Type: Posts; User: Simon Templer; Keyword(s):
Search took 0.02 seconds.
It is actually very common for large companies to have incident response policies, most smaller businesses, smaller educational institutes, usually lack the resources to have or...
September 8th, 2002 03:23 PM
The language is VBScript.
Simon Templer :)
September 8th, 2002 02:25 PM
You left out an "End If"
I = 1
SUM = 0
WHILE (I < 11)
AI = "A" & I
September 6th, 2002 04:12 AM
You know guys and gals,
Believe it or not, you can learn alot from studying virii source code. I remember when I first started programming many years back, I studied virii for quite some time. ...
September 3rd, 2002 12:41 PM
Are you wanting ecrypted data inside of images OR encrypted image files?
If you want the encrypted data inside of images, then that is actually pretty easy... there are alot of...
August 28th, 2002 12:58 PM
I'm surprised that their were actually people that have read it!!
I remember I found it in the clearence section of a Walden Bookstore for like $5.
When I first read...
August 28th, 2002 03:43 AM
Boy it's been a long time since my last post!
Has anyone read the book "The Hacker Ethic" by Pekka Himanen?
Itís not like an Internet text (Although Iím sure you might find...
What does he want to do with it? Play Games, Programming, Web Surfing...?
I have an OLD 486 Laptop, that is similiar to the specs on your friends computer (small HD, 486, 16MB Ram). ...
Digital Rights Management Software != Virii or Trojans
DRM is used to ensure that you payed for what you are using!!
You do pay for stuff right? ;)
-Simon Templer :)
You figured it out!!! :)
I guess that was too easy eh? :confused:
- Simon Templer
I remember reading an article on Security Focus about Nicodemo Scarfo Jr's case. That was about the same time that everyone was talking about Magic Lantern!
If you guys felt a little uneasy about...
Ok... I figured I'd go ahead and post a challenge (Hell everyone else is doing it! ;) )
Here we go:
This is a simple encrpytion that uses an encryption key:
Text: t (Lower Case)...
I know how it is when don't have good documentation, Here are a few sites that might be helpful for you:
They have some good beginning tutorials on COM, and...
Both DTech and nebulus200 are correct either one would work...If you can't find it in your book then here ya go: :)
Note: I didn't look at your code, so these are just examples
In A Module:
I tihink that is already been posted:
Yes, it is possible :)
You know guys & gals...
Maybe he has his terms mixed up?
Because from what I've read...
If we remove the word Trojan...It sounds like one of the vulnerabilities Hotmail HAD with it's...
The scrapfile "trick" is really really OLD...
The .SHS file extension (and other "hidden" extensions) can be shown by using RegEdit to remove the "NeverShowExt" key. :)
Hmm...First off: "Create Object" is usually one word: CreateObject("whatever")
Second: What is this "Question", with the yes or no buttons? It sounds like a Scripting Error Dialog Box ("Do you...
Here is something that I usually do:
I write a sub that will load the DataGrid/ListView/Whatever.
Public Sub LoadListView()
I like the idea of the "crypto challenge"
But ummm... maybe a hint would help?
Is it like a cryptoquip?, or is it like encrypted with a variation of ROT-39?
The college I work for, asked me to write an application that would restrict programs, similiar to Application Security. The way I layed my program out was as follows:
Wow, it's been a while since I've posted (months!!!)
I noticed this thread, and I thought that maybe I could help by offering a programming perspective:
When I first read...
December 3rd, 2001 03:03 PM
I suggested this idea a little while ago with limited success...
I decided that this was...
December 3rd, 2001 03:15 AM
There used to be an old program called McAfee Nuts & Bolts...It had several utilities, including a registry cleaning utility. Nuts & Bolts also had optimization utilities...but best...