September 30th, 2003, 07:26 AM
i agree that IM are security threats.Any one can use the flaws created by th IMs and dont forget the open ports they creats.
September 17th, 2003, 01:38 PM
Basically what i want to do is to import a .swf file which is import protected witha password.And Plz think before u answer.
September 12th, 2003, 09:45 AM
i know the question is good but do u know any way
September 12th, 2003, 09:34 AM
how can i import the flash files which are protected with a password.Although there r certain tool like Flashit but they dont work at all
thanks in advance
August 31st, 2003, 08:02 AM
The main problem of urs is excessive instalation of programs.So install only what u required.
August 31st, 2003, 07:54 AM
its easy to break the root password if u r having the physical access to the computer .Just boot the computer with linux installation disk and type linux rescue.After that give command chroot...
August 31st, 2003, 07:36 AM
I think you should try Redhat 9 atleast for once .Its really good and gives no problem at all
July 15th, 2003, 06:15 AM
I dont want to learn this for any bad reasons.As in college we save all our projects and assignments on a compuer having static ip address and always connected to internet but it is not accessible...
July 14th, 2003, 06:31 PM
Thanks for all your replies .Many of u want to know why i want to do it .My motive behind this is to change my ip address to a trusted ipor internetwork ip of my college so that i can get my...
July 13th, 2003, 07:22 PM
i want to know the way by which spoofing is done .I mean how can i change my ip address to a desired ip address on a dial up connection.
Thank you ( In advance)