Search:

Type: Posts; User: Mark_Anderson; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.04 seconds.

  1. Thread: C++ help

    by Mark_Anderson
    Replies
    22
    Views
    6,548

    I would also recommend bloodshed.net's Dev-C++. I...

    I would also recommend bloodshed.net's Dev-C++. I think it's great. It was actually written in Delphi. Delphi is a language that isn't really too hard to learn and get good with for most.. and it has...
  2. Replies
    25
    Views
    30,233

    Keylogging and PWS's are a huge problem on Yahoo!...

    Keylogging and PWS's are a huge problem on Yahoo! It seems that everywhere you turn someone is trying to *trick* you into entering your acct info into a fake login page or they'll send you a file and...
  3. Replies
    28
    Views
    13,736

    Tiger: Login.yahoo.com has absolutely...

    Tiger:



    Login.yahoo.com has absolutely nothing to do with Yahoo! Messenger.

    Login.yahoo.com is only 1 of the servers that you can use to authenticate yourself onto the network within the...
  4. Last I checked using IPSec encryption for Wi-Fi...

    Last I checked using IPSec encryption for Wi-Fi networks only allowed the ip header to be encrypted.

    Addressing WEP, yeah, it's weak even @ 128-Bit. It uses the RC4 stream and isn't implemented...
  5. Replies
    28
    Views
    13,736

    If you want to block access just deny...

    If you want to block access just deny cs1.msg.dcn.yahoo.com - cs60.msg.dnc.yahoo.com. Just specify that net range to block. Also deny scs.msg.yahoo.com - scsc.msg.yahoo.com (socket servers) so...
  6. Replies
    28
    Views
    13,736

    Blocking login.yahoo.com won't help. Yahoo! has 3...

    Blocking login.yahoo.com won't help. Yahoo! has 3 protocols. YCHT, YMSG, and Chat 2 protocol (a weened YMSG protocol). Yahoo! Messenger operates on YMSG. Currently, the newest Messenger Ver 6 uses...
  7. Replies
    6
    Views
    7,737

    Yeah, the packets that were dropped were still...

    Yeah, the packets that were dropped were still analyzed (though not that thoroughly in only a network-layer firewall) and still required resources to be spent. You get a big enough flood of rapid...
  8. Replies
    19
    Views
    11,392

    Angelic, you might want to try ditching kerio or...

    Angelic, you might want to try ditching kerio or whatever you're running at the moment and reinstalling Sygate Pro -unless you had the free one? If you want reinstall it and go with my earlier...
  9. Replies
    6
    Views
    6,371

    I recently had SP2 Release Candidate 2 installed...

    I recently had SP2 Release Candidate 2 installed on XP Pro a few days ago. I thought it was a great service pack until I found out the SPI firewall had a glitch or two not to mention it breaking...
  10. Replies
    12
    Views
    8,588

    Yes, I said pretty much worthless but I meant...

    Yes, I said pretty much worthless but I meant generally speaking. Most novice shellcoders wouldn't bother with something like this. I could've taken privilege escalation into account but my point...
  11. Replies
    10
    Views
    8,557

    Aura, go here:...

    Aura, go here: http://www.cyberarmy.com/lists/wingate/

    Those are public wingates that you can use. There's also a link to a wingate scanner there called "winscan.exe" which you can use to find...
  12. Replies
    12
    Views
    8,588

    Your point basically is to isolate the host...

    Your point basically is to isolate the host offering that specific service(s) to the outside WAN by means of DMZ so that if it becomes compromised more or less the hosts inside the LAN won't be...
  13. Replies
    12
    Views
    8,588

    Yeah, it can be used for that. However, there's...

    Yeah, it can be used for that. However, there's no protection in that from the router as you already know. DMZ should only be used when absolutely necessary. If NAT is causing problems with an...
  14. Replies
    19
    Views
    17,978

    I actually like Mac OS X Panther quite a bit. The...

    I actually like Mac OS X Panther quite a bit. The Quartz Extreme is amazing too. I also like the fact that it uses FreeBSD commands and uses the Darwin kernel. It even allows you to lock your root...
  15. Replies
    19
    Views
    11,392

    Open up Sygate. Go to "Tools" then select...

    Open up Sygate. Go to "Tools" then select "Options". From there... go to "Security". Uncheck 'Enable stealth mode browsing' and uncheck 'Enable driver level protection' if you have those checked. See...
  16. Replies
    14
    Views
    12,851

    "Hey all, just curious if anyone can identify...

    "Hey all, just curious if anyone can identify this:

    3B%2f%2b2cuPYhjQtkWz3xgCtGqxtAgQJKM7U7NWk7u5nrnNKt
    %2fM4puXZY6yUti6uynL8CUNJwkkD%2foxrtGj5vqGihZstSV3...
  17. Replies
    2
    Views
    6,695

    Screw waiting.. I'm using the stuff right now in...

    Screw waiting.. I'm using the stuff right now in my 802.11G wireless nic and my 802.11G wireless Belkin DSL/Cable Router. All 256 bits of AES. Yeah the overhead isn't too great on your performance...
  18. Replies
    17
    Views
    11,499

    Well, if you wanna mess around and see what all...

    Well, if you wanna mess around and see what all you can do as suggested before you could check out nessus... and nmap ver. 3.50 would be good too.

    For wireless WEP cracking if you wanna see if...
  19. Replies
    18
    Views
    21,115

    Yep, I know. The original data sent from say an...

    Yep, I know. The original data sent from say an echo request is "acked" back to you in the form of an echo reply. When I said that it doesn't support direct data encapsulation I'm not talking about...
  20. Replies
    28
    Views
    34,572

    "If an echo-request is sent, the target is...

    "If an echo-request is sent, the target is supposed to send the echo back unaltered (sequence numbers + data)."

    I'd like to add to that for the people that might get these confused if you're brand...
  21. Replies
    39
    Views
    20,676

    Rob4224, neither products are very good. eEye...

    Rob4224, neither products are very good. eEye Digital found several vulns last month in their FireWall.. can't remember which ver. specifically though, maybe it applied to them all....
  22. Replies
    39
    Views
    20,676

    He established it of course.. if I would've...

    He established it of course.. if I would've initiated that with any SPI FireWall then it would've been allowed through based on how SPI works... including it's use around NAT. Therefore, it would've...
  23. Replies
    39
    Views
    20,676

    Point taken. However, in this situation, the...

    Point taken. However, in this situation, the configuration (being 'Scope...') of the product (being XP SP2 RC2 SPI FW) doesn't work to suit anyone's needs. As a matter of fact it gives XP SP2 users a...
  24. Replies
    39
    Views
    20,676

    ROFL! If thinking that helps you sleep at...

    ROFL! If thinking that helps you sleep at night....



    You've got a stiffy for gui environments and auto-installations. This didn't need to be reconfirmed. You must really like Windows.



    Oh...
  25. Replies
    39
    Views
    20,676

    Amazing, a whole 2 teams out of how many?! They...

    Amazing, a whole 2 teams out of how many?! They get some cookie-cutter pay compared to what the closed-source MS employees receive. Talk to Michael Abrash sometime (one of MS's lead game software...
Results 1 to 25 of 37
Page 1 of 2 1 2