Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: Locked; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.01 seconds.

  1. Replies
    3
    Views
    994

    Heres a link to a scanner which will help you see...

    Heres a link to a scanner which will help you see how it can scan a range:

    pyscan

    *Disclaimer: I've worked on this project as well.
  2. Thread: Hijacked by HP

    by Locked
    Replies
    11
    Views
    1,455

    I hadn't thought of that. Thank you everyone for...

    I hadn't thought of that. Thank you everyone for your help!
  3. Thread: Hijacked by HP

    by Locked
    Replies
    11
    Views
    1,455

    The problem is that I CAN"T remove this stuff....

    The problem is that I CAN"T remove this stuff. I've checked every uninstall, went through every one of the folders. You do know that to be in line with their warranty, you HAVE to d/l their stuff?...
  4. Thread: Hijacked by HP

    by Locked
    Replies
    11
    Views
    1,455

    Hijacked by HP

    *note: If this is in the wrong area just move it and I apologize beforehand.

    I've heard about this but I didn't really understand until it happened to me. Due to HP's "updates" I can now no longer...
  5. Replies
    10
    Views
    3,023

    Now this may or may not help, but a while ago I...

    Now this may or may not help, but a while ago I had a 133Mhz comp with windows 98(Seven year old comp XD ). The weird thing was if you misconfigure some of your system .ini's then control panel...
  6. Replies
    9
    Views
    1,710

    Well, I'm not to sure if PHP is client or server...

    Well, I'm not to sure if PHP is client or server side. If the processing was server side then even for a simple cho box, validate input. If its client side, like javascript, then no worries.
    here...
  7. Replies
    9
    Views
    1,710

    Yes of course it has to be validated! A simple...

    Yes of course it has to be validated! A simple attack is to save the page with the form on the computer then alter the characteristics of the textarea box to allow about million or billion ...
  8. Replies
    8
    Views
    1,081

    Nice. Mostly that answered all of my questions....

    Nice. Mostly that answered all of my questions. Will there be links to the product provided in the txt files?Because if so, ironically, You could become the victim of a MITM attack whereby the...
  9. Replies
    10
    Views
    2,283

    Well, actually my worry is that real attacks will...

    Well, actually my worry is that real attacks will be hidden amongst the fake ones. There are nine major companies participating with MS, Intel , and cisco included. Let me find the link... ah here it...
  10. Replies
    8
    Views
    1,081

    Great idea man. How is this program being...

    Great idea man. How is this program being implemented? Is there a searh tool incorporated? Man I have a lot of questions. Btw, I've noticed your participation in the security focus mailing lists.
  11. Replies
    19
    Views
    3,262

    Okay heres what I'm seeing(going to be doing some...

    Okay heres what I'm seeing(going to be doing some talking out loud so bear with me). The first unusual happenstance is at 2/10/2006 10:28:49, where a computer with the hostname of "FAIZA$" attempts...
  12. Replies
    9
    Views
    1,599

    Well it could also be an internal port. Fport...

    Well it could also be an internal port. Fport doesn't distinguish between ports used for internal communications, and external ports. Make sure your firewall logs all activity through that port. If...
  13. Replies
    5
    Views
    1,294

    i'm not a virus expert so don't take what i say...

    i'm not a virus expert so don't take what i say as gospel. I've studied some viruss', and keep up on the latest news /dislaimer
    It could be possible if the virus was specifically targetted or...
  14. Thread: Yahoo Hoax??

    by Locked
    Replies
    9
    Views
    1,492

    Yep. i think its really an attempt to see which...

    Yep. i think its really an attempt to see which messages are alive for the spammers to track. Check the source to see if there are any "bugs" or small, 1 px by 1 px image, or small wav is being...
  15. Thread: site advisor

    by Locked
    Replies
    1
    Views
    1,022

    Very useful. One thing to note is that some sites...

    Very useful. One thing to note is that some sites which attempt the drive-by d/l of the WMF exploit show up as green. I of course reported the page. Currently it has a few problems. And the servers...
  16. Replies
    8
    Views
    1,436

    Hmm, sorry but I'm paranoid now, thanks to the...

    Hmm, sorry but I'm paranoid now, thanks to the new revelations. You do seem like a nice guy, but since this is a security forum, I guess the paranoia isn't really well-founded.
  17. Replies
    18
    Views
    4,047

    Ah thank you for the correction. With that new...

    Ah thank you for the correction. With that new stipulation, you add a new round of calculations and thus a new method of cracking. i'm going to work up a quick script that will look for patterns in...
  18. Replies
    1
    Views
    1,277

    Hijack This log analyzer...

    Well I just picked up the new Maximum Pc magazine for february. Had some great advice on dealing with bugs. I'm quite familiar with hijack this, but the magazine pointed out an excellent site for...
  19. Replies
    18
    Views
    1,637

    Nihil, i meant the trunk of economics, IE bank...

    Nihil, i meant the trunk of economics, IE bank transactions, stock exchange, etc. W/o those, then everything would quickly fall apart, due to how much we've come to rely on them. Our world today...
  20. Replies
    8
    Views
    1,436

    I'd actually be wary of anyone using their first...

    I'd actually be wary of anyone using their first post top push some new product. Anyone seen that newspost at penny arcade about that guy who woulda had to create identities on forums to sell produts?
  21. Replies
    18
    Views
    4,047

    Even with my admittedly limited mathematic...

    Even with my admittedly limited mathematic skills, this just doesn't work AT ALL. Okay so say the two numbers chosen are... 221 and 65.
    a= 221
    b=65
    so n is 221%65(don't use 17 with 221, produces...
  22. Replies
    18
    Views
    4,047

    NOT a good algorithm. The reason that block...

    NOT a good algorithm. The reason that block algorithms work so well is that they take a BLOCK of values and essentially split up the values around based on the key. Only if you have a key can you put...
  23. Replies
    3
    Views
    716

    Thank you for the warning!

    Thank you for the warning!
  24. Replies
    18
    Views
    1,637

    Hmmm, but if the internet were to go down,...

    Hmmm, but if the internet were to go down, *somehow* then obviously it would be pretty sensational. Despite the claims that the Internet is resistant to attack, if something were to take out the...
  25. Replies
    10
    Views
    1,643

    Ok it is a security hole. Some sites out there(I...

    Ok it is a security hole. Some sites out there(I use linux and surf with firefox so pretty much safe to everything) when you enter them, try to d/l a wmf file onto your comp. In FF the would you like...
Results 1 to 25 of 34
Page 1 of 2 1 2

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides