Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: pavs; Keyword(s):

Search: Search took 0.01 seconds.

  1. Replies
    5
    Views
    1,708

    View Post

    Well, now you know :)

    http://www.linuxhaxor.net/2007/12/27/what-happens-when-you-do-sudo-rm-rf/

    Seriously don't try this at home. Obviously in this video sudo was used because this was a debian...
  2. Replies
    3
    Views
    1,039

    8 Ways to Seriously Screwup Your Linux System

    http://www.linuxhaxor.net/2007/11/26/8-ways-seriously-screwup-your-linux-system/

    1) Delete all files
    2) Reformat
    3) Block device manipulation
    4) Forkbomb
    5) Tarbomb
    6) Decompression bomb
    7)...
  3. Replies
    3
    Views
    1,852

    Thanks guys for the foollowups

    Thanks guys for the foollowups
  4. Replies
    3
    Views
    1,852

    10 Basic Linux Security Tips to Implement

    The following is a list of rules and tips you might find useful in dealing with basic security concerns:

    1) Avoid doing your regular jobs when you are logged in as root. This reduces the risk of...
  5. Replies
    0
    Views
    1,181

    Huge List of Vulnerability Scanners

    Vulnerability scanner does automated search for security weaknesses in web applications, computers and theirs services and reports them in details about possible vulnerabilities and probable defense...
  6. Replies
    2
    Views
    675

    Five Easter Eggs for Linux

    I have compiled a list of five easter eggs that I came accross over time. Ofcourse none of them are original and most of them has been around for as long as you can remember but I though it would be...
  7. Replies
    2
    Views
    1,561

    Hacking related movies

    Top 20 Movies about Computer Hacking And Geeks

    http://www.linuxhaxor.net/2007/08/14/top-20-movies-about-computer-hacking-and-geeks/
  8. Replies
    6
    Views
    1,471

    Introducing PowerShell (MSH)

    PowerShell is built on top of the .NET Framework and replaces the old process of using text to pass data like the current CMD shell. PS is a scriptable language that provides an alternative to the...
  9. Replies
    0
    Views
    1,909

    View Post

    To download a torrent file just copy and paste the torrent metafile address (e.g. http://www.example.org/file.torrent) in the input box at http//www.bitlet.org/ and press the “Download torrent”...
  10. Hey whatever makes you happy. Anyways, for...

    Hey whatever makes you happy.

    Anyways, for anyone interested:
    http://www.windowhaxor.net/index.php/2007/07/27/how-to-customize-apache-server-banner-and-error-page/

    Using apache modsecurity...
  11. My article got mentioned in the first page of...

    My article got mentioned in the first page of hackszine.

    http://hackszine.com/

    Cheers,
    pavs
  12. Replies
    30
    Views
    2,766

    I still think it's false advertisement, But we...

    I still think it's false advertisement, But we can have different opinions.

    cheers,
    pavs
  13. Replies
    30
    Views
    2,766

    Ok bballad hear me out. With all due respect I...

    Ok bballad hear me out. With all due respect I don't know what you guys think unlimited means, but this is EXACTLY what unlimited means:
    http://dictionary.reference.com/browse/unlimited

    1. not...
  14. Replies
    30
    Views
    2,766

    Ok I will admit I am wrong... As long as you...

    Ok I will admit I am wrong...
    As long as you give me atleast one site that supports your point.

    cheers,
    pavs
  15. Replies
    30
    Views
    2,766

    Actually there is a limit to the bandwidth, it's...

    Actually there is a limit to the bandwidth, it's not just about hardware. let's say I will host a video streaming server, they will just not allow you to do it for 68 bucks a month.

    It's just a...
  16. Replies
    30
    Views
    2,766

    Just a note, there is nothing known as unlimited...

    Just a note, there is nothing known as unlimited bandwidth. It's not possible.
    http://www.findmyhosting.com/truthunlimited.htm

    cheers
    pavs
  17. sure you can keep posting. read the end of the...

    sure you can keep posting. read the end of the link where it says "Original javascript came from hackszine.com ."

    never denied it.

    pavs
  18. Replies
    30
    Views
    2,766

    I suggest you do some more research through...

    I suggest you do some more research through google and follow forums which are fully dedicated to website hosting and such. I would strongly suggest spend some quality time going through posts in...
  19. How to download Youtube videos without any Third party software.

    Most of the time when you are trying to download videos from youtube either you have to use a third party software or you have to post the link to auto-download site which will download and convert...
  20. Metguru--> yes it is kinda odd I guess. I am been...

    Metguru--> yes it is kinda odd I guess. I am been a member of antinonline for years and been following this forum for just as long. But only now I am posting something, because I am trying to promote...
  21. Security Cloak : How To Fool Passive Os Scanner

    Security Cloak is designed to protect against TCP/IP stack fingerprinting and computer identification/information leakage via timestamp and window options by modifying relevant registry keys. The...
  22. If you look carefully I did mention the source.

    If you look carefully I did mention the source.
  23. A comprehensive guide to Nmap with screenshots and example

    What is Nmap?

    Nmap (”Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against...
Results 1 to 23 of 23

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides