Search:
Type: Posts; User: UpperCell; Keyword(s):
Search:
Search took 0.09 seconds.
-
July 18th, 2005, 01:42 AM
Port knocking (PortKnocking.com ) is a good idea and all, I just believe it's overly complicated. The basic point is to only give away that your even running a service after authentication has taken...
-
on windows you can use nemesis and ethereal. Nemesis injects the packets, and ethereal... does what it does. Nemesis apparently doesn't wait around and read replies to it's own transmissions. It...
-
April 24th, 2004, 03:13 AM
Great.
Add to that a hint from a writer: DON'T WRITE YOUR TUTORIAL IN THE SUBMIT TOPIC BOX!!
Write it in at least vi, notepad, emacs, word, you know some other editor. Clean it up, make it...
-
April 22nd, 2004, 04:52 AM
There are several comercial solutions, I'm not sure about free drivers. Is it afp over Apple Talk, or over TCP/IP? that's what you've got to find out first. It is an app level protocol.
Ask:
Is...
-
April 22nd, 2004, 04:33 AM
Well you can't go wrong with ethereal, provided you get the latest version.
http://www.ethereal.com
no need to brute force if you use the sniffer right. You've got linux, script something to...
-
April 12th, 2004, 09:31 PM
If you could post the exact commands you used that would help.
Maybe even the results from 'iptables -L' just so we can see how everythings structured. You can't delete INPUT or OUTPUT, so there's...
-
April 12th, 2004, 08:34 PM
Second part of an interesting series on linux system foreinsics is out. The link to part one is in the document. I posted a link to the first part last month I think.
It's brought to us thanks to...
-
April 12th, 2004, 08:18 PM
Haven't gotten too into vpn yet, but can't you configure most browsers to only use specific connections? vpn connections are considered separate connections by the os usually right? if not nevermind.
-
April 12th, 2004, 07:31 PM
I'm fairly familiar with deep freeze. Boot disk and format dude. That's all I can suggest. And it worked the last time I heard. You obviously have use of the system so you can back all up. If you...
-
April 11th, 2004, 09:38 PM
Why? What? Are these legal? Do I care? I don't know.
There HASHES dude... By definition that means irreversible.
You could brute force them of course, but you've gotta have an algorithm... do...
-
April 11th, 2004, 09:06 PM
Here's my try. Customize the logging, and add your ports, but the rest should work fine.
As far as I know, for a regular box, all you need to customize is the INPUT chain. Do a 'iptables -L OUTPUT'...
-
April 9th, 2004, 06:27 PM
oh darn, *everybodies* favorite ad/crudware is vulnerable.
Na, just playin' sometime's you've gotta use it, I'm going for the patch thanks.
-
April 9th, 2004, 06:24 PM
What does 6 usable mean? (never purchased ip addy's from an isp.) Are they giving you a subnet of 8 addresses, 1 broadcast, and one net address?
So your leasing these I assume? And does that mean...
-
April 9th, 2004, 06:14 PM
Well, that's an aging debate... ancient may be more like it. Same with guns and such, make 'em illegal... what will that do? leave innocent people vulnerable, nothing else really.
The thing is...
-
April 9th, 2004, 03:26 AM
Hmm... don't know, doesn't seem any cheaper than norton. and considering how fairly user friendly norton corporate is (it's what they used at the schools I went to and worked for). Who knows... and...
-
April 8th, 2004, 03:47 PM
I'm not exactly sure why telnet doesn't work, since you've said all three computers have the command line version (this is correct right?) Edit doesn't work for technical reasons. The whole full...
-
April 8th, 2004, 03:23 PM
oh, I was like, why is the|Specialist talking like that? Wouldn't he get my point?
TheSpecialist? w/ 4 posts, yeah. ok, sorry.
You can't use notepad interactively from another computer, i.e....
-
April 8th, 2004, 03:38 AM
Do you have a purpose? We may be able to help more if we knew it, there may be better solutions.
Also, when you telnet to another computer, then run 'telnet' on it, you are running the remote...
-
April 7th, 2004, 07:05 PM
For chaining telnet sessions like your trying, you'll have to find a commandline telnet client, so you can use it on the command line. Windows 2k and XP come with this standard.
Not sure why it...
-
April 7th, 2004, 03:40 PM
LibnetNT It's what nemesis uses, and some others. Should be just what you need.
http://www.eeye.com/html/Research/Tools/libnetnt.html
~UpperCell.
-
April 6th, 2004, 05:14 AM
So are those trojans on your computer? If their not, then that's probably just a random netwide scan for trojans somebodies making. Nothing to really worry about, as long as you do block those ports....
-
April 6th, 2004, 04:36 AM
It depends on lot's o' stuff dude. A whole lot of stuff.
I'd be suspicious of a few of those ports, search this site and google for adware or trojan removal tools, or something similar. Scan with...
-
April 2nd, 2004, 04:22 AM
haha, ooh, scary... course I didn't see it, so I shouldn't say anything.
-
April 1st, 2004, 04:30 PM
Web based host's like hotmail and yahoo don't have free SMTP servers. On yahoo I know you can pay to get access to an SMTP server.
In general I would say that free online webmail does not...
-
April 1st, 2004, 04:21 PM
[edit: ahhh, nobodied posted when I hit the reply button!! - SirDice is great though.]
First of all, with respect to all your courteous questions of late, you can find most all of this on google,...
|
|