Search:
Type: Posts; User: swarisd; Keyword(s):
Search:
Search took 0.05 seconds.
-
June 21st, 2004, 09:17 PM
Everyone is giving good advice here. Using Nmap is legal, however, using Nmap for malicious purposes can get you into trouble if isomeone uses it to break into someone else's system. I use Nmap to...
-
March 13th, 2004, 04:23 AM
Give Firefox a shot. It is created by Mozilla and seems to be a pretty solid browser. Least Buggy?? Less vulnerable?? These are relevant to use and access to underlying code, therefore hard to...
-
March 13th, 2004, 04:13 AM
People tend to get hung up on locking down ports, well these ports are open because of services running. If you shutoff the running services, then the ports will be closed. Learn what services you...
-
March 13th, 2004, 04:07 AM
First of all, your manager having you and others to give your password to an assistant is a no no. This is a bad way to ensure email from customers and clients can be accessed. The preferred...
-
March 2nd, 2004, 10:37 PM
The perp better be snapping that camera as fast as he can because to catch my credit card numbers, he'd have to have a pretty fast shutter. What I'm saying is, in reality, my credit card is not...
-
February 16th, 2004, 01:20 AM
Thursby's Tstalk looks interesting.
-
February 8th, 2004, 10:30 PM
I don't see the need for a go between for devices that use telnet/ssh for administration. I do see a use for a radius/tacacs type solutioin to authenticate your administrators. As we know, there's...
-
February 8th, 2004, 02:19 AM
Try WRQ They have some terminal emulation software that may help you.
You will get more bang for the buck if you went with web/http enabled applicatioins and used something like what Neoteris...
-
February 1st, 2004, 10:46 PM
This article says Riverhead could have been able to help SCO keep it's website up. Anyone had any experience with Riverhead?
-
February 1st, 2004, 05:49 PM
WOW, I would have thought different. Especially if their ecommerce is tied into their content website. This may not be the case though sense I am speculating. This response from SCO is a surprise...
-
February 1st, 2004, 05:23 PM
Symantec's website says this:
I wonder what laws of probability they used? LOL.
All jokes aside, this is very very serious, despite how the Gnu/Linux community or anyone else for that...
-
January 28th, 2004, 02:57 AM
To me, installing pcanywhere on every machine seems like an administrator's nightmare, somewhat. It all depends on how many pc's you have to install pcanywhere on. One solution I am looking at is...
-
January 23rd, 2004, 01:23 AM
As been said before your best bet is to ask the admin, if you know who he/she is, what firewall they use. More than likely they will tell you, especially if they feel comfortable it is patched and...
-
January 18th, 2004, 03:42 AM
I think everyone here has some very valuable points. I have to stand a little more on the side of Maestr0. My opinion is scans are a way of life on the net and I really feel you have to look at the...
-
January 16th, 2004, 06:31 AM
Hacking with malicious intent is bad. Who better to hack than yourself? Keeps your out of court, out of jail. I think you should go for it. You ask is there any way to practice. May sound dumb,...
-
January 16th, 2004, 06:08 AM
Alot of interesting things have been said in this thread. I am in no way affiliated with the company in question. It seems everyone here has deemed a port scan as something terribly bad. Well, I...
-
January 16th, 2004, 05:26 AM
There seem to be some issues with the IDS module, it seems to lack permit and deny configuration options. Also, some logging issues. Check out dslreports. They have a kerio firewall forum and some...
-
January 13th, 2004, 08:06 PM
Sure, attacking your network is a good way to assess your vulnerabilities. I think the question to ask yourself is, do you know enough about the different types of vulnerabilities and the tools...
-
January 13th, 2004, 05:28 AM
The first step in finding vulnerabilities in a network would be to interview every system owner in your organization and find out as much about applications and processes as you can. This will help...
-
January 10th, 2004, 04:03 PM
I may be wrong, but in reading the original post, I made the assumption that the question asked leaned more towards Is there a need to have a firewall installed. The proof of concept is under the...
-
January 9th, 2004, 09:50 PM
Wow!! Nice discussion. Let me through my 2 cents worth in.
This was the original question. My answer is your average user doesn't know what the heck a port or service is. Thats a bad...
-
January 9th, 2004, 07:57 PM
Your global command is wrong. You have:
Well, from what you describe x.x.x.118 is another device. It should be the outside interface or whatever IP you want to use for PAT.
For kicks,...
-
December 30th, 2003, 05:29 PM
The programming language doesn't matter, and the virus is only as good as the coding. Is one PL better for writing virii? Maybe, maybe not. It's a personal choice I would say.
No, they aren't...
-
December 12th, 2003, 06:18 PM
Ask your network admin or your boss. They'll let you know exactly what you can and can't do.
-
December 12th, 2003, 05:47 PM
Use the old linux bootdisk method to change the administrator password, and you're set.
Here's a site that describes the process.
Good Luck!
Well, I guess MsMittens and TheHorse and I...
|
|