Type: Posts; User: Turing_Machine; Keyword(s):
Search took 0.01 seconds.
December 8th, 2003, 04:09 PM
December 4th, 2003, 08:02 PM
As someone who has struggled with linux on a 386 as my introduction to the *ux world, I remember boot and root disks, a very limited hardware pool, and explicitly adding every piece I would need.
December 4th, 2003, 07:38 PM
I assume you are a linux user, considering your username
from there you could use the standard netfilter workings, etc, to do what it...
December 4th, 2003, 07:00 PM
Interesting take on what you have read. In fact, as someone who does look though the kernel source and tries to make things better when he can, I can honestly say that I did not understand the issue...
December 3rd, 2003, 10:42 PM
To reset all users to use a false shell (vs sh, bash, csh, etc) on most Linux platforms:
type who and see which users are currently running a shell
another way would be to type ps aux | grep sh...
December 3rd, 2003, 09:39 PM
FYI, it is a system call available to any process that is broken. You need to make a C program with that particular system call, compile it, run it on that machine as a user (you need to have a...
October 2nd, 2003, 07:28 PM
Microsft's so-called "security holes" have been, for the most part, good ideas at attempting for centralized administration.
BO2k used a highly functional remote control interface originally...
October 2nd, 2003, 06:49 PM
If you are using Apache 1.3 with mod_ssl or Apache 2 with ssl built in, you are vulnerable
Any SSL using the OpenSSL libraries are at risk.
Please review this other thread
October 2nd, 2003, 06:46 PM
Check out OpenSSL Notification
OpenSSL, and therefore, maybe some of your programs that depend on OpenSSL for security (Apache, OpenSSH, etc. etc.) may also be vulnerable if they are linked...
October 2nd, 2003, 03:13 PM
October 1st, 2003, 10:18 PM
I remember looking into the NASA Lewis center in Cleveland, Ohio, when the originally connected to the Cleveland Freenet.
For those who have never heard of the Freenet, it was a precursor to the...
October 1st, 2003, 09:52 PM
Okay.. I used the "complex" version of the conversation for arguements sake. Here is the actual comements in the source.
A sends B 16 random bytes (bfhpkA)
A sends B...
October 1st, 2003, 07:24 PM
That is great.
I'm not saying that you CAN'T change your key.
In fact, you can. Any time you want. And each time, you will need to reinitialize yourself with the entire network, unless they...
October 1st, 2003, 05:28 PM
Looking into the functionality of this particular program, your key is, in fact, broadcast from someone who has decided to trust you to all people who have decided to trust them. Also, if ou change...
October 1st, 2003, 03:06 PM
Depending on what type of mouse you are using, you can check the /dev file to see if ther is any input from the mouse, or if it somehow has been eaten.
Post what you have, and I'll tell you what...
October 1st, 2003, 02:49 PM
I've been using the CryptoAPI top encrypt my file system. Since it isn't broadcast, and it is only dependant on your processor as to how much overhead you can afford, using a 1024bit encryption...
October 1st, 2003, 02:43 PM
I need those two files. Also, any specs you have on the computer would probably make it easier.
Specs on the video, sound, cpu, amount of ram, dual processor or single processor, etc etc.
September 30th, 2003, 09:12 PM
Having some experience in security and encryption, I find this article's explanation a bit disturbing.
If it is, as it states, a shared key community, then that means the community has and is...
September 30th, 2003, 08:10 PM
RedHat 9 has the dubious distinction of probably being the last distro to keep with the OSS version of sound support.
My suggestion would be to recompile the kernel (or, better yet, upgrade to...
September 30th, 2003, 07:41 PM
its a "management" level article that more or less talks about "security" via wireless and via wired connections. Each...
September 30th, 2003, 03:17 PM
Omni-directional antennae do broadcast everywhere. If you are sending a signal in a tight stream, it is called directional. You would not have all that much broadcast information externally to the...
September 29th, 2003, 07:26 PM
they seem to have the equipment and possible antennae indexed.
September 29th, 2003, 06:16 PM
its a very nice solution. I have implemented the JS piece into our intranet, and as that is the default page (forced) of our company, it does the job very nicely and has excellent...
September 29th, 2003, 06:12 PM
nasty antennae for a serious range.
September 29th, 2003, 06:05 PM
If you are using Microsoft servers to do the hosting, someone wardriving to grab your WAP security isn't your most obvious security hole.
That being said, I have had some luck using *smaller*...