Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: Wintermut3; Keyword(s):

Search: Search took 0.01 seconds.

  1. Replies
    58
    Views
    3,982

    I'm still in high school (I'm a junior) but I'm...

    I'm still in high school (I'm a junior) but I'm going to have an Advanced certificate in Programming (From a tech college) in a few months. I will be in computer engineering when I graduate
  2. Replies
    9
    Views
    653

    I wouldn't worry all that much. If he is on an...

    I wouldn't worry all that much. If he is on an AOL account, he can't touch you. Their propraitary TCP/IP means he can't even ping you, tracert you, telnet, anything. Even if he does have a real...
  3. Replies
    25
    Views
    2,024

    I agree that we need more info. Almost by...

    I agree that we need more info. Almost by definiton a really good hacker is somewhat specialized. What I mean is that a *really* good windoze server hacker might not be the best in the world at...
  4. Replies
    9
    Views
    740

    <<Troll alert>>
    <<Troll Alert>>
  5. Replies
    5
    Views
    629

    nope, all the non-shadowed file has is token...

    nope, all the non-shadowed file has is token pointing to the shadowed file...
  6. Replies
    2
    Views
    530

    All good ideas... I can't remember how many...

    All good ideas...
    I can't remember how many times I've been mapping the web (i'm trying to map my whole area of the web, or at least part of it) I've found a box running a couple dozen ports. Even...
  7. Replies
    21
    Views
    1,292

    and who would we all have to beat up on? No...

    and who would we all have to beat up on? No Microsoft and we have no target for all of our pent up rage...
  8. Replies
    7
    Views
    777

    I was using PC-cillin (I thinkl that's spellt...

    I was using PC-cillin (I thinkl that's spellt right)
  9. Thread: Help Me!!!

    by Wintermut3
    Replies
    2
    Views
    434

    You deserve it! DOS attacks are clumsy,...

    You deserve it! DOS attacks are clumsy, uncontrollable and hit innocent people as often as the target. Not to mension that most ISPs will kick you if not cal the FBI over any serious DOS attempt. ...
  10. Replies
    64
    Views
    4,150

    Who ME?

    Who ME?
  11. Replies
    64
    Views
    4,150

    I'm white hat, most of the time... I'm also not...

    I'm white hat, most of the time... I'm also not sure if I'm quite a hacker yet, but I try
  12. Replies
    7
    Views
    972

    it's hard to hack wintel and linux boxes from a...

    it's hard to hack wintel and linux boxes from a mac, but a mac is IMPOSSIBLE to hack using anything other than a mac
  13. Replies
    17
    Views
    1,104

    T-sight, all you need to know... It logs what...

    T-sight, all you need to know... It logs what happens, all keystrokes that are entered in any shell or account. at realtime speed to. Playbacks of hack attempts are great for playing back at your...
  14. Replies
    7
    Views
    777

    Warning: an interesting little virus

    I got an interesting little trojan from an MP3

    It changed it's extension to .VBS (Visual Basic Script) as soon as Media Player tried to open it and executed of course

    I'm not sure exactly what...
  15. Maybe the problem is kids like me can't afford...

    Maybe the problem is kids like me can't afford $300+ software but still need to use the tools

    I'll be damned if I spend $1000 on Visual Studio Professional just 'cause I need to use Visual C++ and...
  16. Replies
    8
    Views
    627

    I know a *Lot* of Linux users, I myself have a...

    I know a *Lot* of Linux users, I myself have a Linux box...

    but Linux isn't exactly a 'computer for the masses' you have to be pretty good with computers to set it up and run it the way you want,...
  17. Replies
    6
    Views
    446

    Screw your ISP... If you're going to do...

    Screw your ISP...

    If you're going to do anything suspicious anyway you shouldn't be doing it from an account that could be traced to your RL name after all.

    Do what I do, if you are doing...
  18. Replies
    8
    Views
    627

    All corporations, given the chance, will be...

    All corporations, given the chance, will be anticompetitive. They're in it for profit after all. Microsoft has done somethings that I haven't agreed with, but you have to give them credit for...
  19. Thread: The Ideal

    by Wintermut3
    Replies
    3
    Views
    670

    I loved Snow Crash, but it seemed to me that that...

    I loved Snow Crash, but it seemed to me that that book (and most Cyberpunk type lit.) implies a post-intilectual property world.
    Just look at the way Bruce Sterling put 'Hacker Crackdown' free on...
  20. Thread: The Ideal

    by Wintermut3
    Replies
    3
    Views
    670

    The Ideal

    This an extension of the threads that I keep reading about P2P file sharing...

    What do you guys think is the future of intilectual property?

    Is it dead, is it even important in this day and...
  21. Replies
    28
    Views
    2,149

    They forgot Console Cowboy...

    They forgot Console Cowboy...
  22. Replies
    2
    Views
    424

    What DJ?

    What DJ?
Results 1 to 22 of 22

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides