Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: sec_ware; Keyword(s):

Page 1 of 20 1 2 3 4

Search: Search took 0.07 seconds.

  1. Replies
    29
    Views
    2,861

    Hi Very creative solution to that problem...

    Hi



    Very creative solution to that problem :) Luck, unfortunately, often is missing ...
    you could also ping to the broadcast address and wait for who is answering ...
    if there are some sun...
  2. Replies
    9
    Views
    1,160

    Hi :) That's the way I write posts...

    Hi



    :) That's the way I write posts usually. There should be
    some content, even if I do not exactly target the request
    of the thread starter. I better spend 15 min on something
    than 5 times...
  3. Replies
    9
    Views
    1,160

    Hi Well written post - it's a pleasure to try...

    Hi

    Well written post - it's a pleasure to try to answer your questions.


    In short:


    1) You don't need selinux. It's geared towards environments with the
    the need for mandatory access...
  4. Replies
    6
    Views
    816

    Hi Short answer: I never heard of a...

    Hi

    Short answer:

    I never heard of a checksum called "opt-out".
    Also, as far as I know, there is no mechanism or technique
    called "opt-out" with respect to checksums.

    No comments on the...
  5. Thread: P=NP?

    by sec_ware
    Replies
    6
    Views
    1,453

    Hi Andrew Wiles[1] proved a while ago Fermat's...

    Hi

    Andrew Wiles[1] proved a while ago Fermat's last theorem.
    For this so seemingly simple statement[2], another deep
    mathematical conjecture (Taniyama–Shimura conjecture,
    which is about...
  6. Thread: P=NP?

    by sec_ware
    Replies
    6
    Views
    1,453

    Hi The first impact would be that Clay[1] may...

    Hi

    The first impact would be that Clay[1] may have to pay one million $ :)
    ...so there always will be rumors (any references?).

    Second, lot's of people, among them genuine researches, claim to...
  7. Replies
    6
    Views
    3,706

    Hi Mark Neat and small - i like it. I haven't...

    Hi Mark

    Neat and small - i like it. I haven't still look at it in detail,
    but for hijacking, is it related to have the thread in suspended
    state and overwriting the entry point resp...
  8. Replies
    6
    Views
    636

    Hi I agree with the remarks above. As per...

    Hi

    I agree with the remarks above.

    As per a specific NAS device:
    I like synology[1] products. They do provide some supplemental
    functionality compared to the Iomega one. Rs407[2] or Cs407[3]...
  9. Replies
    4
    Views
    3,734

    Hi Yes, it is possible, but undocumented. I...

    Hi

    Yes, it is possible, but undocumented. I actually have never seen
    the following on the web.

    What you find[1,2] are information about a registry binary called
    SrvsvcDefaultShareInfo. This...
  10. Replies
    17
    Views
    1,377

    Kingkong, I don't know who recommended C#, but...

    Kingkong,

    I don't know who recommended C#, but that recommendation
    was reasonable.

    There are two ways to increase your chances for a
    well-paid job position nowadays - either know an
    old...
  11. MS08-0001 exploitation - the power of ida and sabre

    Hi

    I just came across a slashdot-article[1], in which Halvar Flake
    presents how a comparison of unpatched vs patched libraries[2]
    can reveal easily all information needed to develop an exploit....
  12. Replies
    14
    Views
    5,606

    Hi I start to take this personally :D Since...

    Hi

    I start to take this personally :D

    Since the junction point in discussion is a subfolder of the desktop,
    I don't think that the full path solves the problem. Anyway, try
    using explorer.exe...
  13. Replies
    14
    Views
    5,606

    Hi You may have to make sure that Launch...

    Hi

    You may have to make sure that Launch folder windows in a separate process is checked.

    Optionally, you may check one of the following two commands:


    runas /user:administrator...
  14. Replies
    14
    Views
    5,606

    Hi Unfortunately, ncpa.cpl is the only control...

    Hi

    Unfortunately, ncpa.cpl is the only control panel item that cannot
    be started with runas, neither with



    runas /user:administrator ncpa.cpl
  15. Replies
    3
    Views
    889

    Hi There are many forms of inter-process...

    Hi

    There are many forms of inter-process communications[1],
    certainly TCP/IP is often used, but also [D]COM or named
    pipes[2] are common. The goal of IPC actually is to provide
    some kind...
  16. Replies
    9
    Views
    1,813

    Hi preliminaries I had a glance at the...

    Hi


    preliminaries

    I had a glance at the licensing mechanism. Although
    the following argumentation certainly has to be taken
    with a grain of salt (and I may have misunderstood
    something...
  17. Replies
    3
    Views
    967

    Hi, reminds me of another task of yours in...

    Hi,

    reminds me of another task of yours in July[1]. I would use a
    similar strategy.

    1. Read in the whole 'parts' - file in a SortedDictionary(of string, boolean)

    2. Open an InputStream to...
  18. Replies
    20
    Views
    3,353

    Hi Although I am not an expert, I thought to...

    Hi

    Although I am not an expert, I thought to have understood as much:

    The frequency is given on a per core-basis (often that number is even
    referred to as the 'core frequency')


    reason
  19. Replies
    19
    Views
    2,230

    Hi Thanks guys for the additional input. From...

    Hi

    Thanks guys for the additional input. From a gamers (!) point of view
    I like the idea of using a readyboost capable flashdrive for the pagefile.
    May be worth a try.

    I now bought a Intel...
  20. Hi Thanks for sharing the paper. It is a nice...

    Hi

    Thanks for sharing the paper. It is a nice compilation
    of points to think of, thus defining a standard :)

    To be a bit picky:
    We are talking here about systems thaat cost >150k$
    (15k$...
  21. Replies
    14
    Views
    3,875

    Hi Good contribution, ildjarn. I haven't seen...

    Hi

    Good contribution, ildjarn. I haven't seen before that you mentioned
    preimage attacks, but excellent that you did so now! Salting is a simple
    and effective method to render rainbow tables...
  22. Thread: SqlInjection

    by sec_ware
    Replies
    2
    Views
    722

    Hi I regularly check David Litchfields blog...

    Hi

    I regularly check David Litchfields blog (nice review[1]), but there was
    nothing like that (I may be wrong of course) since the
    DBMS_EXPORT_EXTENSION Injection (package with public execute...
  23. Replies
    19
    Views
    2,230

    Hi Thanks for your input guys. I also asked a...

    Hi

    Thanks for your input guys. I also asked a few others (one of them with the
    same setup as foxyloxley ;) ), none of them was able to play crysis
    at limit (well, at resolution 1920x1200 :) )...
  24. Replies
    14
    Views
    3,875

    Hi Those one-way hashing algorithms are indeed...

    Hi

    Those one-way hashing algorithms are indeed "irreversible" in the meaning
    that they are not invertible. Even with infinite computer power you won't
    be able to deduce the input unambiguous.
    ...
  25. Replies
    19
    Views
    2,230

    Hi Nihil With "upgradeable" I mean the...

    Hi Nihil

    With "upgradeable" I mean the following (exaggerated example):
    Assume I buy the latest graphic card for 600$ (PCI Express or whatever).
    In one year, I will sell this graphic card and...
Results 1 to 25 of 500
Page 1 of 20 1 2 3 4

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides