Search:

Type: Posts; User: Trojan; Keyword(s):

Search: Search took 0.02 seconds.

  1. Replies
    9
    Views
    6,423

    I think most of the basics have been covered,...

    I think most of the basics have been covered, however one key point to remember: Bridges/Switches cannot route data over different networks, whereas router can.

    Because bridges (or now known as...
  2. Indeed, however it depends on how the network...

    Indeed, however it depends on how the network operator has set up its GPRS system. Most operators will use NAT and then have a firewall implemented, this way it's fairly difficult to get to a...
  3. Replies
    33
    Views
    36,593

    All, I haven't read through all the posts, but...

    All,

    I haven't read through all the posts, but any cell network that utilises the SIM card has not to date been compromised. Cell phone phreaking and attacking the network are 2 completely...
  4. Not true, most MIDP2.0 supporting handsets have...

    Not true, most MIDP2.0 supporting handsets have access to the camera, and because JSR177 has only beeen approved recently those handsets do NOT implement any security model. Even now, handsets such...
  5. True, in the Japanese market AV is already...

    True, in the Japanese market AV is already deployed on the client side. This is mainly to do with network operators having the liability and not the handset vender. We will soon see anti-virus...
  6. AFAIK, MIDP1.0 does not implement any security...

    AFAIK, MIDP1.0 does not implement any security controls at all, MIDP2.0 recommends to use JSR 177, which is the recommended security practice (this implements the Mexe like security domain system) -...
  7. Hi, My 2 pence on all of this. Regarding...

    Hi,

    My 2 pence on all of this.

    Regarding breaking encyrption algorithms, there are alot easier ways of eavesdropping on a call. At the end of the day encryption to an entity must end somewhere...
  8. Hi, Virus scanners and cleaning your drive...

    Hi,

    Virus scanners and cleaning your drive isn't going to any good in your circumstances.

    Most IM services work with a portal, where the IM service provider proxies messages through to the...
  9. Replies
    7
    Views
    7,428

    A quick question relating to Java and registry...

    A quick question relating to Java and registry access.

    To access the registry from an applet it surely has to be signed by a trusted third party right?
  10. Replies
    0
    Views
    4,428

    Accessing Kernel related files

    Hi,

    What restricts applications to access kernal related files in WinX. If their is this restriction how are those API's filtered out?
Results 1 to 10 of 10