Search:
Type: Posts; User: Locked; Keyword(s):
Search:
Search took 0.02 seconds.
-
March 11th, 2006, 10:36 PM
Heres a link to a scanner which will help you see how it can scan a range:
pyscan
*Disclaimer: I've worked on this project as well.
-
February 24th, 2006, 11:00 PM
I hadn't thought of that. Thank you everyone for your help!
-
February 24th, 2006, 04:56 PM
The problem is that I CAN"T remove this stuff. I've checked every uninstall, went through every one of the folders. You do know that to be in line with their warranty, you HAVE to d/l their stuff?...
-
February 23rd, 2006, 01:19 AM
*note: If this is in the wrong area just move it and I apologize beforehand.
I've heard about this but I didn't really understand until it happened to me. Due to HP's "updates" I can now no longer...
-
February 16th, 2006, 08:34 PM
Now this may or may not help, but a while ago I had a 133Mhz comp with windows 98(Seven year old comp XD ). The weird thing was if you misconfigure some of your system .ini's then control panel...
-
February 12th, 2006, 06:21 AM
Well, I'm not to sure if PHP is client or server side. If the processing was server side then even for a simple cho box, validate input. If its client side, like javascript, then no worries.
here...
-
February 11th, 2006, 09:58 PM
Yes of course it has to be validated! A simple attack is to save the page with the form on the computer then alter the characteristics of the textarea box to allow about million or billion ...
-
February 10th, 2006, 04:45 PM
Nice. Mostly that answered all of my questions. Will there be links to the product provided in the txt files?Because if so, ironically, You could become the victim of a MITM attack whereby the...
-
February 10th, 2006, 08:30 AM
Well, actually my worry is that real attacks will be hidden amongst the fake ones. There are nine major companies participating with MS, Intel , and cisco included. Let me find the link... ah here it...
-
February 10th, 2006, 08:24 AM
Great idea man. How is this program being implemented? Is there a searh tool incorporated? Man I have a lot of questions. Btw, I've noticed your participation in the security focus mailing lists.
-
February 10th, 2006, 08:21 AM
Okay heres what I'm seeing(going to be doing some talking out loud so bear with me). The first unusual happenstance is at 2/10/2006 10:28:49, where a computer with the hostname of "FAIZA$" attempts...
-
February 8th, 2006, 08:27 PM
Well it could also be an internal port. Fport doesn't distinguish between ports used for internal communications, and external ports. Make sure your firewall logs all activity through that port. If...
-
February 6th, 2006, 05:21 AM
i'm not a virus expert so don't take what i say as gospel. I've studied some viruss', and keep up on the latest news /dislaimer
It could be possible if the virus was specifically targetted or...
-
February 3rd, 2006, 02:58 AM
Yep. i think its really an attempt to see which messages are alive for the spammers to track. Check the source to see if there are any "bugs" or small, 1 px by 1 px image, or small wav is being...
-
February 2nd, 2006, 01:27 AM
Very useful. One thing to note is that some sites which attempt the drive-by d/l of the WMF exploit show up as green. I of course reported the page. Currently it has a few problems. And the servers...
-
February 2nd, 2006, 01:16 AM
Hmm, sorry but I'm paranoid now, thanks to the new revelations. You do seem like a nice guy, but since this is a security forum, I guess the paranoia isn't really well-founded.
-
February 1st, 2006, 11:51 PM
Ah thank you for the correction. With that new stipulation, you add a new round of calculations and thus a new method of cracking. i'm going to work up a quick script that will look for patterns in...
-
February 1st, 2006, 08:06 AM
Well I just picked up the new Maximum Pc magazine for february. Had some great advice on dealing with bugs. I'm quite familiar with hijack this, but the magazine pointed out an excellent site for...
-
February 1st, 2006, 05:46 AM
Nihil, i meant the trunk of economics, IE bank transactions, stock exchange, etc. W/o those, then everything would quickly fall apart, due to how much we've come to rely on them. Our world today...
-
February 1st, 2006, 05:38 AM
I'd actually be wary of anyone using their first post top push some new product. Anyone seen that newspost at penny arcade about that guy who woulda had to create identities on forums to sell produts?
-
February 1st, 2006, 05:30 AM
Even with my admittedly limited mathematic skills, this just doesn't work AT ALL. Okay so say the two numbers chosen are... 221 and 65.
a= 221
b=65
so n is 221%65(don't use 17 with 221, produces...
-
January 31st, 2006, 11:03 PM
NOT a good algorithm. The reason that block algorithms work so well is that they take a BLOCK of values and essentially split up the values around based on the key. Only if you have a key can you put...
-
January 30th, 2006, 08:21 PM
Thank you for the warning!
-
January 30th, 2006, 12:10 AM
Hmmm, but if the internet were to go down, *somehow* then obviously it would be pretty sensational. Despite the claims that the Internet is resistant to attack, if something were to take out the...
-
January 29th, 2006, 07:25 PM
Ok it is a security hole. Some sites out there(I use linux and surf with firefox so pretty much safe to everything) when you enter them, try to d/l a wmf file onto your comp. In FF the would you like...
|
|