Search:
Type: Posts; User: InfiniteL00p; Keyword(s):
Search:
Search took 0.02 seconds.
-
April 17th, 2008, 04:55 PM
Not at all... you should be fine without having to do anything with the IP stack of your operating system. Check into the docs on the classes you plan to import into your java code - all of the...
-
February 26th, 2007, 04:40 AM
The Trendmicro site you pointed me toward got me on the right track. After a little looking around I found it out to be this:
<snip>
Discovered: February 18, 2007
Updated: February 19, 2007...
-
February 26th, 2007, 03:37 AM
TCPview isn't really telling me anything - if there's a rootkit involved it wouldn't surprise me if it's hiding itself from WinXP. That IP address may be registered to Level3, but I'm guessing...
-
February 25th, 2007, 11:27 PM
Hey all, long time no see.
I've discovered a trojan that may include a keylogger on one of my computers today. Quite by accident while repairing some damage done to my DSL modem (my fault!), I...
-
August 21st, 2004, 06:07 PM
But spam is informative and interesting. I refinanced my home to buy that herbal Viagra.
But seriously, I read a letter to the editor in the most recent issue of Technology Review - the author...
-
August 21st, 2004, 05:30 PM
Good article, offers more insight than the rank-and-file press release. I took two of Foundstone's courses (Hacking Exposed, and Incident Response) over the past few months. Good stuff, I wonder if...
-
August 21st, 2004, 05:27 PM
It also really depends on what type of router you're talking about. The common home systems (gateways, etc.) are usually administered via a web-like interface on port 80 or 8080, and usually only...
-
August 21st, 2004, 05:22 PM
Seems like consolidation happens in spurts. McAfee announced a buy-out of Foundstone on the 16th. Something like $84 in cash. Not bad for a five-year-old company.
Official press release here:...
-
July 14th, 2004, 02:35 PM
I promise to have more papers posted there in the next few months.. I've got a few now, but I'm trying to refrain from the overly-academic papers that look like "homework". No one's interested in...
-
July 13th, 2004, 05:16 PM
Ish... that's true. That's is also one reason why I haven't posted it there first, although the thesis website is basically a full disclosure of what the project entails and will deliver. Perhaps...
-
July 13th, 2004, 05:01 PM
I've finally got around to posting some of my graduate work on my website.. I've got a small "reading room" with papers on various computer security topics. WiFi, BO2K, Information Warfare...
-
July 13th, 2004, 04:56 PM
Transnational cyber-extortion and its impact on U.S. business is a poorly understood and rarely discussed topic. A Carnegie Mellon University graduate student (that's me), in conjunction with...
-
April 6th, 2004, 03:25 AM
I just saw that article over on Inquirer, too, and started looking around for info. Nothing, really, although I did punch in "Kintama" into my Mozilla address bar and accidently hit enter, only to...
-
April 1st, 2004, 02:24 PM
Here's a finny aside.. a friend of mine called mi2g claiming he was a lawyer representing a class action suit against an ISP that failed to take steps to secure its services. (he did this after...
-
March 24th, 2004, 04:22 PM
Looks like a 2hr advertisment to get people/companies to sign up for highly-priced weekend workshops. Is it cool to post ads here on the open message boards? I think not.
There's 49 topics...
-
March 22nd, 2004, 11:05 PM
Can you elaborate a bit on your question? This is in the crypto/steganography section.. to what are you referring? Encrypting control characters?
l00p
-
March 20th, 2004, 03:03 PM
Tedob1 - isn't PHATBOT a P2P based virus?
Even so, it would be good form to check if anyone in your company (mainly that person with the untrusted laptop) is using P2P services across your...
-
March 20th, 2004, 02:58 PM
This is, as noted above, the age old question of security vs. functionality. The article misses this point, with just one allusion to it on the last page. Overall, though, this is what has to...
-
March 20th, 2004, 04:57 AM
lessthanzero - good suggestion. I've read Security in Computing. Good reference, too.
l00p
-
March 20th, 2004, 04:55 AM
Haven't seen this specifically, but it sure looks like it's a RAT or listening Trojan. It takes commands from those IRC channels (much like the other fools). The destination port of 53 is usually...
-
March 19th, 2004, 04:43 PM
Privacy on the internet is also a good topic... it leads to identity theft, computer compromise, and all the wonderful things that come along with it.
Ohh.. better yet, how about a paper on the...
-
March 19th, 2004, 04:37 PM
Learn about networking first. Too many folks jump into computer security (or at least try) before they know about OSI layers, TCP and UDP structures, and how all the hardware fits together in the...
-
March 8th, 2004, 06:10 PM
True indeed - I've read that this group may have questionable statistics, so here's what I've done:
1) Emailed them.
I got a quick response, with a pointer to their FAQ. It talks about how they...
-
March 8th, 2004, 03:31 PM
Grabbed a look at this article over at the Inquirer the other day.Mi2G claiming Linux-based servers are the most hacked, in a review conducted in January of over 17,000 "successful" hacks.
We've...
-
March 3rd, 2004, 03:49 PM
I didn't know about this MBSA.. just picked it up. Good show, MrCoffee!
l00p
|
|