is it...

    This may seem like to simple a fix, but is it possible that the attacker switched the recover password e-mail during the initial crack... I would check, just in case.

    -Shell_Coder
  5. Replies
    10
    Views
    1,251

    Yes, unfortunately packet sniffers can be...

    Yes, unfortunately packet sniffers can be detected. L0pht's antisniff utility, is the only tool that comes to mind right off hand. What do you mean by "interesting" activity... could you post some...
  6. Replies
    10
    Views
    1,251

    Sounds like you may have a problem with an...

    Sounds like you may have a problem with an attacker executing a man in the middle attack. I dont completely understand what is going on, but that is my best guess... The only good way to prevent...
  7. Replies
    8
    Views
    1,117

    Honeyd is pretty good if your interested in using...

    Honeyd is pretty good if your interested in using windows. The other thing I want to recommend just-in-case... if you dont have premission from your ISP be careful, you may be breaking some rules if...
  8. Thread: why?!!?

    by shell_coder
    Replies
    8
    Views
    842

    nah... you dont need crypt.h you just need to...

    nah... you dont need crypt.h you just need to compile it with gcc or... you can use the windows crypt api. If your interested in making it work for windows i recommend searching for Crypt on MSDN's...
  9. Replies
    5
    Views
    689

    That is a pretty short list... and you left out...

    That is a pretty short list... and you left out one of the bigger players www.packetstormsecurity.com

    -Shell_Coder
  10. Thread: why?!!?

    by shell_coder
    Replies
    8
    Views
    842

    I belive i can offer some assistance here... the...

    I belive i can offer some assistance here... the included library unistd contains crypt. The only thing I can think of is that your compiler either does not have that header file, or during compile...
  11. Replies
    6
    Views
    727

    Yea, I actually just recently picked one up about...

    Yea, I actually just recently picked one up about 2 weeks ago from a borders as well... at first i figured it was some new local thing, but looking down at the volume number had me confused. It is...
  12. Replies
    10
    Views
    1,246

    If you are really paranoid, I would check this...

    If you are really paranoid, I would check this site out www.anonix.com. Not sure how long they could really keep your info. private, but interesting none the less.

    -Shell_Coder
  13. Replies
    11
    Views
    2,245

    Info Tech Geek, Im affraid I must dissagree... I...

    Info Tech Geek, Im affraid I must dissagree... I can almost garuntee, that there is other traffic that the user is getting that Sygate is incapable of detecting. If I were to run a sniffer on his...
  14. Replies
    11
    Views
    2,245

    Well, the first thing I would do is run a whois...

    Well, the first thing I would do is run a whois search on those IP's... I like to know where its comming from, makes it more fun. Also, if you dont want to see logs of those IP's anymore i recommend...
  15. Replies
    16
    Views
    2,426

    graemejaxx, normally I would recommend that you...

    graemejaxx, normally I would recommend that you backup any data that you need, wipe the hard drive, and do a complete re-install. That is pretty much a "best practice" kind of thing to do after an...
Results 1 to 15 of 15

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides