Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: KeyserSoze; Keyword(s):

Page 1 of 6 1 2 3 4

Search: Search took 0.01 seconds.

  1. Replies
    11
    Views
    2,028

    gore: If it ain't broke, then why are you trying...

    gore: If it ain't broke, then why are you trying to "fix" the kernel? ;)

    Seriously though, you could probably just grab a kernel from 10.2 or -current and be fine, since Pat's are so vanilla. ...
  2. Replies
    11
    Views
    2,028

    Eh, you may be right. I just glanced at the...

    Eh, you may be right. I just glanced at the changelog for stable, and there have been no kernel upgrades since 10.2 came out. It looks like there were one or two for 10.0 and 10.1, though; but...
  3. Replies
    11
    Views
    2,028

    chsh: Yeah, but it's kind of nice to let someone...

    chsh: Yeah, but it's kind of nice to let someone else do it for you sometimes, and Pat's kernels are vanilla anyway...but I guess there's still no _good_ excuse ;)

    gore: Updates have been sparse...
  4. Uhhh....whatever. Since when were we discussing...

    Uhhh....whatever. Since when were we discussing the security of the net? I thought we were discussing the security of computing devices, specifically end-users and servers. The overall security of...
  5. While it is true that most mainstream OSs' focus...

    While it is true that most mainstream OSs' focus on security has heightened in the past few years, some had an eye on it the whole time. Some were always meant to be multi-user from the git-go. ...
  6. ...and I'm getting really tired of seeing people...

    ...and I'm getting really tired of seeing people try to look good by saying "look at me, I'm anti-anti-establishment!". Several things spring to mind concerning your argument:

    1. A bigger market...
  7. I can't offer much in the way of content, but...

    I can't offer much in the way of content, but what I could advise on are teaching methods. Being a teacher myself, I can understand how one gets lost in content; you want to teach everything, and...
  8. Replies
    9
    Views
    1,190

    You might want to check and see if a customizable...

    You might want to check and see if a customizable knoppix could do what you want. Something along the lines of this or this .

    NOTE: I have not tried the steps outlined in either of these...
  9. Replies
    4
    Views
    1,075

    Re: WEP Canundrum

    When they say "generate traffic", then you have to either already be on the lan or start a lot of communication with a server behind it. It is true that a large number of encrypted packets are...
  10. Replies
    12
    Views
    1,629

    Well, not completely...you need to remember that...

    Well, not completely...you need to remember that when you send a request for a web page, it is handled by the server--and it is the server that will need to be able to read/execute the document so it...
  11. Replies
    12
    Views
    1,629

    Here's the first listing from a google search:...

    Here's the first listing from a google search:
    http://www.hostingmanual.net/other/permissions.shtml

    Basically, it's like this:
    Each file and directory has permissions for three entities: the...
  12. Replies
    23
    Views
    2,489

    Re: Using "Hot Spots" for Malicious Activity

    Yes.

    And the nicest part? It's as easy as

    ifconfig wlan0 hw ether macaddress
    if you're running linux with the wireless tools.

    Sleep well...
  13. Replies
    25
    Views
    2,026

    Either netstat -r or /sbin/route

    Either

    netstat -r

    or


    /sbin/route
  14. Replies
    25
    Views
    2,026

    No. Just issue it as root. It will add the...

    No. Just issue it as root. It will add the route to your routing table. If it solves the problem, then you can change a config file to do it on boot (where depends on your distro) or at the very...
  15. Replies
    25
    Views
    2,026

    That would be a good place to start. route...

    That would be a good place to start.


    route add default gw 192.168.1.1
  16. Replies
    25
    Views
    2,026

    Can you reach the outside via IP addresses (no...

    Can you reach the outside via IP addresses (no names)? Also, what does your /etc/resolv.conf say?
  17. Replies
    14
    Views
    1,544

    MAC address filtering is a good idea, but it's...

    MAC address filtering is a good idea, but it's easier to spoof a mac than crack a wep key. All anyone has to do is fire up kismet, sniff a client, then issue one ifconfig command to change their mac...
  18. Replies
    14
    Views
    1,544

    The point of the article is that 5 or 6 million...

    The point of the article is that 5 or 6 million packets is no longer necessary. That is the number required by airsnort to generate the few thousand packets with weak IVs. With aircrack, only a few...
  19. Replies
    5
    Views
    739

    Which os are you using? Most OS's will let you...

    Which os are you using? Most OS's will let you format during installation, but the process will be slightly different depending on os. If you want to save existing data on the hd (you should also...
  20. Thread: unix r00t

    by KeyserSoze
    Replies
    13
    Views
    1,890

    Just to clarify, I believe "." refers to the...

    Just to clarify, I believe "." refers to the current directory, just like ".." refers to the directory above the current one. If this directory (.--the current one) were placed at the end of the...
  21. Replies
    19
    Views
    1,897

    Re: Securing Slackware

    Are you referring to shorewall? Just curious, cause I didn't think it needed any desktop environment, unless you are using webmin to configure it. Only thing I believe I needed to do to get it...
  22. Replies
    7
    Views
    1,222

    I would guess that maybe your problem lies with...

    I would guess that maybe your problem lies with apm or acpi (whichever you're using) working with the bios. Try disabling one at boot time; i.e.

    append="apm=on"
    add the above to /etc/lilo.conf....
  23. Replies
    10
    Views
    1,206

    Outside of compiling a new kernel, the only other...

    Outside of compiling a new kernel, the only other thing that I can think of is to add that specific module to /etc/hotplug/blacklist.
    hth
  24. Replies
    10
    Views
    1,206

    If you have the proper intel-based chipset, and...

    If you have the proper intel-based chipset, and the userspace tools (extra software you have to go and d/l) then you can do some extra stuff; rng stands for random number generator. You won't lose...
  25. Replies
    10
    Views
    1,206

    All of the Slackware init files are located in...

    All of the Slackware init files are located in /etc/rc.d. Go there and edit rc.modules; comment out whatever module is giving the error. Chances are you have updated your kernel from the one you...
Results 1 to 25 of 139
Page 1 of 6 1 2 3 4

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides