Search:

Type: Posts; User: xen248; Keyword(s):

Search: Search took 0.01 seconds.

  1. Replies
    11
    Views
    15,428

    Why not just use windows and run your linux tools...

    Why not just use windows and run your linux tools under cygwin...
  2. Replies
    8
    Views
    9,107

    As demonstrated by the team that used liquid...

    As demonstrated by the team that used liquid nitrogen to freeze the ram and than scan and recover the encryption keys it is possible.
  3. Replies
    6
    Views
    8,433

    its trying to get your login passwords to root...

    its trying to get your login passwords to root your system.
  4. Think of your computer as a castle. And your...

    Think of your computer as a castle. And your defense has to be perfect all around in order to win. But in order for the criminals to win all they need is one weakness. Now tell me who has the better...
  5. Replies
    22
    Views
    21,478

    Thats because i dont believe they exist nihil. I...

    Thats because i dont believe they exist nihil. I have not run across any program that can lock them down. Or scan them for malware.
  6. Replies
    50
    Views
    29,189

    So in other words Vista takes control off most of...

    So in other words Vista takes control off most of the system from the user in an attempt to secuer itself?
  7. Replies
    22
    Views
    21,478

    Try using Icesword, gmer, Helios.

    Try using Icesword, gmer, Helios.
  8. Thread: IPv8

    by xen248
    Replies
    11
    Views
    8,454

    Actually Most still use IPv4. They have not made...

    Actually Most still use IPv4. They have not made the switch to IPv6 because of the costs involved with running two servers one that supports each. IPv6 has been out for about 10 years and yet it...
Results 1 to 8 of 8