Search:
Type: Posts; User: Maestr0; Keyword(s):
Search:
Search took 0.04 seconds; generated 55 minute(s) ago.
-
http://www.downloadsquad.com/2008/01/17/n-dakota-judge-rules-that-host-l-command-constitutes-hacking/
Just remember reading this a while ago. I guess its not technically 'illegal' since this was a...
-
As HT pointed out most servers today use the hostname from the HTTP request to determine the site served. If your IP address serves no site, you didn't set it up to do so. The only way you could...
-
November 8th, 2007, 01:24 AM
You need an initrd if the modules required to pivot root to your root device are not statically compiled in the kermel. eg. If your root drive is an Nvidia SATA the nvsata needs to be compiled in,...
-
June 30th, 2007, 02:12 AM
NTFS stores a backup copy of the boot sector at the end of the partition and a copy of the MFT (Master File Table) somewhere in the middle. If you can recover those you can restore the filesystem....
-
June 30th, 2007, 01:10 AM
More information such as wireless card, chipset and current driver you are using in Ubuntu would be useful...
-Maestr0
-
April 12th, 2007, 10:56 PM
The world has lost a wonderful author.
"I think I am trying to clear my head of all the junk in there--the *******s, the flags, the underpants. Yes--there is a picture in this book of underpants....
-
September 15th, 2006, 09:35 PM
Apache will not follow symlinks (softlinks) with out a 'FollowSymlink' option in the <Directory /mydir> directive where the symlink resides, in the config file for the site.
eg.
<Directory /www>...
-
August 28th, 2006, 03:36 PM
You can use TTL to determine if the packets are making it downstream of the firewall.
http://www.packetfactory.net/projects/firewalk/
-Maestr0
-
June 22nd, 2006, 06:14 AM
This behavior is quite normal, but its not DHCP causing your problem its WINS. Windows clients that recieve an IP address from a DHCP offer, can also recieve a WINS server address from the DHCP...
-
June 13th, 2006, 11:33 PM
They aren't sending you multicast per se, what you see is an IGMP enabled router. IGMP is what allows you to route multicast traffic. When a router is IGMP enabled it basically tracks all your...
-
If the e-mail address on your account was changed, how did you recieve the alert(e-mail?)? A common phishing scam is to send these "alerts" so you will log in via the phishing site to check the...
-
You will still need the output from ldd from rpm and up2date in the jail so rpm can run. If you can get rpm to run it should begin to take care of dependencies after that.
...
-
April 26th, 2006, 01:05 PM
You'll probably need to build an rpm database in the jail (put rpm in there as well) Trial and error can get you a long way. I'm an apt man myself, but I would try using rpm itself to install...
-
April 13th, 2006, 03:33 PM
"a whoreson jackanapes must take me up for swearing, as if I borrowed mine oaths of him and might not spend them at my pleasure.
When a gentleman is disposed to swear, it is not for any standers-by...
-
February 24th, 2006, 10:07 PM
http://www.nirsoft.net/utils/myuninst.html
-Maestr0
-
February 24th, 2006, 03:04 AM
Hardware RAID arrays are invisble to the OS, mdadm and raidtools in Linux are software RAID arrays. The Adaptec controller is used to create the drive configuration and presents the configured arrays...
-
February 15th, 2006, 04:03 PM
Looking over the event log shows the last message before the reboot is:
2/10/2006 10:04:33 AM EventLog Error 6004
A driver packet received from the I/O subsystem was invalid. The data is the...
-
February 2nd, 2006, 11:02 PM
from root:
sax.sh -l
-Maestr0
-
February 2nd, 2006, 10:07 PM
Short Answer:
A reverse DNS lookup should only resolve to one host.
Long Answer:
A reverse lookup is just another zone. In a forward lookup the record that relates an IP address to a...
-
February 2nd, 2006, 08:51 PM
Pre-computed hashes are meant for computing all keyspace (aka pre-computed bruteforce). Since you only want to use a set of passwords, what you a really doing is a dictionary attack. Just make a...
-
January 27th, 2006, 04:07 PM
If you use only NTLMv2 and dont store LM hashes in the database, the only way precomputed hashes (Rainbow tables) would help would be if an attacker already has admin on an AD server and can dump the...
-
January 26th, 2006, 09:07 PM
I dont think you want a msgina.dll replacement. GINA is the process called by winlogon which performs the authentication and returns success or failure to winlogon. Replacing GINA is useful if you...
-
January 21st, 2006, 09:47 AM
Oh yeah, forgot to mention Suse also has a weird /etc/sudoers file that uses the "rootpw" by default instead of "targetpw". If you change it to "targetpw" you might want to change %users ALL=(ALL)...
-
January 20th, 2006, 07:27 PM
Sudo, without alot of work (there is stuff you can do but I dont think sudo is really thwe answer you need), is not by any means a security feature in my opinion. Its good for accounting purposes so...
-
December 30th, 2005, 08:16 PM
1. Is DES 'secure enough'?
Well, that depends. Its probably secure against individuals, but anyone with access to a large computer lab or part of a distributed network would be able to crack it...
|
|