Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: weaver_x7; Keyword(s):

Search: Search took 0.02 seconds.

  1. Replies
    13
    Views
    19,400

    I've written a program that takes a list of ip's...

    I've written a program that takes a list of ip's and port numbers and creates an ftp connection to them using threads. The main part of this program creates a thread for a new connection, and does...
  2. Replies
    12
    Views
    710

    If I remember correctly, since MSN uses your...

    If I remember correctly, since MSN uses your hotmail account as your login, they actually use the same contact lists. You'll probably have to add them again.
  3. Thread: Netsky.C

    by weaver_x7
    Replies
    3
    Views
    836

    An interesting tidbit about Netsky.c. It seems to...

    An interesting tidbit about Netsky.c. It seems to want to disable MyDoom.a and MyDoom.b. Look at McAfee's site here .
  4. Replies
    5
    Views
    547

    I don't know why you made a second class in this...

    I don't know why you made a second class in this example. You can have a main method in any class. It will only run if you try to run this class or explicitly call it.


    I see 2 errors with your...
  5. Replies
    9
    Views
    728

    Actually, it's BEDMAS. Brackets Exponents...

    Actually, it's BEDMAS.

    Brackets
    Exponents
    Division
    Multiplication
    Addition
    Subtraction
  6. Replies
    16
    Views
    4,659

    All java source files must have the .java...

    All java source files must have the .java extension in order to be compiled.
  7. Replies
    4
    Views
    1,786

    Thanks, I'll take a look at those.

    Thanks, I'll take a look at those.
  8. Replies
    4
    Views
    1,786

    Encryption Algorithms

    Does anyone have any good resources on encryption algorithms?
  9. Replies
    8
    Views
    942

    Ok, I think I should consolidate what I am...

    Ok, I think I should consolidate what I am looking for.

    - Command line encryption program (preferably commercial)
    - Must be able to encrypt part of a line (like position 23 to 36)
    - Must be able...
  10. Replies
    8
    Views
    942

    To be honest, I don't care what encryption I use....

    To be honest, I don't care what encryption I use. I am actually using Oracle's sqlload command to load the data into Oracle. The data actually is coming from a number of different machines to one...
  11. Replies
    25
    Views
    3,233

    AVG is a very nice antivirus program. It will...

    AVG is a very nice antivirus program. It will work on any Windows OS (maybe not 3.1 but who is running that anyway). There is very little overhead with it and I have noticed that it can usually deal...
  12. Replies
    8
    Views
    942

    Actually, I am importing the data into Oracle...

    Actually, I am importing the data into Oracle already. The data needs to be encrypted before it is loaded into Oracle.
  13. Replies
    8
    Views
    942

    I need to encrypt part of the file because it is...

    I need to encrypt part of the file because it is sensitive information. I won't be able to work with the rest of the data if the whole file is encrypted.
  14. Replies
    8
    Views
    942

    Command line encryption program

    I am looking for a command line encryption program that can encrypt a specific part of a line within a file.

    The program must run on unix and idealy should be a commercial product.
Results 1 to 14 of 14

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides