Search:
Type: Posts; User: GONEin62nd; Keyword(s):
Search:
Search took 0.02 seconds.
-
April 25th, 2005, 02:38 PM
nihil,
Thanks again! Actually, the technical guy from the shop also recommends to directly coordinate with Dell about the matter. Not much to do right now. I also suggested further to the owner...
-
April 24th, 2005, 01:33 PM
Maestr0, Hello! It was a good explanation you had point out above. :) The Laptop that I am currently checking is Dell Latitude D505, does it fall in the CP or CPI category? And I had checked all...
-
April 22nd, 2005, 04:22 PM
Maestr0,
I've tried the same program (latitude.exe) several times 2 days ago, with no positive results.
And the Dell service tag (found at the back of the Laptop) is actually 7-digit and not...
-
April 22nd, 2005, 10:27 AM
Related to this thread, it is funny I came across one guy asking for the same issue about his Dell Latitude D505.
I had checked it last two days ago and been working around inside out but did not...
-
April 21st, 2005, 05:32 AM
Hello!
It is a nice review about SW and SW vulnerabilities in general. It even discuss about different users' reaction on SW they try or use. About the stats on vulnerabilities, I am still on...
-
April 19th, 2005, 06:25 PM
Yeah! It really is fun ENCRYPTING then DECRYPTING such. You really have some CooL talent and efforts on searching tools for the right job.
*More OFF-TOPIC* It is also a good way of finding one's...
-
April 19th, 2005, 05:52 PM
phishphreek80,
Using ASCII indeed promotes better strength.
On a side note, however, ASCII used in PW discourages me. Last month, I had updated my e-mail PW's (as a routine activity), I just...
-
April 19th, 2005, 05:41 PM
Nice Overview!
Many thanks again!
-GONE
__________________
an"to*nym (noun) [Greek: a word used in substitution for another]
A word of opposite meaning ; a counter-term ; used as a...
-
April 19th, 2005, 05:03 PM
Negative,
Thank you for the enlightenment. Well, as of now, I coundn't agree more with the WEP.
For WPA, I will still check more white papers and stuff related to it.
Since WIRELESS...
-
April 19th, 2005, 04:01 PM
Hi there!
Good demonstration, although after some thinking,
At least the Agent should have used a strong PASSPHRASE and demonstrate it. If I were there, I will try to ask if I can also join...
-
April 19th, 2005, 02:10 PM
MoonWolf,
Thanks again.
About the codes, not yet satisfying although some of the codes you had cracked, but the main thing here is, since the ENCRYPTION is automatically made by the SW that I...
-
April 19th, 2005, 10:45 AM
MoonWolf,
Thanks for the info!
Eyup, it is javascript alright and it uses 'unescape' but...
is not working. It again shows symbols. Maybe a stronger ENCRYPTION. You have any other tools...
-
April 19th, 2005, 09:26 AM
*OFF TOPIC* PUSHING THE LIMIT, HUH! I have been observing AO for a couple of months and been aware of rules and such. TheSpecialist is the guy who was banned before and came back and now, banned...
-
April 18th, 2005, 06:34 PM
Hello!
These advantages could answer your needs specifically for
I had also tried using good old dual-processor of Intel (dual PIII 500MHz) in server side processing and it is really...
-
April 18th, 2005, 05:14 PM
Hello there!
- Probably the case.
The point is it also depends on the type of process your SQL is doing.
In our company, I remember the time when we had the same load problem in which we...
-
April 18th, 2005, 10:30 AM
Moore's Law - 40 years and beyond
Moore's Law (Gordon Moore), the famed observation that the number of transistors on a chip can double every two years, is going 40.
-GONE
-
April 18th, 2005, 10:00 AM
MS Longhorn FAQ
Very promising! :)
MS had to have tough decision on this matter, specifically about the security of each version that they will make for longhorn. Simplify an array of...
-
April 18th, 2005, 09:48 AM
Intel dual-core chips set to ship
Dual-core chips were said to be revolutionizing our computing experience and seen as the next big step in the evolution of x86 processors. Anything like...
-
April 18th, 2005, 08:17 AM
- Agreeing further. Most of the viruses are either executable or attached to executables, in a way it cannot be just a source code, as far as I can elaborate, like any other program, a virus has to...
-
April 17th, 2005, 04:14 PM
hXXp://www.m4r0c4n.com - yeah, I cannot find it both in INTERNIC and RIPE.
- Sounds Moroccan.
-GONE
__________________
an"to*nym (noun) [Greek: a word used in substitution for another]
A...
-
April 17th, 2005, 03:47 PM
Hi!
- Firstly, I get a message on Firefox (1.0.3) - "The connection to online.regions.com has terminated unexpectedly. Some data may have been transferred". In IE, "cannot find server, The page...
-
April 17th, 2005, 08:12 AM
Hi there s0nIc!
This threat is quite old. It could already infected the system hard and down to the registry.
Check this complete information and instruction from Symantec - Backdoor.Trojan...
-
April 16th, 2005, 08:17 PM
Errr, wonder why I did not noticed Firefox update in my box lately today.
Well, just downloaded it and so far, 1.0.3 is quite OK here. Need to check the last vulnerabilities to be sure it's gone...
-
April 16th, 2005, 02:57 PM
kshatriyarules,
It sure is better if you have uploaded the zip file here for the tutorial which is yours rather than linking it to other forums. I guessed this had been posted yesterday and...
-
April 15th, 2005, 04:27 AM
- Another way that some secured website like citibank is allowing you to click on number pads (displayed on the web site) for your pin instead of typing it in from your keyboard.
- Don't worry, PW...
|
|