Type: Posts; User: treanglin; Keyword(s):
Search took 0.01 seconds.
January 3rd, 2012 06:08 AM
1- Yah dude, DeepFreeze is a commercial program. So, that 30 day period where it works is actually just a trial period so you can test it out to see if you want to buy it. I don't know what your...
January 3rd, 2012 05:36 AM
If you're running windows, you may want to take a stab at the task with GoldWave. (goldwave.com)
It offers 32bit and 64bit versions and has batch conversion capabilities of single files and...
January 3rd, 2012 05:13 AM
For pure CSS check out:...
December 28th, 2011 07:34 AM
It's been a while since I've posted on this forum and today is sure one of those times where I need you guys.
I'm working on a site for a friend and he uses a site called...
February 1st, 2010 11:08 PM
Thanks. Anyone ever do this before?
February 1st, 2010 07:23 PM
My friend and I have been hired to do our first network security assessment for a local company. I've been given the task of creating the "Please don't arrest us we're legit" note.
Any tips or...
September 12th, 2008 11:37 PM
This have been bothering me for some time now. I can't seem to properly get a mac address to change in Windows Vista.
I've made attempts on several machines running this operating system, but my...
April 27th, 2008 02:27 AM
PLEASE NOTE: I'm Not specifically looking for a reverse dns lookup. As I mentioned earlier, I tried DNS stuff...it's not what I'm looking for.
I'm looking for cached dns information .
April 27th, 2008 02:00 AM
Cain does a lot more. If the passwords were cached in IE then cain has the capability to dump the secrets. However, I'd guess that this won't do any good because they probably weren't saved in the...
April 26th, 2008 04:28 PM
yeah I tried dns stuff, but's that's not what I'm looking for. I think that this site actually crawled the web for the purpose of finding and and adding subdomains to a database so that in case they...
April 26th, 2008 06:23 AM
I swear there used to be a site with a database of subdomain names. Like you type in the main domain name, for example: domain.com, and it serves out a list of recorded or known subdomains, such as ...
February 21st, 2008 05:00 PM
Okay, so my friends and I are going to be a part of a Information Security Talent Search for a local university. What's this mean? Basically..... war-games. Both he and I are fans of Backtrack....
January 27th, 2008 09:00 PM
Does this work on MacBooks?
January 27th, 2008 08:53 PM
lol, true. Whenever I'm at work the first thing I do before I walk away from my computer is press WindowsKey+L to lock the workstation. I stopped using bios passwords long ago, but I see now that I'm...
January 27th, 2008 05:46 PM
I disabled internet access to my brothers wireless card in a computer that he was using and he decided, while I was asleep, to take my laptop and...
January 10th, 2008 11:34 PM
I've heard of ppl physically destroying monitors with inccorrect configuration but hard disk? How does that work? How do you fux up a hard drive w/ software...I don't get it.
January 10th, 2008 11:29 PM
The thing with shimmer though is that after the person discovers how the connection is made they also have the task of decrypting the "handshake" or whatever...I think. And then by the time that is...
January 10th, 2008 07:32 PM
Thanks for bringing this up. I just learned about this after you mentioned it (thanks Google) I'm not quite sure which implementation I'd use though.
I don't really understand the cons and pros...
January 10th, 2008 06:47 PM
yeah, but why was it getting filled up.
The idea of it being formatted incorrectly sounds likely, but then again I don't even know enough about how hard drives and formatting to make that call. ...
October 21st, 2007 04:30 PM
I've been playing around with VideoLan a lot recently; transcoding files for my Ipod, watching movies in ASCII mode (yeah....I know), and streaming cartoons on my home PC so that I can watch them at...
I remember messing around with mac when OS X came out. I was in my high school's Mac Lab almost everyday tinkering with the terminal and stuff I never thought I'd use a Mac to do pen testing. The...
February 28th, 2007 01:52 PM
I'm using TrueCrypt now as well. I like it. and even if someone was able to grab my sam file or passwd and shadow files the passphrases are like 30+ characters long and all of my saved data is...
February 17th, 2007 11:41 PM
Okay, so I've been into this computer security thing for a while now. I've seen firsthand how easy it is to grab a passwd or sam file from a linux osx or Windows box. I've experienced the dreadful...
February 13th, 2007 03:50 AM
--NIST has contest to replace SHA-1--