Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: cire; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.01 seconds.

  1. Replies
    18
    Views
    3,217

    you should also check to see if there are any...

    you should also check to see if there are any hardware key loggers and remove them if there is one. they are little electronic devices that go in between the keyboard cord and the computer's ps/2...
  2. Replies
    12
    Views
    1,567

    there is a similar program called tripwire. it...

    there is a similar program called tripwire. it checks the integrity of files. more information about it can be found at http://www.tripwire.org/

    hope this helped.
  3. Replies
    10
    Views
    2,079

    it is also easier (in my opinion) to use chmod...

    it is also easier (in my opinion) to use chmod without the numbers but with u(ser), g(roup), o(ther), a(ll), +, -, r(ead), w(rite), and (e)x(ecute). For example, to add execution permissions to...
  4. the website has a history of its name at...

    the website has a history of its name at http://www.cotse.com/story.htm
  5. Replies
    10
    Views
    2,518

    i use it and like it alot. it is extremely...

    i use it and like it alot. it is extremely widely used and have not heard of any vulnerabilities in it.
  6. Thread: coding/scripts

    by cire
    Replies
    12
    Views
    1,174

    if you know the file extension than you can...

    if you know the file extension than you can usually determine what language it is written in. ie. *.c is c, *.cpp is c++, *.java is java, *.pl is perl, *.sh is a bash shell script
  7. Thread: C++ & Html

    by cire
    Replies
    14
    Views
    1,328

    just use sockets (winsock in windows, all those...

    just use sockets (winsock in windows, all those libraries in *nix) to connect to the server and read in the webpage. this is an extremely easy program to write if you are familiar with socket...
  8. Replies
    1
    Views
    816

    That article makes it sound like the malicious...

    That article makes it sound like the malicious web page downloads a program to your computer. This is not true, atleast for the AIM vulnerability that many people I know have been hit with. What...
  9. Thread: Personal project

    by cire
    Replies
    6
    Views
    1,162

    you will have to learn socket programming to do...

    you will have to learn socket programming to do this. if you are writing this program for windows then you should look into the winsock library, if this is for *nix then i would really recommend you...
  10. Replies
    7
    Views
    761

    you could also just replace router2 with a switch...

    you could also just replace router2 with a switch or hub
  11. Replies
    6
    Views
    503

    Why do many companies...

    ...who run they're own webservers use default ports for daemons like ftp, ssh, etc? it would make more sense to me for them to use different ports so if some script kiddie is scanning a subnet for a...
  12. Replies
    16
    Views
    1,893

    don't forget about ettercap for sniffing on...

    don't forget about ettercap for sniffing on switched networks, they have a windows version.
  13. Thread: www.di.fm

    by cire
    Replies
    4
    Views
    985

    it worked for me too but for future reference...

    it worked for me too but for future reference pinging a computer and getting a reply does not mean that it is running a webserver, it just means that it is online and responding to pings. to ensure...
  14. Thread: New to linux

    by cire
    Replies
    5
    Views
    645

    im not too familiar with cable but maybe you...

    im not too familiar with cable but maybe you forgot to configure your network for your ISPs DNS servers.
  15. Replies
    11
    Views
    943

    i don't think this is the issue with you because...

    i don't think this is the issue with you because the 2 sizes are pretty close but there is a prefix conflict with hard drive, memory, operating system, etc. companies. with computers, prefixes like...
  16. Thread: linux help

    by cire
    Replies
    3
    Views
    718

    yes, just watch how many packages you install so...

    yes, just watch how many packages you install so you can have some free space. for linux isos and burning instructions i highly recommend going to www.linuxiso.org
  17. Giving a user admin rights for a program on Win2k

    is it possible for the admin account on Win2k to grant a regular (power) user admin access only a specific program? if so, how can this be done? thanks.
  18. Thread: Hacking Myths

    by cire
    Replies
    30
    Views
    2,461

    Nice post, heres some more. 11. In order to...

    Nice post, heres some more.

    11. In order to hack/be a hacker, you need to use *nix- while most unix/linux distrobutions come with many more programs and commands for internet security (nmap,...
  19. Thread: Home LAN Question

    by cire
    Replies
    6
    Views
    671

    you have the situation right networker. i will...

    you have the situation right networker. i will look into what you said. thanks.
  20. Thread: Home LAN Question

    by cire
    Replies
    6
    Views
    671

    Home LAN Question

    in my house I have a small network of three windows computers to share files and internet. two of the computers, computers a and b, are on the same floor and are connected via a switch. the third...
  21. Replies
    2
    Views
    663

    When did the internet become big?

    I hope this is the right forum for this question, sorry if it isn't. I need to write a report for school and need to know when the internet became widely used by the public. I know this is sort of...
  22. Thread: OOP in C++

    by cire
    Replies
    4
    Views
    1,237

    OOP in C++

    This tutorial gives the basics of Object Oriented Programming (OOP) in
    C++. In programming, an object is used to group related data. In C++
    this is done through classes. This tutorial assumes...
  23. Replies
    12
    Views
    1,030

    I thought that packets that were not meant for...

    I thought that packets that were not meant for your machine could not be sniffed on a switched network. It was my impression that that is the advnatage of a switch over a hub. Please correct me.
  24. Replies
    35
    Views
    2,930

    i found out the hard way yesterday that you can...

    i found out the hard way yesterday that you can get in serious trouble for even using a program that you have access to. on my school network you are not supposed to access DOS but using a batch...
  25. Replies
    12
    Views
    1,883

    by modular math i believe hes talking about the %...

    by modular math i believe hes talking about the % operator. it returns the remainder given two numbers, ie 10%4 is 2 and 100%10 is 0. as for how it can be used for a fast encryption system, i dont...
Results 1 to 25 of 31
Page 1 of 2 1 2