Search:

Type: Posts; User: smirc; Keyword(s):

Page 1 of 20 1 2 3 4

Search: Search took 0.02 seconds.

  1. Replies
    7
    Views
    5,084

    No this won't work. The MAC address of all the...

    No this won't work. The MAC address of all the PING replies will be the MAC of the local gateway for his subnet. The only way to find out MAC addresses on another network is if your have access to...
  2. File Listing

    source: http://francisco.terawap.co.uk/file_tree_list.txt
  3. Replies
    9
    Views
    6,912

    Just to clarify, the general rule is: Swtich...

    Just to clarify, the general rule is:

    Swtich to Switch (or Router to Router) = use a cross over
    NIC to NIC = use a cross over
    NIC to Switch (or NIC to Router) = use a straight through

    It's...
  4. Replies
    4
    Views
    4,754

    It's cause you're only reading in the first part...

    It's cause you're only reading in the first part of the file. You probably want something more like:



    use MIME::Base64 qw(encode_base64);
    open(FILE, "/var/log/wtmp") or die "$!";

    while...
  5. Replies
    6
    Views
    5,501

    Just knowing the address of a router on your...

    Just knowing the address of a router on your network/subnet, does not mean that someone can get your IP address. But they can narrow it down substantially. eg if the router's address is a class B...
  6. Replies
    4
    Views
    4,772

    Hmmm...the article was pretty vague and contains...

    Hmmm...the article was pretty vague and contains little information to increase security at the application level. However the link at the bottom contains a lot of good information on securing BIND...
  7. Thread: Pornography

    by smirc
    Replies
    27
    Views
    7,771

    I could say the same thing about a lot of...

    I could say the same thing about a lot of industries.



    LOL



    Red one's go faster. ;)
  8. Replies
    3
    Views
    4,372

    It's true that for some mail servers that are...

    It's true that for some mail servers that are poorly configured, you can use SMTP to get lists of user names. The commands you're probably interested in are VRFY and EXPN. Take a look at RFC 821...
  9. Thread: DoSing fun!

    by smirc
    Replies
    16
    Views
    11,439

    Like mike, if I could be like mike. :P Dick...

    Like mike, if I could be like mike. :P

    Dick head.
  10. Thread: C++, Help

    by smirc
    Replies
    21
    Views
    15,944

    Good point but it's also worth noting that rand...

    Good point but it's also worth noting that rand and srand are both inherently *unsafe* for generating random numbers for things such as crypto keys ie. anything that you don't want someone to be able...
  11. Replies
    12
    Views
    9,813

    Exactly right. It's not google's responsibility...

    Exactly right. It's not google's responsibility to babysit slack web site administrators. If you're a web admin and you've never heard of robots.txt, now you have so there's no excuse. ;)
  12. Replies
    26
    Views
    14,289

    swiftstyles: You're a dick. You probably cut and...

    swiftstyles: You're a dick. You probably cut and pasted that when you could have written a l33t Perl script. Grow up. And I can tell from just seeing the top of your head that you are ugly. :cool:
  13. Replies
    8
    Views
    5,928

    Korpdeath: Sounds like a pretty obscure sort of...

    Korpdeath: Sounds like a pretty obscure sort of problem. You problably won't have much luck with your question here, since the level of BSD enthusiasts is quite low at AO by all accounts. You might...
  14. Replies
    9
    Views
    6,472

    The weird bit is the fact that your machine is...

    The weird bit is the fact that your machine is conected to this other box (which looks like your ISP machine for handling modem connections) on port 12. Port 12 is a low port AND it's not assigned. ...
  15. Replies
    11
    Views
    4,641

    Damn...it's in VB. I can't open it. :-)

    Damn...it's in VB. I can't open it. :-)
  16. Replies
    16
    Views
    10,223

    Uh-oh...busted! :)

    Uh-oh...busted! :)
  17. Replies
    7
    Views
    6,829

    It takes processing power to drop packets too. ...

    It takes processing power to drop packets too. This is why DOS/DDOS attacks are so hard to defend against. If it was as simple as "limiting the amount of packets" DOS attacks wouldn'
    t be a...
  18. Thread: WarLinux,WarBSD

    by smirc
    Replies
    7
    Views
    5,784

    This looks sweet. I'll have to try it out. Once...

    This looks sweet. I'll have to try it out. Once I graduate I'll have more time to get back into some more hackering/programming. :)
  19. Replies
    7
    Views
    6,388

    It's worth noting that the same thing applies to...

    It's worth noting that the same thing applies to HTTP POSTs for some applications. For example squid is configured by default to reject HTTP POSTs greater then 1MB in size which can be an annoying...
  20. Replies
    8
    Views
    7,300

    A port scanner is essentially a program that...

    A port scanner is essentially a program that probes a number of TCP/UDP ports on a machine to see if it's possible to connect. A connection idicates a service/deamon is running on that port.


    ...
  21. Thread: Need Help

    by smirc
    Replies
    13
    Views
    14,994

    This is typical of girls who are too gutless to...

    This is typical of girls who are too gutless to tackle the real issue. There's no such thing as letting someone down nicely. Rejection is bad enough. Prolonged rejection is downright cruel. She's...
  22. Thread: Need Help

    by smirc
    Replies
    13
    Views
    14,994

    If you think she's cheating on you, you've got...

    If you think she's cheating on you, you've got bigger problems than learning how to install a keylogger. Have you tried talking to her about it?
  23. Thread: Red Hat 8 Shells

    by smirc
    Replies
    12
    Views
    8,774

    Can't connect eh? Try the following: 1.) Do...

    Can't connect eh? Try the following:

    1.) Do you have sshd/telnetd running? Do a netstat -atunp | grep LISTEN and see if ports 22 and/or 23 are listening.

    2.) Is iptables/ipchains in the way? ...
  24. Thread: FreeBSD 4.8

    by smirc
    Replies
    19
    Views
    9,894

    Performance. If you want performance and...

    Performance. If you want performance and security...there's always OpenBSD. ;)
  25. Replies
    10
    Views
    10,287

    I had a look at your code and I noticed a few...

    I had a look at your code and I noticed a few things to start with:

    1.) You're falling into one of the common newbie traps of code:


    if ( choice = '1' ) { // do blah!!! }

    Wrong. This is...
Results 1 to 25 of 500
Page 1 of 20 1 2 3 4