Search:
Type: Posts; User: Dr Toker; Keyword(s):
Search:
Search took 0.04 seconds.
-
December 21st, 2005, 05:55 AM
Nah, i spend my money on "Rent" and like Bills.... ya know... after that, theres really not a lot left..
-
December 21st, 2005, 05:52 AM
Grand theft AUTO is a big difference than a video game. Come on... get real Neg...
* uhmm... acctually i guess GTA is a video game too... but i was referring to Negs lets steal an audi...
-
December 21st, 2005, 05:44 AM
Minimum wage, over seas outsourcing, a poor education system, and a pop culture that is telling people to be stupid spoiled whores, or only care about money and dey bling. A capitalist society that...
-
December 6th, 2005, 01:15 AM
Well, I'm not 100% certain about this wireless setup you have, but i know that if you plug a switch into your router, then plug all your hosts into that, you can spoof yourself as the gateway, and...
-
October 20th, 2005, 02:11 AM
awesome, Yeah i figured since it was sent to me, others would have gotten this same deal. But with me, there was no link to a php script.. it was a direct link to the file.
What i was...
-
October 19th, 2005, 03:55 AM
I got a message from some obscure, probobly random person on my buddy list, telling me to click here..i know the person the link came from (or at least i think i do)... so i click.. (I have already...
-
September 27th, 2005, 10:37 PM
Is anyone else wondering how this flaw with different charactars being allowed, lets people run arbitrary code? So far I havent found anything technical, only news articals like this one.
-
July 18th, 2005, 10:42 PM
I guess...but really the only threat is a Denial of Service. I personally am not too worried with my home box getting DOS'd. But even if I was, I'm certain that these packets could be blocked at...
-
June 26th, 2005, 12:40 AM
This is a surprise to me. I know you can like use a proxy, or a compromised server to have that machines IP show up as the one making the connection, but thats not really spoofing. What is involved...
-
June 23rd, 2005, 04:50 AM
You cant spoof your IP while maintaining an SMTP connection. As far as I knew the only way to spoof your IP was with connectionless protocals, or something like that. You cannot maintain a...
-
At the risk of sounding like an amature, I'm not sure I understand what you mean by tunneling out to C&C. Honestly when i see C&C i think of command and conquer. Heh.. but for real, what is this...
-
April 29th, 2005, 12:48 AM
Odds are it is someone you know who hacked your email account. Your secret question was prolly something gay like, "Whats your pets name". All your friends know your pets name. Bah.. like i said...
-
April 29th, 2005, 12:39 AM
How many times has this one been done. You must forgive me, as I have seen this thread about 4 times in as many years... But it was definatly well written.
-
April 16th, 2005, 12:27 AM
Couldnt you just run VNC over SSH?
*guesses he should acctually read the post...
-
April 7th, 2005, 03:53 AM
quote:
Users are adviced to take immediate specific action to contain the impact. Example: 'MSBlaster' worm outbreak.
I dunno if you guys know how much it sucks to have been working a Dial up...
-
March 15th, 2005, 01:58 AM
This is quite a shock to me. I thought Netstat was infallible. With all the different syntax i have always been able to find what I need or suspected.
I thought Netstat simply checked all TCP/UDP...
-
March 10th, 2005, 05:05 AM
I thought you had to download some server application(Spyware) for them to be able to search your Desktop.
-
February 26th, 2005, 01:19 AM
In my experience... I just made a private network and flooded my roommate to test vulnerablilties and such. Its safe that way.. just get behind a HUB/Router and you can do what ever you want without...
-
February 24th, 2005, 04:34 AM
Allow me to be frank...
/nick Frank
Okay, to me, Spyware is any software installed when I want to view a website, a movie, anything. It is software that I dont want, that you wanna give me...
-
February 21st, 2005, 11:37 PM
This is crazy. Alot of these numbers work. All that comes to my head is.... "Stupid Spoiled Whore, Video Playset!"
...
-
January 6th, 2005, 11:38 PM
So, lemme drop my RX in here..
Computer Crimes are a realativly new concept, and the law makers have had trouble locking down a penalty. I do know that if you cause Monitary loss of up to or over...
-
January 1st, 2005, 03:32 AM
Why are you even going through a proxy to access the internet at all? Does your entire ISP go through one? If not, I suggest to simply disable the proxy setting in Internet Explorer. ...
-
December 31st, 2004, 11:30 PM
If you enter the router' config, you should be able to rate limit Packets matching a specific criteria. So if the P2P client he is using is, Azureus (bittorrent), then you would wanna rate limit...
-
December 30th, 2004, 11:50 PM
ARP poisoning: In a nutshell it turns a machine on the network into the Gateway more or less. That way, all the traffic goes through the machine running an ARP Poisoner, allowing them to packet...
-
December 28th, 2004, 05:59 AM
So, I know this has pretty much NOTHING to do with computer security and all but its driving me crazy. I'll just post it here, cause I have seen more intelligent people on this board over the past...
|
|