Search:
Type: Posts; User: wyred; Keyword(s):
Search:
Search took 0.01 seconds.
-
April 3rd, 2006, 04:38 AM
warriorfan808,
Java is very easy to decompile. There are numerous programs to do it, DJ Java Decompiler, Mocha,Cavaj, to name a few. Just do a quick google for "Java Decompiler" and you get 1.7...
-
April 3rd, 2006, 04:18 AM
mad_fox9007,
There is no way to write Java code that isn't easy to compile. When you call javac.exe(or hit compile in your IDE), a .class file is created which contains byte code. This byte code...
-
January 6th, 2006, 11:02 PM
Ironically enough, WINE is still vulnerable to the now patched WMF exploit. Talk about emulation!
Quote from H D Moore(WINE Founder) from ZDNet
The rest of the article is here:...
-
December 2nd, 2005, 01:04 AM
warriorfan808,
The newer v5 Linksys routers are no longer Linux based, last I heard it was VxWorks. You might still be able to find an older version at the store. I know I was fooled by the new...
-
August 26th, 2005, 10:22 PM
Thanks Hesperus!
Unfortunately, neither of these could find the passwords from the password history of Windows :( I'm not running a domain or any remote authentication at home, so I know it has to...
-
August 26th, 2005, 03:11 AM
Everyone always suggests that people enforce some sort of password history on their computer. My question is, where do the old passwords get stored? I've googled for the answer on and off for the...
-
August 24th, 2005, 02:17 AM
We've all heard the rumors that Google is going to be launching its IM service soon. The Los Angeles Times and CNN both have articles about it being announced some time tomorrow. Well this guy is...
-
August 23rd, 2005, 11:55 PM
Hi Madseel,
I'd guess you're using some sort of GUI to browse your filesystem? AFAIK, most GUI's in Unix don't display hidden directory's by defualt, much the same way Explorer doesn't by default...
-
August 13th, 2005, 03:39 AM
I do have a federal job(organization to remain namless), and our security frightens me sometimes. All users run as local admins and the \\host\c$ is accessible on anyone's computer :( I usually try...
-
March 20th, 2005, 04:07 PM
Swoosh -
Elcomsoft(http://www.elcomsoft.com/arpr.html ) has a tool for recovering lost RAR passwords. It supports a brute-force and a dictionary attack. Their product info says that RAR files are...
-
March 8th, 2005, 05:57 PM
From the image you uploaded, it looks like this is more a problem with IE. In the type column, it says the source was Interet Explorer Protected Sites.
-
February 21st, 2005, 01:12 AM
I got bored and decided to format the code. For the sake of not taking up an entire page with the source, I attached it. I hope this helps someone answer AbhishekDwivedi's question.
...
-
February 6th, 2005, 04:54 AM
Thanks for all the posts everyone, this really helps :)
Negative: I dont work for the company that has the problem. Maybe vulnerable wasnt the right word to use. There is a webserver that has some...
-
February 5th, 2005, 05:11 AM
I've noticed that there are lots of posts about people wondering whether or not to tell sys admins that they have security holes. For those of us who decide to spill the beans, does anyone have any...
-
September 23rd, 2004, 05:16 PM
Oops, I spoke too soon. That only works for one of the computers. Does anyone else see anything I'm doing wrong here, or is this just on of those things that happens and it cant really be fixed?
-
September 23rd, 2004, 03:58 PM
I fixed it. ipconfig /registerdns didnt work, but renewing the adapter did. Maybe a stale address or something? Thanks for all the help, now I just need to log on to all the computers(20-ish) to find...
-
September 23rd, 2004, 03:55 PM
Well the ip address didnt work, it just gave me the same error. I can also add firefox to the list of browsers that work.
-
September 23rd, 2004, 03:45 PM
Thanks for all the replys everyone.
The problem is that all the computers used to be able to go to google, but now some of them can't, and the symptoms are starting to move to other computers. At...
-
September 22nd, 2004, 04:21 PM
Hi everyone,
My school is having some trouble with a few computers and I thought some one here could help. The computers are Dell Optiplex GX150's, running Windows 98 SE. The problem is a few of...
-
September 15th, 2004, 02:47 AM
phishphreek80:
I dont know if this is what you are remembering, but there was an exploit for the linux image manipulation program XV. Heres a link in bugtraq with source:
...
-
September 14th, 2004, 12:32 AM
The way they used to track us at my old high school was to force us to proxy through an N2H2 server and log all the requests to sites that were not allowed. They also had Centurion cards so we...
-
September 10th, 2004, 02:57 AM
Heres an interesting link to a Gameboy Advance running Unix 5th Edition: http://www.kernelthread.com/publications/gbaunix/
-
There a dozens of sites with lists of proxies on the internet, just do a google search for them. One site I like that has a free somewhat up to date list is http://www.samair.ru/proxy/. I would do...
-
Most web sites store customer information in a database or on part of the server that is not accessable over the internet. Your best bet is probably a database if you want all the information in one...
-
A google search that would work would be something like "index of" site:www.target.com or allinurl:"index of" site:www.target.com. A lot of websites dont like to give out directory listings. I have...
|
|