Search:

Type: Posts; User: phorvati; Keyword(s):

Search: Search took 0.03 seconds.

  1. Replies
    18
    Views
    10,149

    I would get to know the sysinternals line of...

    I would get to know the sysinternals line of tools. Get some of their free tools. Like the tcpview, or the pstools, and the procexp.
    Also get and learn to use Cain from Oxid.it These will let...
  2. FAT32 or NTFS file system? Did you compile it...

    FAT32 or NTFS file system? Did you compile it from source or got the executable from somewhere.
  3. Replies
    14
    Views
    13,479

    Does your boss know how to configure the linksys?...

    Does your boss know how to configure the linksys? Its more less idiot-proof but you never know.
  4. First of all that code can never run. You need...

    First of all that code can never run. You need to run-time link the WKSSVC.dll function NetAddAlternateComputerName. Remember this is an undocumented function.
    Also it only works on FAT32. So...
  5. Replies
    5
    Views
    7,940

    Then why do we not hear about cisco router...

    Then why do we not hear about cisco router exploits as often as webservers using IIS?
    I think that cisco updates their stuff very well. Much better than any other compnany using IIS.
  6. Replies
    16
    Views
    13,925

    Yes comparing the two images 1:1 they look...

    Yes comparing the two images 1:1 they look diferent. But the difference could have come from re-compression to a lower bitrate, printing/scanning or some other modification.

    And if the...
  7. Replies
    16
    Views
    13,925

    Steganongraphy might not always be the most...

    Steganongraphy might not always be the most secure way to hide your data. It optimizes amount of embedded information while not particularly caring for security. So the stegdetect could identify an...
Results 1 to 7 of 7