Search:

Type: Posts; User: hardcode121; Keyword(s):

Search: Search took 0.07 seconds.

  1. Search into the deeper end of the world wide web

    These is still a vast world wide web left beyond the reach of today's search engines, which i prefer to call 'Deeper end of the Web'.


    The deeper end of the web consists of web pages created...
  2. Google Indexing Binaries too - For good or for bad

    Just during my regular routine of going through news across the IT world.. I stumbled upon the following link

    http://arstechnica.com/news.ars/post/20060710-7225.html




    Google bots crawling...
  3. Replies
    2
    Views
    1,486

    Thoughts on New Year Eve

    Hi everybody on Antionline,

    I am making this post here because of two main reasons:

    1. Thank all AntiOnline members for the splendid work they are doing. Some of the wonderful
    threads are...
  4. New Web Browser supports Social Networking

    Wonder whether it has been covered here before.....




    Here is the further reading for this story..

    http://www.internetnews.com/xSP/article.php/3558436
    ...
  5. Replies
    25
    Views
    16,990

    In order to keep track of Registry changes by...

    In order to keep track of Registry changes by trojans/worms etc. and clean them you may use

    1. The Cleaner ( http://www.moosoft.com/products/cleaner/ )
    2. A-Squared ( ...
  6. Replies
    2
    Views
    4,477

    Erratic Site Disclaimer Notifications

    Found it interesting and useful to discuss here.

    I just came across the phrase 'code 431.322.12' in some website's Disclaimer.

    The disclaimer reads as




    The true story is here
  7. Replies
    2
    Views
    7,815

    Well..I made the above post while actually...

    Well..I made the above post while actually working on the machine to find possible rootkits/malware on it... doing a bit more survey using google fetched me the following tools..

    1. Rootkit Hunter...
  8. Replies
    2
    Views
    7,815

    Some more security tools

    Going by This wonderful list of security tools.

    But found that it does not list any tools to detect/eliminate rootkits from a system. Therefore I had to search for some more tools.

    I have...
  9. Replies
    10
    Views
    14,645

    Such scams have become common.. Here I post a...

    Such scams have become common..

    Here I post a series of emails which I received from a phisher in Abidjan posing as Sonia Johnson. According to the scammer..........'SHe is Sonia Johnson.. Her...
  10. Replies
    18
    Views
    13,998

    Perfect.. I believe you.. At last I succeded in...

    Perfect.. I believe you.. At last I succeded in finding the real genius 'The Creator of Linux'...



    My google search for the phrase 'where microsoft.com is hosted' has given me this result in...
  11. Replies
    10
    Views
    9,730

    Yeah ... Microsoft has acknowledged that there is...

    Yeah ... Microsoft has acknowledged that there is a bug in the patch MS05-051



    Original Link
    http://www.eweek.com/article2/0,1895,1871560,00.asp
  12. Replies
    6
    Views
    6,862

    Well.... the discussion continuing on AO threads...

    Well.... the discussion continuing on AO threads since a fortnight now... Its true that Internet has been developed by America... In fact the same is true for too many other technologies as well......
  13. Replies
    5
    Views
    3,568

    Their strategy seems to be similar as that of...

    Their strategy seems to be similar as that of 'HoneyNet Project's'.
    www.honeynet.org

    There too some systems configured as honeypots are used to track down the attacker. The system uses well...
  14. Replies
    6
    Views
    6,683

    Well... The exe created after compiling and...

    Well... The exe created after compiling and linking a c++ code would ofcourse not be containing any variable names but it contains the references to the memory locations allocated for variables of...
Results 1 to 14 of 15