Search:

Type: Posts; User: super_phreak; Keyword(s):

Search: Search took 0.02 seconds.

  1. Replies
    4
    Views
    5,892

    Brute force database attack

    I was wondering if there is any software out there that will run brute force scans on MS SQL?
    I'm looking for something similar to L0pht Crack for M$ SQL.

    TIA!!!
  2. Replies
    28
    Views
    16,393

    Have you looked at sonicwall. I believe they...

    Have you looked at sonicwall. I believe they make some lower priced low end hardware firewalls. From what I'ev heard they are supposed to be pretty good and even have addons for content filtering...
  3. Replies
    23
    Views
    10,835

    First, I agree with the consensus about stealing...

    First, I agree with the consensus about stealing code. I have the creativity of a brick but somehow I was able to generate original code when I was in school. :p

    However, what do you do when...
  4. I may be wrong but I think a lot of people here,...

    I may be wrong but I think a lot of people here, myself included, are intrigued and interested in the "idea" of hacking. Notice I said the idea of hacking not the actual act of it. The true concept...
  5. Replies
    5
    Views
    8,666

    I've been looking for some good info for getting...

    I've been looking for some good info for getting into forensics. If you have some links and don't mind posting them that would be great.
  6. gypsy, You aren't the only one. I've had...

    gypsy,
    You aren't the only one. I've had problems getting to those areas as well.
  7. Replies
    19
    Views
    12,529

    The MS article for deciphering event logs is KB...

    The MS article for deciphering event logs is KB article Q308427. It should give you at least some idea of how to read the event logs. The following url has a pretty good article about reading...
  8. Replies
    15
    Views
    5,697

    While the motivation for writing a "good virus"...

    While the motivation for writing a "good virus" is at root an attempt to be help and keep systems safe the author is still has to use some sort of exploit in order to get into the system to apply the...
  9. Replies
    1
    Views
    5,576

    Did you see any info on getting rid of this if...

    Did you see any info on getting rid of this if you happen to find it on your machine?
  10. Replies
    19
    Views
    12,529

    I too agree with chaoswraith the first thing you...

    I too agree with chaoswraith the first thing you have to do is begin accumulating evidence of this individual’s attacks on your system. The more evidence you have the better. Assuming you get this...
Results 1 to 10 of 10