January 14th, 2003, 07:23 PM
Thanks for the above link, I have been reading it in parts.
I know that exploits seem to be a large category to speak of, but besides the buffer overflows, are there other common vulnerabilities...
January 14th, 2003, 06:54 PM
Thanks for the information about the mp3 exploit but what about other exploits?
I mean, how do people figure this stuff out? How do they write these codes to exploit these vulnerabilities?
January 13th, 2003, 08:28 PM
Thanks guys so far, but after reading some stuff I have some more questions.
I read about the Windows XP vulnerability with bad mp3 files which can crash your computer.
Now, my question is, how do...
January 9th, 2003, 01:52 AM
Hey guys, thanks for the information.
I'll check out those sites and read some of the suggested readings. I guess there's no straight answer to it, is there? At least it isn't that easy for anyone...
January 8th, 2003, 10:14 PM
I'm completely new to this set of mind, and I tried reading a tutorial by someone called Revelation and got completely lost.
So I figured I'd ask you guys. :)
Exactly how does a hacker get into a...
January 8th, 2003, 10:10 PM
Hello everyone at AntiOnline.
I'm quite new to this computer thing but I want to find out as much as I can about them.
They seem to be quite interesting, but also very complicated.
I just recently...