Search:
Type: Posts; User: j3r; Keyword(s):
Search:
Search took 0.02 seconds.
-
December 3rd, 2003, 10:45 PM
No. X display security is entirely host-based. (Yay!) (X was developed back in the days when, if you knew how to use Unix, you knew everyone else who knew how to use Unix. Security was not much of an...
-
December 3rd, 2003, 09:03 PM
br: are you doing it in the right order? You have to xhost +whatever first, then open the xterm.
-
December 3rd, 2003, 08:32 PM
Try "xterm -display 10.10.10.1:0.0"
Edit:
Perhaps a bit more explanation is in order. X windows can have multiple session per machine, and multiple screens per session. The ":0.0" specifies...
-
December 1st, 2003, 08:56 PM
It's not a feature of telnet or xterm. Attackers replace the existing copies of the telnet/xterm/ssh/etc. programs with ones that more-or-less appear to work the same, but actually do something evil,...
-
November 26th, 2003, 03:17 PM
Of course, the problem with "just firewall them" is that sometimes, you'll be blocking an address that is actually owned by someone you want to talk to. Just be careful, is all.
-
November 24th, 2003, 07:23 PM
As seen on slashdot:
An Israeli student did her doctoral dissertation by profiling Israeli hackers (using this term as her interviewees seem to be a cut above the average skrypt kiddie). Not sure...
-
November 20th, 2003, 10:10 PM
Actually, Cisco's scheme is a way to provide lock-in for Cisco and the big anti-virus companies. It lets Cisco sell new hardware, and lets the cabal decide which AV products get to be deployed on a...
-
November 20th, 2003, 03:13 AM
Basically what you said, I image internal routers get BGP info from the VPN server to determine what ports to open to what VLANs. I haven't actually seen this done, but imagine it might be done on a...
-
November 20th, 2003, 12:05 AM
tekno: I would not be surprised if some Cisco VPN solutions used BGP to open up various VLANs based on your VPN credentials.
That said, yeah, you're generally right.
-
November 19th, 2003, 11:26 PM
Most FW admins are not worth their salt. :-/
-
November 19th, 2003, 05:00 PM
With regard to the BGP &c., that only applies (AFAIK) to VPNs that terminate on the router. So, if one of your ISPs is friendly, they can help you out. Otherwise, that is not relevant to the current...
-
November 19th, 2003, 03:21 PM
Why not go to the source?
-
November 19th, 2003, 05:01 AM
cheyenne1212, you are, unfortunately, right. I believe some VPN solutions have noticed that this is a problem, and tunnel the VPN connection through port 80. (I think Cisco does this?)
One...
-
November 19th, 2003, 04:57 AM
deftones
You can't just copy the data out of ethereal. Close, but not quite. First off, ethernet packets are small - 1.5K a piece, so the image will be split up among the packets. You can probably...
-
November 19th, 2003, 02:18 AM
New mice are like 5 euros. You can try taking your apart and checking for loose solder connections, dirt, etc. Mice are generally pretty easy to dis and re assemble. And if you break it, well, you...
-
November 19th, 2003, 02:12 AM
Man, to bad I don't have a VB6 decompiler, I wonder what ShitApp actually does...
-
November 18th, 2003, 11:05 PM
If you really don't want spam, you can get one of the challenge/response systems like Mailblocks (not an endorsement, I use client-side bayesian filtering). Whenever someone new sends you mail, they...
-
November 18th, 2003, 10:57 PM
Install linux, use cdrecord :-P
-
November 18th, 2003, 09:59 PM
Yeah, this is just silly. Will there be a certification process for anti-virus software? How much will it cost? If AV software doesn't have to be certified, I'll just define SETI@Home to be AV...
-
November 18th, 2003, 08:34 PM
What mark_boyle2002 said, except that if they do not match, your are either going through a proxy server or are behind a NAT device. They are not the same thing, and depending on what you're trying...
-
November 18th, 2003, 06:53 PM
http://lists.insecure.org/lists/bugtraq/2003/Nov/0120.html
http://lists.insecure.org/lists/bugtraq/2003/Nov/0134.html
etc...
-
November 18th, 2003, 06:37 PM
It's easy. You need something that does port forwarding (stunnel is best, if you can get it on your platform) to be run on the machine you're using, and the remote machine. So say you wanted to use...
-
November 18th, 2003, 02:26 PM
In the US, any device (except garage door openers) that bypasses copy-protection methods is generally illegal. In the US and pretty much the rest of the world (all of Europe, for instance), the act...
-
November 18th, 2003, 04:23 AM
Setting a single file's mode to 777 can be very dangerous. OTOH, is can be totally harmless. If the file contains shell commands that are then executed, then you must be totally sure that nobody can...
-
November 18th, 2003, 12:25 AM
You could set up a streaming mp3 server on one of the machines, then connect the players on the various computers to connect to the stream. Just make sure that you're using the same amount of...
|
|