Type: Posts; User: daxmax; Keyword(s):
Search took 0.02 seconds.
Lots of good ground information.
Thank you for the link! :D
So in the end, your "unbreakable Cryptography" isn't unbreakable. It's simple unfeasible to break due to time\ machine power constraints.
You have to remember that when you access a particular domain all cookies from that domain will be stored in one place.
So if you access hotmail.com and login. The login information ( if you click...
April 15th, 2003 06:14 PM
Thanks for hearing me out nebulus, but hear me out.
I reinstalled it , set it to allow most.
So basically its letting everything that I don't disallow through.
Then I :
- I allowed...
April 15th, 2003 04:38 PM
Thank you for the responses.
Unfortunately I did check my outgoing blocking, and I have only a few programs there and very little being blocked.
Picture of Outpost:...
April 15th, 2003 02:09 PM
After reading alot of threads on here, I decided to give outpost a test spin. It seems like a well put together package, with support for added coding, and a good interface. However,
April 15th, 2003 01:26 AM
Come on people thing, we have to tear down walls one by one.
The first thing is what Neutron said, it's all behind a firewall and none of the ports can be accessed directly. So what do we have...
I actually use this type of app. to secure my ISS servers that I adminstrate. Nothing wrong with the application, only wrong is to what use you will put it too. The one I have checks for about 20,000...
There are many compression utilities which give you the capability to span a program\data across any number of files at any size you want.
a Secondary email on a hosted site or from my ISP.
(I am not sure if there is a cap to each email.)
However lets assume I can make each mail a max of 20 megs.
I want to store...
March 25th, 2003 06:01 AM
Whenever you have to touch the physical drive of your\remote server, know you have to use server side code. A form can request a file, and the file could very well be uploaded to the webpage, but...
March 25th, 2003 05:57 AM
I have seen a million zip password yankers. So I would have to say that zip password security is null.
March 25th, 2003 05:19 AM
Nice leg work ntsa.
There is a easy way to secure this on dbs like MS Access, on a physical level.
When I do standard SQL Selects ( 90% of the time) I open the db in read only.
When I actually...
March 25th, 2003 04:59 AM
I agree with July and SoggyBottom. You are taking the hackers approach to finding out what the port is. Since you are on the physical side of the hosts you have a great more deal of control over...
March 24th, 2003 07:34 PM
Just to add to the Convo this doc is specifically for the *Nix flavor of servers, nonetheless, you can hide your identity (somewhat) on M$ with tools like ServerMask or by directly modifying...
Ok as a web programmer this thread has confused me.
Or java , which has its beans and applets?
Well in all honestly with all the "do-it-yourself" php sites there is I highly doubt you should have to pay.
To name a few
Then of course you could go a...
Web Programmer so I use stuff like Flash MX, Adobe Photoshop, Homesite, Asp.net Matrix.
Putty for the obvious, Any FTP program I can get my hands on rapidly,
For web diagnosis I use alot of...
In all honesty with the amount of times I have lost my keys I would be afraid of using one of those. One slip up and your data is public knowledge. People lose laptops, how hard can it be to lose...
This is obviously a good idea but is already a common idea. I subscribe tovarious newsletters which give me weekly updates on new products. From Sharper image to cnet, I like to know whats out. If...