Search:

Type: Posts; User: forn28; Keyword(s):

Search: Search took 0.04 seconds.

  1. Replies
    29
    Views
    21,418

    Try PestPatrol (http://www.pestpatrol.com/)... ...

    Try PestPatrol (http://www.pestpatrol.com/)... That will detect all kind you spyware, keylogguer, remote control, etc...

    I don't know if the police will be able to find something and build a...
  2. Replies
    28
    Views
    15,328

    I think you miss the point. Nobody will be...

    I think you miss the point.

    Nobody will be sued over a hole in any software when NO patch is available.

    But, if you don't install the available patch and your computer is use in a DDoS, you...
  3. Replies
    34
    Views
    24,697

    It look like blind scanning. By using this...

    It look like blind scanning.

    By using this kind of packet, some firewall may be fooled. The only part puzzle me, is how the scanner can get the information back. Maybe a second, legal, packet is...
  4. Replies
    7
    Views
    5,855

    Tarpit can mess with ports scanning... And some...

    Tarpit can mess with ports scanning... And some configuration on firewall can slow your ports scanning to a craw. Be patient, that can be a very slow process. If you want to know what is happening,...
  5. Replies
    79
    Views
    62,332

    Under Canadian laws, everything lies on the...

    Under Canadian laws, everything lies on the expectation of confidentiality. If you crypts the com line, you expect that no one will be able to listen (except the intended recipient). If someone...
  6. Replies
    79
    Views
    62,332

    Wardriving by itself is legal under Canadian...

    Wardriving by itself is legal under Canadian laws... But it isn't to publish the information found when you wardrive (the dump, map, etc...) and to use without permission bandwidth of others. I do...
  7. Replies
    12
    Views
    7,868

    I remembered to saw a long time ago a piece of...

    I remembered to saw a long time ago a piece of software that can recognized the phone number. But I don't remember the name anymore (I used to be in ISP business more then 7 years ago). Do some...
  8. Replies
    10
    Views
    8,589

    I agreed that is *essential* to know networking...

    I agreed that is *essential* to know networking before security. From my point of view, is not enough to have a crash course in networking to be proficient in security. But, I'm working in computer...
  9. Replies
    10
    Views
    8,589

    No offence, but I didn't find any security...

    No offence, but I didn't find any security related question!?! Why so often Security 101 is more like Networking 101? I don't know if it's me, but I think it's important to know networking *before*...
  10. Replies
    6
    Views
    10,421

    Gartner try to influence the IT market. For the...

    Gartner try to influence the IT market. For the dot.com, they succeed, until the balloon explodes. Most of the time they are late or inaccurate. It's likely they live in an ivory tower!

    For the...
  11. Replies
    19
    Views
    15,273

    I prefer "external" firewall. Linksys or Netgear...

    I prefer "external" firewall. Linksys or Netgear DLS/Cable router (NO wireless!) is a good start. After you can explore some Linux firewall, but it will cost you a another computer and at least 2...
  12. Replies
    40
    Views
    32,118

    Canadian laws

    Here two URLs about Canadian Criminal Code laws that can apply on the subject.

    PART VI: INVASION OF PRIVACY
    http://laws.justice.gc.ca/en/C-46/41049.html

    PART IX: OFFENCES AGAINST RIGHTS OF...
  13. I disagree!!! All the steps taken after 9-11 are...

    I disagree!!! All the steps taken after 9-11 are exaggerate. The best way to save you from trouble, mind your own business. But... we are not in a political forum. For the sake, go see Bowling...
  14. I really like this one!!! By standing in the...

    I really like this one!!! By standing in the open not means sending sensitive information in a easy way to understand. Steganography is a great way to hide in the open.

    If you want the NSA to...
  15. Replies
    5
    Views
    6,276

    No change!!! Most sysadmin have no time to take...

    No change!!!
    Most sysadmin have no time to take care of the security...

    For home user, the biggest part of the market, until product will be secure right of the shelf, nothing will change...
  16. Replies
    5
    Views
    6,276

    No change!!! Most sysadmin have no time to take...

    No change!!!
    Most sysadmin have no time to take care of the security...

    For home user, the biggest part of the market, until product will be secure right of the shelf, nothing will change...
  17. Replies
    18
    Views
    5,287

    Wireless network are useful for the bad guy only...

    Wireless network are useful for the bad guy only to dissimulate the source of the attack... Or steal some bandwidth... Is more like a tool, not an exploit...

    The basic way to protect a wireless...
  18. Replies
    18
    Views
    5,287

    Wireless network are useful for the bad guy only...

    Wireless network are useful for the bad guy only to dissimulate the source of the attack... Or steal some bandwidth... Is more like a tool, not an exploit...

    The basic way to protect a wireless...
  19. Thread: Tech Movies

    by forn28
    Replies
    44
    Views
    12,001

    My Top 8... not in order Hackers - A classic...

    My Top 8... not in order
    Hackers - A classic
    Tron - This movie use the real computer terminology and hacking is like riding cool plastic bike
    WarGame - Wardialing!
    The Net - funny
    Swordfish -...
  20. Thread: help me

    by forn28
    Replies
    5
    Views
    2,922

    World best is not equal to cheap... A prefer...

    World best is not equal to cheap...

    A prefer NVidia based graphic card, good and not too expensive. The GeForce4 is the best, but expensive. The GeForce3 is good enough for most home user need...
Results 1 to 20 of 20