Type: Posts; User: Networker; Keyword(s):
Search took 0.03 seconds.
January 27th, 2005, 02:11 PM
I suspect that explore.exe and Iexplore.exe are tightly merged or linked in the OS. Especilally from millenimum edition, I suspect that's part of monopolistic M$ strategy.
January 27th, 2005, 01:21 PM
Thanks professor, sound to be a good lead to investigate... Hope that AOs had already experienced it and share their experience ....
I assume their is no social engineering. For detail, the...
January 27th, 2005, 12:20 PM
It's a long time µI haven't come around but I'm happy to find back this site i really appriciate.
Those who recall me knows that my expertise field is about networking and communication systems,...
phobophiliac be very careful.
IRC port may have been intentionally restricted cause your school admins does not believe it's valuable for knowledge and may be at risk for some kids. There are many...
I'm just a great fan of VLAN implementation for the following reasons
- It limits the broadcast domain to each VLAN (let's says 20 users each) thus mitigating ARP poisoning and spoofing attacks,...
FYI: The mechanism that gives the ability to limit output bdw is called in the community (IEEE, IETF, ...) "shaping". (I suggest to google it). This is one basic function in networking and telecom...
December 19th, 2003, 04:44 PM
I've no experience with that very switch, but with many others...
Generally they are configured in manufacture with an default IP for LOCAL web management for the first time you connect.
December 19th, 2003, 04:36 PM
Folks, I've never used Win2K3, but I heard some guys saying that it is Open source to tackle Linux growth...
Myth or reality? :confused:
December 18th, 2003, 04:21 PM
I see your are one of these curious guys... Curiosity is somthing we share
Well you may be interested in a tut I wrote quite a long time ago:
Layer 2 threat & mitigation
December 18th, 2003, 04:16 PM
Why don't youn make it simpler. use a sniffer on the PC that plays the router role.
EthreReal work on both WIN & LINUX....
December 18th, 2003, 04:11 PM
Well very few are layer 2 aware...
When you've got your PC directly connected on the web by DSL or whatever, you may even not known what is a layer 2.
Anyway, I've seen recently some excellent...
December 18th, 2003, 04:02 PM
I'm pretty sure that the network would never converge.
Max age (IEEE default value 20s) is the life an information, and hello (IEEE default value 2s) is the frequency of information exchange.
December 18th, 2003, 03:51 PM
Well, in theorie 802.11b spectrum range is about 4 km (that's what CISCO says, but I have a doubt), anyway in a village buildings in between the Access point and a terminal will for sure perturbe the...
December 4th, 2003, 02:27 PM
- IP Quality of Service mechanisms (QoS) is a networking technique that would achieve excatly what you want.
- Your CPE router (a XP PC actually) could "tag" internal incoming...
November 3rd, 2003, 09:45 AM
I think I have a very state of the art topic for a thesis. If I was a student with plenty of time I'll go for it!!!
For a good thesis you need
- a subject in the trend: Let's say WI-FI
- a new...
October 1st, 2003, 02:42 PM
if your goal for using a proxy is to be anonymous in front of the www, running Proxy on your server won't help u much.
The real question is: what services do u expect from the proxy ?
October 1st, 2003, 02:37 PM
A bright idea... I wish I could...
Time is running faster (& more costly) while I'm taking age...
I'm a system architect & I have the nostalgy of high school studies and self experiment.
October 1st, 2003, 12:32 PM
assuming many AO mbrs are experienced with Mail servers product, I hope to get feedback about the following matter:
I'm looking for a Mail server (and adds-on) that analyze SMTP...
September 2nd, 2003, 01:56 PM
Just a tip Scimitar,
ARP flooding has 2 main impact on the LAN segment flooded:
1- waste of bandwidth (this one is obvious).
2- the switch can't switch and is just like a hub flooding every...
September 2nd, 2003, 01:34 PM
I'm not a big fan of winblows but the embedded "firewall" function of XP (previous Maestr0 post described how to conf it) can do just what you're expecting to:
Be a dumb stateless filter just like a...
September 2nd, 2003, 01:24 PM
Internet IP addys distribution is a big big mess.
It never had been geographically distributed. Coze IP ranges had been given to companies or gov or whatever in a FIFO style.
That's the reason...
September 1st, 2003, 02:08 PM
Kid, you should come down, drink a glass of milk and think twice before flaming your paires.
Reading your post any AO could understnad that you want to use the school network in an...
September 1st, 2003, 01:56 PM
That's a very interesting subject but I'm sorry to tell u that it is not a brand new subject.
I don't see really how a String based or signature based IDS such as snort would use an AI...
September 1st, 2003, 01:46 PM
10.x.x.x/8 or 192.x.x.x/24 are not within the world wild public address address.
These net adds are use only to internal purposes (and may be nated further on to reach the www).
It would have...
September 1st, 2003, 01:36 PM
I'm not sure to understand!
What do you mean by send packets from my router ?
Do u mean that your are generating frames with the src IPaddy of the router from an NT platform?
If this is the...