Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: j3r; Keyword(s):

Page 1 of 5 1 2 3 4

Search: Search took 0.01 seconds.

  1. Replies
    20
    Views
    2,278

    No. X display security is entirely host-based....

    No. X display security is entirely host-based. (Yay!) (X was developed back in the days when, if you knew how to use Unix, you knew everyone else who knew how to use Unix. Security was not much of an...
  2. Replies
    20
    Views
    2,278

    br: are you doing it in the right order? You have...

    br: are you doing it in the right order? You have to xhost +whatever first, then open the xterm.
  3. Replies
    20
    Views
    2,278

    Try "xterm -display 10.10.10.1:0.0" Edit:...

    Try "xterm -display 10.10.10.1:0.0"

    Edit:
    Perhaps a bit more explanation is in order. X windows can have multiple session per machine, and multiple screens per session. The ":0.0" specifies...
  4. Replies
    20
    Views
    2,278

    It's not a feature of telnet or xterm. Attackers...

    It's not a feature of telnet or xterm. Attackers replace the existing copies of the telnet/xterm/ssh/etc. programs with ones that more-or-less appear to work the same, but actually do something evil,...
  5. Replies
    10
    Views
    3,948

    Of course, the problem with "just firewall them"...

    Of course, the problem with "just firewall them" is that sometimes, you'll be blocking an address that is actually owned by someone you want to talk to. Just be careful, is all.
  6. Another profile of crackers/attackers/malicious hackers/whatevers

    As seen on slashdot:

    An Israeli student did her doctoral dissertation by profiling Israeli hackers (using this term as her interviewees seem to be a cut above the average skrypt kiddie). Not sure...
  7. Replies
    32
    Views
    2,531

    Actually, Cisco's scheme is a way to provide...

    Actually, Cisco's scheme is a way to provide lock-in for Cisco and the big anti-virus companies. It lets Cisco sell new hardware, and lets the cabal decide which AV products get to be deployed on a...
  8. Replies
    18
    Views
    1,654

    Basically what you said, I image internal routers...

    Basically what you said, I image internal routers get BGP info from the VPN server to determine what ports to open to what VLANs. I haven't actually seen this done, but imagine it might be done on a...
  9. Replies
    18
    Views
    1,654

    tekno: I would not be surprised if some Cisco VPN...

    tekno: I would not be surprised if some Cisco VPN solutions used BGP to open up various VLANs based on your VPN credentials.

    That said, yeah, you're generally right.
  10. Replies
    18
    Views
    1,654

    Most FW admins are not worth their salt. :-/

    Most FW admins are not worth their salt. :-/
  11. Replies
    18
    Views
    1,654

    With regard to the BGP &c., that only applies...

    With regard to the BGP &c., that only applies (AFAIK) to VPNs that terminate on the router. So, if one of your ISPs is friendly, they can help you out. Otherwise, that is not relevant to the current...
  12. Replies
    7
    Views
    631

    Why not go to the source...

    Why not go to the source?
  13. Replies
    18
    Views
    1,654

    cheyenne1212, you are, unfortunately, right. I...

    cheyenne1212, you are, unfortunately, right. I believe some VPN solutions have noticed that this is a problem, and tunnel the VPN connection through port 80. (I think Cisco does this?)

    One...
  14. Replies
    7
    Views
    1,987

    deftones You can't just copy the data out of...

    deftones
    You can't just copy the data out of ethereal. Close, but not quite. First off, ethernet packets are small - 1.5K a piece, so the image will be split up among the packets. You can probably...
  15. Replies
    13
    Views
    811

    New mice are like 5 euros. You can try taking...

    New mice are like 5 euros. You can try taking your apart and checking for loose solder connections, dirt, etc. Mice are generally pretty easy to dis and re assemble. And if you break it, well, you...
  16. Thread: Hex Editing

    by j3r
    Replies
    9
    Views
    1,435

    Man, to bad I don't have a VB6 decompiler, I...

    Man, to bad I don't have a VB6 decompiler, I wonder what ShitApp actually does...
  17. Thread: email

    by j3r
    Replies
    7
    Views
    784

    If you really don't want spam, you can get one of...

    If you really don't want spam, you can get one of the challenge/response systems like Mailblocks (not an endorsement, I use client-side bayesian filtering). Whenever someone new sends you mail, they...
  18. Thread: 2 quick questions

    by j3r
    Replies
    6
    Views
    657

    Install linux, use cdrecord :-P

    Install linux, use cdrecord :-P
  19. Replies
    32
    Views
    2,531

    Yeah, this is just silly. Will there be a...

    Yeah, this is just silly. Will there be a certification process for anti-virus software? How much will it cost? If AV software doesn't have to be certified, I'll just define SETI@Home to be AV...
  20. Thread: Proxy Check...

    by j3r
    Replies
    7
    Views
    1,855

    What mark_boyle2002 said, except that if they do...

    What mark_boyle2002 said, except that if they do not match, your are either going through a proxy server or are behind a NAT device. They are not the same thing, and depending on what you're trying...
  21. Replies
    8
    Views
    983

    http://lists.insecure.org/lists/bugtraq/2003/Nov/0...

    http://lists.insecure.org/lists/bugtraq/2003/Nov/0120.html
    http://lists.insecure.org/lists/bugtraq/2003/Nov/0134.html
    etc...
  22. Replies
    18
    Views
    1,654

    It's easy. You need something that does port...

    It's easy. You need something that does port forwarding (stunnel is best, if you can get it on your platform) to be run on the machine you're using, and the remote machine. So say you wanted to use...
  23. Replies
    13
    Views
    1,369

    In the US, any device (except garage door...

    In the US, any device (except garage door openers) that bypasses copy-protection methods is generally illegal. In the US and pretty much the rest of the world (all of Europe, for instance), the act...
  24. Thread: Server security

    by j3r
    Replies
    8
    Views
    1,652

    Setting a single file's mode to 777 can be very...

    Setting a single file's mode to 777 can be very dangerous. OTOH, is can be totally harmless. If the file contains shell commands that are then executed, then you must be totally sure that nobody can...
  25. Replies
    2
    Views
    644

    You could set up a streaming mp3 server on one of...

    You could set up a streaming mp3 server on one of the machines, then connect the players on the various computers to connect to the stream. Just make sure that you're using the same amount of...
Results 1 to 25 of 114
Page 1 of 5 1 2 3 4