Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: tatui; Keyword(s):

Page 1 of 4 1 2 3 4

Search: Search took 0.03 seconds.

  1. Replies
    29
    Views
    3,515

    An updated antivirus may be useful, since they...

    An updated antivirus may be useful, since they detect such programs.. There are also programs aimed to remove and detect keyloggers. Try them.

    While you dont fetch a brand new antilogger...
  2. Replies
    13
    Views
    1,151

    Scanning for a small set of ports, as well as...

    Scanning for a small set of ports, as well as having a large time gap between scans is also a measure to avoid being blocked by IDS. The idea is being stealth, isnt it? You may need some more effort...
  3. Replies
    5
    Views
    589

    Slarty, you may use ulimit. (i think it's a shell...

    Slarty, you may use ulimit. (i think it's a shell built-in :D.
    ulimit -u 20
    ulimit -n 50
    Would allow the user to create 20 processes and open 50 files. There are plenty of options, check man...
  4. Replies
    20
    Views
    4,501

    Answer to Ma_purol: Well, after all these...

    Answer to Ma_purol: Well, after all these answers, I don't think I have a lot to say. What I would suggest is that you check your computer for running services you don't need (how to do it will...
  5. Replies
    1
    Views
    518

    Indeed, it is really useful :). The IETF working...

    Indeed, it is really useful :). The IETF working groups are developing them, so it's no wonder we would use RFCs as sources for info on protocols.. :D . Anyway, unless you have the RFC number, a...
  6. Thread: Vim

    by tatui
    Replies
    3
    Views
    1,037

    www.vim.org , check documentation and download...

    www.vim.org , check documentation and download the vimbook :) . You can use vimtutor as well, and you will find an user guide at /usr/doc/vim or something like this. Anyway, something to help you...
  7. Replies
    21
    Views
    1,793

    View Post

    I canīt write about tools I use at work just because I donīt have this kind of job (no job at all, probably changin in a couple of months). So, I will just mention 3 tools I am very fond of:
    1)...
  8. Replies
    11
    Views
    977

    One option would be 1st page, really handy...

    One option would be 1st page, really handy because you can just use buttons to insert tags, while still having control on the tags used. And my other option, since I am not a table fan, is using Vim...
  9. Replies
    15
    Views
    2,020

    Based on all above, make sure she will change the...

    Based on all above, make sure she will change the password from another computer, better yet, connected through another ISP. This will allow you (and her) to relax a bit while checking for malware...
  10. Replies
    10
    Views
    1,312

    As already said before, these aggressive...

    As already said before, these aggressive countermeasures may harm innocent people, and might also warn them that you are aware of the attack. There are cases (example, honeypots) where you want to...
  11. Thread: Winbackup.

    by tatui
    Replies
    1
    Views
    1,013

    Liked the interface ;) . The encryption feature...

    Liked the interface ;) . The encryption feature seems quite handy as well. I could do with some testing soon, it seems to deserve the 4 stars award.
  12. Replies
    5
    Views
    2,519

    View Post

    doxical:: Thereīs a way to do it, quite easy. Use the (surprise) base64 program
    http://www.fourmilab.ch/webtools/base64/
    Thereīs a link to an *nix version and a windows one.
  13. Replies
    12
    Views
    1,198

    Apart from the VB vs C affairs that might appear,...

    Apart from the VB vs C affairs that might appear, I think you should learn something that gives you freedom of choice, and doesn't bind you to a specific operating system (btw, vb is a bit expensive...
  14. Replies
    5
    Views
    1,095

    View Post

    The best way to massage a crackerīs, kiddieīs whateverīs ego is calling them hacker. Perhaps we could use: A moron, a dork, a loser, and so on.. :D .
    Damn, access to milions of cc is really scary.
  15. Replies
    20
    Views
    1,361

    AFAIK (i am not a satanist, and not into it, so I...

    AFAIK (i am not a satanist, and not into it, so I canīt say much), there are two "satanisms". A group believes that there is the devil portraited in the bible, and that they must worship him. And...
  16. Thread: Ao Irc???

    by tatui
    Replies
    6
    Views
    812

    Once you have installed an irc client (mirc,...

    Once you have installed an irc client (mirc, klient, kvirc, bitchx, xchat whatever), and configured your nick (you may use /nick nickyouwant )
    type:
    /server irc.antionline.com
    and Bingo!
  17. Thread: what trojan?

    by tatui
    Replies
    5
    Views
    1,173

    hatebreed2000, you are better off with a firewall...

    hatebreed2000, you are better off with a firewall or a firewall/local ids (Oh, program X wants to run this: alow?), like latest versions of tiny and kerio. Well, supposing itīs a trojan like netbus,...
  18. Thread: Acces over LAN ?

    by tatui
    Replies
    7
    Views
    605

    slewrate, there's a post from phishphreek80...

    slewrate, there's a post from phishphreek80 linking to this arcticle: http://www.antionline.com/showthread.php?s=&postid=600309
    credits to him for finding it :)
    There's something you might be aware...
  19. Indeed, a great service. You may learn a lot, and...

    Indeed, a great service. You may learn a lot, and use several *nix tools that wouldn't be available to you otherwise (in case you cant install any *nix version). I don't know if they allow you to...
  20. Thread: Buffer Overflows

    by tatui
    Replies
    4
    Views
    913

    Hmm.. the text from Aleph1, "Smashing the stack...

    Hmm.. the text from Aleph1, "Smashing the stack for fun and profit", has some examples as well, and I found some buggy example code in a page, but it is in portuguese. I will paste some examples...
  21. Replies
    5
    Views
    527

    Lol.. I do like vi, though. At least vim. damn, i...

    Lol.. I do like vi, though. At least vim. damn, i am not leet! And my first experience, I must confess, was a bit like this.. "how do i quit it?!" hehe..
    Back to our IE, I noticed that there are...
  22. Replies
    1
    Views
    708

    hmm I know you can do it with CD, by placing a...

    hmm I know you can do it with CD, by placing a file called autorun.inf in the root directory. You could get an autostart CD and check how it is made. If you burn a cd, its the only thing you will...
  23. Replies
    5
    Views
    527

    *Cough*....

    *Cough*. http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=Internet+Explorer
  24. Replies
    25
    Views
    1,781

    Well, it might be quite hard to be sure that the...

    Well, it might be quite hard to be sure that the intruder didn't do anything. Ok, he/she said so, but would you believe? To be sure, you will need to do an extensive check (and costly), and very...
  25. Thread: IM security risk

    by tatui
    Replies
    11
    Views
    2,364

    There is also icq2go.. wich runs in your browser....

    There is also icq2go.. wich runs in your browser. Indeed, they might be a security issue. Anyway, there are some ways you can stop your nice employees that think they will get away with it.. proxies,...
Results 1 to 25 of 88
Page 1 of 4 1 2 3 4

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides