Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: sodaphish; Keyword(s):

Search: Search took 0.00 seconds.

  1. Replies
    6
    Views
    1,615

    you will have to blow open the switching on the...

    you will have to blow open the switching on the router -- flooding the cam tables is the standard approach, though I don't know what defenses, specifically, the wrt54g will have. (if you know the...
  2. Replies
    9
    Views
    3,151

    I use xcode (included free with MacOS X) to write...

    I use xcode (included free with MacOS X) to write C, Java, Perl, PHP and BASH code. Most of my stuff is Java or Perl. XCode is an adequate IDE for Java, but not so much for Perl -- I prefer vim for...
  3. Replies
    2
    Views
    695

    are you saying you can't support 20k parallel...

    are you saying you can't support 20k parallel users? and you think this iss associated with `uimit` because of the number of open file descriptors? are you getting an error that you're going off...
  4. Replies
    1
    Views
    975

    so, this is a legit request, as was my own...

    so, this is a legit request, as was my own (http://www.antionline.com/showthread.php?s=&forumid=15&threadid=242559), both have been summarily ignored, BrainStop's for over a year, mine for a day......
  5. Thread: Dual Booting

    by sodaphish
    Replies
    8
    Views
    748

    doc crontab: password protecting your...

    doc crontab:

    password protecting your bootloader doesn't prevent someone from walking up with an install CD or a boot floppy and just booting the box manually...

    -C
  6. Jared; Have you opened up your DFL-300 to see...

    Jared;

    Have you opened up your DFL-300 to see what its got inside? Perhaps you could add more RAM to the box? The other thing you might want to consider is seeing if you can manage the Session...
  7. Wow, Kimmey is up to it again... what an oaf! he...

    Wow, Kimmey is up to it again... what an oaf! he gives anyone with any technological savvy a bad name.

    -C
  8. Replies
    3
    Views
    460

    1) The only direct references to "algorithmic...

    1) The only direct references to "algorithmic diagnostic methods" on google were gastro-intestinal sites that said, basically, "Algorithmic diagnostic methods guide an examiner through the...
  9. Thread: ICMP and VB

    by sodaphish
    Replies
    2
    Views
    551

    here...

    here (http://www.distinct.com/products/vit32/docs/vit40_07.asp) is an active X control that allows you to access ICMP... it even includes sample code.

    BTW: I found that by googleing for "visual...
  10. Replies
    4
    Views
    588

    Are you asking about the IOS image, or the your...

    Are you asking about the IOS image, or the your configuration files? If you're asking about the IOS image, then that's assigned by Cisco and should be documented. If you're asking about your config...
  11. Replies
    4
    Views
    695

    The problem you'll run in to is that each state...

    The problem you'll run in to is that each state in the US handles these cases differently... it also depends on whether or not the employee signed an "acceptable use" document, which grants the...
  12. Thread: Dual Booting

    by sodaphish
    Replies
    8
    Views
    748

    First, you'll need to free up some space and...

    First, you'll need to free up some space and create a partition for your RH8 install (I'd download RH9, its out now). When you install RH, it will give you the chance to setup your boot menu; just...
  13. Thread: Forum's

    by sodaphish
    Replies
    11
    Views
    1,042

    http://bsdforums.org/forums that's my...

    http://bsdforums.org/forums

    that's my favorite place to hang (next to AO of course.)

    -C
  14. Replies
    9
    Views
    1,425

    Jonesy69: Have you considered running Snort on...

    Jonesy69:

    Have you considered running Snort on a machine that doesn't have a stack bound to its network interface card? This would be a GREAT way of 'hiding' your IDS box, and also preventing it...
  15. Replies
    11
    Views
    1,305

    netcat. setup netcat on your box at home...

    netcat. setup netcat on your box at home (presumably a broadband box with a fixed IP) and tell it to listen to a port you KNOW you can get to from school without going through the proxy server. ...
  16. Replies
    7
    Views
    687

    yes, I should've specified a bit more... ...

    yes, I should've specified a bit more...

    perl's execution cycle goes something along the lines of: integrity check, perl to byte-code conversion, byte-code to syscall conversion (to binary format...
  17. Replies
    7
    Views
    687

    'cause perl is interpreted and is converting its...

    'cause perl is interpreted and is converting its own byte-code to system calls on-the fly.

    -C
  18. Replies
    4
    Views
    466

    Depending on how your box (and your network) is...

    Depending on how your box (and your network) is configured, your machine may also return an ICMP SERVICE UNAVAILABLE packet, or confusingly, an ICMP TIMEOUT EXCEEDED packet.

    -C
  19. Replies
    30
    Views
    2,390

    ...I have to say I'm a bit surprised no one even...

    ...I have to say I'm a bit surprised no one even mentioned OpenBSD (http://openbsd.org). OpenBSD is a free UNIX (like FreeBSD and NetBSD) designed to be secure, and semi-portable. Depending on the...
  20. Replies
    5
    Views
    604

    1) use ingress packet filtering (in linux, `man...

    1) use ingress packet filtering (in linux, `man iptables`)
    2) turn off all unnecessary services (check open ports with `netstat -na | grep -i listen`)
    3) apply vendor patches.
    4) monitor vendor...
  21. Replies
    0
    Views
    672

    mark forum read

    would it be possible add a link to mark each forum's contents as read as opposed to the global "mark all threads read"? having a link in each forum would be quite useful.

    -C
Results 1 to 21 of 21

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides