Search:

Type: Posts; User: tomdaq; Keyword(s):

Search: Search took 0.02 seconds.

  1. Replies
    4
    Views
    4,842

    Defacement mirror

    Is it possible that the popular defacement mirror has been defaced?



    -taken from www.zone-h.com

    _TOMDAQ
  2. Replies
    32
    Views
    17,797

    stickman, The article you read was most likely...

    stickman,

    The article you read was most likely about Adrian Lamo. He's received a lot of press lately (mostly because he hacked into the New York Times and they decided to press charges) and it's...
  3. Replies
    1
    Views
    8,561

    Nigerian email fraud

    I'm not sure if this has already shown up here, but I thought it was an interesting read:

    http://www.zone-h.org/nigerianfraud

    It seems the folks at Zone-H followed through with one of those "we...
  4. Replies
    11
    Views
    13,410

    Anyone care to place a wager on how long it will...

    Anyone care to place a wager on how long it will take Core Security to get a law suit together?

    I'm guessing that the project will have to pick up a little bit more steam before Core really gets...
  5. Replies
    8
    Views
    7,614

    Maroni, I respect your paranoia, but I don't...

    Maroni,

    I respect your paranoia, but I don't think you have anything to worry about. Viruses can live on a boot sector, but this a rather old school approach. Furthermore, they don't have any...
  6. Replies
    7
    Views
    7,010

    The version of Windows is an important...

    The version of Windows is an important consideration here. With windows 9x/ME, gaining complete control of the operating system is a bit more difficult because there are very few network services...
  7. I've often wondered why I haven't heard more...

    I've often wondered why I haven't heard more about viruses spreading through bluetooth enabled devices. I don't know much about bluetooth standards so maybe it's to difficult to bother with or just...
  8. Thread: Bypassing NAT

    by tomdaq
    Replies
    17
    Views
    11,912

    R0n1n, I suppose it depends on the router you are...

    R0n1n, I suppose it depends on the router you are using and the manufacturer's interpretation of NAT. If your router has a built in firewall, then some protection will be afforded, however, NAT by...
  9. Thread: Bypassing NAT

    by tomdaq
    Replies
    17
    Views
    11,912

    Why would NAT have to be "bypassed" for you to...

    Why would NAT have to be "bypassed" for you to see this traffic. I think you're missing an important piece of network address translation. Key point - NAT does not provide any security whatsoever. ...
  10. Replies
    2
    Views
    3,817

    You definitely want the access-list on the...

    You definitely want the access-list on the outside to be as granular as possible. If you are running an IOS with the firewall feature set, the access-list provides several features not present in...
  11. Replies
    27
    Views
    13,639

    A few more thoughts... Try searching for...

    A few more thoughts...

    Try searching for 'passive OS scanning' on Google. If your class is on a shared network i.e. a hub, you might be able to use a passive OS scanner to find more information...
  12. Replies
    18
    Views
    20,422

    On the HIDS note; check out SamHain. It has way...

    On the HIDS note; check out SamHain. It has way more features than Tripwire and it's still open source!

    http://la-samhna.de/samhain/

    -Tomdaq
Results 1 to 12 of 12