Search:
Type: Posts; User: SonofGalen; Keyword(s):
Search:
Search took 0.05 seconds.
-
December 9th, 2004, 03:08 PM
Yes, thank you, very much.
-
December 9th, 2004, 01:24 AM
More proof that GUI's are evil.
You an yer picture boxes. Text based porno is just as good.
-
December 8th, 2004, 11:47 PM
Beware software bundles, especially when it involves something that is so closely linked with spy-ware, ad-ware, and virii.
-
December 8th, 2004, 11:45 PM
Though I haven't used it, I believe that ntop is a passive observer, and only collects information as it passes by on its own. NMap, however, will actively go out and do queries to find the...
-
December 8th, 2004, 11:27 PM
This is one of the rare tutorials that I have to download to my PDA or print out, I want to read it that much, but can't have it on my screen because I want to test it out and interact with it as...
-
December 8th, 2004, 11:24 PM
I'm in the midst of designing my new website, GeekRealms.com (Yes, shameless plug, in the guise of asking for help..which I need.) I'm developing it to be a good community site, and a great...
-
April 17th, 2004, 02:43 AM
More information that would prove helpful in answering this sort of question would be how you connect, what ISP you connect through, if there is a network/router/hub/gateway involved and what sort,...
-
April 15th, 2004, 04:30 AM
Hmm...there IS a way to do what you want, of this I am sure. I've seen computer systems before where you login through the network, and then it loads up XP with all the network drives already...
-
April 14th, 2004, 10:38 PM
Atleast in Linux I can fix the bugs myself if I'm alerted to their being there. ;-)
-
April 14th, 2004, 09:53 PM
If they never post, why not just have them use a Guest account? If nothing else, why not let the person have the option of deleting the name so that it could be re-cycled some-time later? (Although...
-
April 14th, 2004, 09:43 PM
What? That doesn't make any sense.
-
April 14th, 2004, 04:53 PM
The thing about Linux is that you NEVER need to re-boot unless you're updating/re-installing the kernel, altering BIOS, or hard-ware upgrades.
Many times, if something like that happens and a...
-
April 14th, 2004, 04:42 PM
Fifty-two ports open, but no Telnet...(Try SSH?)
Fifty-two ports sounds a little bit iffy, and suspicious in a war-game such as this. Sygate has never, for me, allowed a single port to appear to...
-
April 14th, 2004, 04:37 PM
Get yourself a secure password, and stop asking "how to scam" or "how to hack."
-
April 14th, 2004, 06:01 AM
You know who the person is, and you apparently have logs about what he did. That's all the proof you need. *Suspects, though, that this is just a teenager who was fooling around, or that someone...
-
April 14th, 2004, 02:12 AM
Alright, as soon as I'm done copying these files over (used Samba to back-up) I'll try that and report back. Thanks. ;-)
-
April 14th, 2004, 01:48 AM
I've been trying for a while to enable Samba on my Linux box, running SuSE 9.0. I've had the network set up without a problem, and I could see all the other boxes without a problem from ANY of my...
-
April 13th, 2004, 11:45 PM
Two words: Universal + Remote. You could also head over to Tweeters and see if they have speaker dampners.
And, of course, you could always talk to your brother. But that's just going out on a...
-
April 12th, 2004, 12:07 AM
I would imagine they would sell you a temporary user name or password, and without working one, you're denied access. The user/pass expires after a set amount of time, which is however long you...
-
April 11th, 2004, 11:31 PM
I dunno man....................are crackers really that bad?
-
April 11th, 2004, 11:19 PM
I never asked any question... I was answering someone elses by saying that GCC should work for the actual compiler and that Anjuta is a good IDE. I understand that they are different...
-
April 11th, 2004, 07:20 PM
Not sure if you mean hardware wise, or system logs, or what...
As far as hardware goes, LM Sensors is pretty good.
http://secure.netroedge.com/~lm78/
-
April 11th, 2004, 05:57 PM
A trojan tries to hide its true function within something else. Anything can be wrapped up in a trojan, this included. This will just execute external code that is sent to it in a .txt format...
-
April 11th, 2004, 05:52 PM
I know exactly what you mean. It wouldn't necessary need pre-programmed key words, though. It could deal with raw code and compile it. Keywords could be programmed in, but it would be just as easy...
-
April 11th, 2004, 05:41 PM
Something is seriously wrong here. While I was away on my "sabatical," |The|Specialist was apparently banned. There is either a funny story, or something behind this....someone care to clue me in?
|
|