Type: Posts; User: karavay; Keyword(s):
Search took 0.02 seconds.
November 1st, 2006, 04:00 AM
gonna to try those tmorrow
November 1st, 2006, 03:15 AM
ive tried a couple Packet Tracer from cisco
and net notepad neither of these is what i am after :(
October 31st, 2006, 10:39 PM
Hey guys just spent 2hrs looking for a suitable software to draw nice network diagrams with a function of animating the process and possibility of adding additional devices (e.g pictures) of e.g...
August 29th, 2006, 07:07 PM
yes it is e.g. creating an optional on-line keybord on the authenication page!
user will type the password by clicking his mouse on the keybord! - that minimizes the chances of your input being...
August 13th, 2006, 01:09 AM
nop .... :)
August 13th, 2006, 12:58 AM
Hey guys any ideas on how to create BHOs in windows environment ?!
I know alot of malicious softwae use this technology to load with the browser but the method is kinda undiscovered by me!
August 6th, 2006, 02:32 AM
I think it uses off algorithm - every 7th byte is active in cfinal executable compilation...very interesting and smart - almost endless mutation capabilities :)
August 4th, 2006, 01:47 AM
worm sould contain the addresses of SMTP server it uses to destribute itself.......or a source from where it gets them..information like that!
yes ive analysed the code and there is some very...
Hey guyz alittle problem I encountered today - about 6 workstations on my net were infected by the Scano.l worm -
some details are clear but would be really great to know more!
heres the body...
March 13th, 2006, 07:20 PM
how about local security where does it store passwords / conversation history / crypted or not?
March 13th, 2006, 06:33 PM
it uses RC5 to chiper its text chat communication but the key can be recoverd from outgoing UDP datagam... whats the point !!:) script kiddie protection :)
March 13th, 2006, 05:44 PM
http://www.simson.net/ref/2005/OSI_Skype6.pdf - Security Overview
March 13th, 2006, 05:01 PM
Hey guys as the popularity of this messenger-voip communication software, grows I was thinking to investigate the security side of this software:
September 27th, 2004, 01:52 PM
try telnet www.megasecurity.org 23
decent & FReE shell account you can use for practising
April 26th, 2004, 11:52 AM
To TheSpecialist How did you un-decoded it ? i tried using perl ::B64 mod it didnt work ... i know this is a lame q but I cant get it done :)
April 26th, 2004, 11:12 AM
i2c ....do u want me to post a half dozen links which lead to the exploit code (3 versions of it + 1 unpublished)!
**** guys the question was how to uudecode ... it not laming me!!!!
April 26th, 2004, 11:07 AM
guys...what you have made form my post........is it an exploit the answer is yes
is an example on which I wanna learn how to convert base64 to readable (compile-able )c file the answer is yes......
April 24th, 2004, 06:26 PM
guys ......... how can i convert this in to "readable" file
in *nix environment
begin-base64 644 patch.diff
March 9th, 2004, 03:28 PM
thanks tyfon !
Camon guys what is this all about.....I mean what is this site about........ ask yourself this burning question.......I didnt ask you how TO hack microsoft did I ... the question was...
March 8th, 2004, 06:26 PM
who's talking about lamers here.....I sad that ASM is not my powerful side....
here's the diffcult way of doing it....
:ml /c /coff backdor.asm
March 8th, 2004, 12:14 PM
Guys Iím NOT very good with ASM / C (have abit different approach)
How could I compile the following code in to executable PE (.exe) or convert it in to compil-eable C code ?
March 2nd, 2004, 12:07 PM
mremap missing do_munmap return check kernel exploit -
working one :)
February 20th, 2004, 02:18 PM
GooD one bro.......keep on !!! :cool:
February 10th, 2004, 10:46 PM