Type: Posts; User: unit321; Keyword(s):
Search took 0.02 seconds.
September 18th, 2004, 01:44 AM
start off installing these products:
Aol "free" trial
September 14th, 2004, 11:40 PM
"lobbying" means it isnt passed yet. Well, they LOBBIED for DMCA! Secondly, microsoft, apple, etc will pay for licenses for ipods etc to the RIAA/MPAA. Yes this is an issue. Here are some links:...
September 13th, 2004, 11:21 PM
RIAA and MPAA are lobbying to pass the INDUCE act which would outlaw these products: DVR's, TIVO, Betmax, CD burners, DVD burners, the VCR, the ipod, ALL MP3 PLAYERS, (possibly) windows media player,...
August 18th, 2004, 12:25 AM
im against a seperate forum for game discussion. If its game security (like a ut2004 exploit found) then it can go in misc. security forum
August 18th, 2004, 12:23 AM
a rss feed to syndicate the news would be good to, about the above suggestion, wouldnt that then be more of a blog?
August 18th, 2004, 12:21 AM
many of the ads on antionline are automaded and the admins/mods dont get much of a choice. Like most banner/ad services its probably pay per click/view, so you dont get much control. I dont see why...
August 16th, 2004, 06:31 PM
Im not saying this is a bad thing persay. It might not be for your corporate network, but it should be fine at home. Im not talking about the security of the application, im talking about the...
August 16th, 2004, 04:52 PM
According to seti@home (setiathome.berkeley.edu) they are switching to the boinc client/platform. Boinc is a distributed app, which allows you to participate in several projects at once, although i...
August 12th, 2004, 07:06 PM
The previous issue of 2600 (2600.com) has a article about hotel internet access. Interesting if you want to know about it.
August 7th, 2004, 04:18 PM
i have many "security" books. The unofficial guide to ethical hacking was as mentioned a cut and paste book, but if you have the money and time read it, its good for a start. The hackers black book...
August 7th, 2004, 04:13 PM
for all you people defending google about its policy, heres what happens. Ok, google isnt bad... comcast is, itll only lead to more. Besides its not like the US doesnt watch everybodies connection in...
August 4th, 2004, 04:58 AM
i reccomend setting up a full blown network sniffer that sniffs everything. etheral is great. Then after the attac you can sift through the packets.
August 4th, 2004, 04:54 AM
on the moral prespective, it would be intruding on peoples systems, but most likely they would have to execute an attachment through email or other forms, otherwise a hole in the OS could be...
August 3rd, 2004, 11:23 AM
thats not quite what i was talking about......... ive got access to plenty of viruses allready thanks. Is pacman a replicating virus? if so my idea could be but into practice. after some reverse...
August 3rd, 2004, 11:03 AM
Pacman isnt the technical term, i dont know what it, but heres what im talking about. Im talkking about a `virus` that circulates for the SOLE purpose of destroying a specific virus probably...
August 3rd, 2004, 10:57 AM
its only displaying one ip because thats the last proxy you routed through. to see what machines your connection goes through go to command prompt (may be under start>programs>ascessories is called...
August 3rd, 2004, 10:54 AM
the http brute forcer is nothing 2 worry about. The program is fine,@and you can dos yourself if you want... hehe snicker. As the article states on their site somebody DOSed the RIAA site, rock on...
July 23rd, 2004, 03:18 AM
i use gaim located at gaim.soundforge.net i have not experienced problems using it with AIM.
July 14th, 2004, 06:59 AM
July 10th, 2004, 07:47 AM
i could post a tutorial on protecting your identity, but i thought i would post on one on using proxies, because of the large amount of people i see wondering what they are, how to use one etc.
July 10th, 2004, 07:25 AM
im not saying that proxies give complete anonymity, im just saying they help. The traffic between you and your ISP would be pretty useless, if whoever wants to see your info doesnt know your isp, it...
July 10th, 2004, 07:20 AM
Many people are asking about wingates, proxies, ip banning etc. I hope this manual clears up a few questions.
What is a proxy?
A proxy is another computer which you can route through on a...
June 30th, 2004, 02:53 AM
proxyrama checks for socks5,socks4,http,anonymity/elite,connect,and wingate. I use it a lot and i can chain about 20 proxies. Also be sure you enable remote log poisoning. The problem with the...
June 29th, 2004, 09:24 AM
i use proxyrama for proxies, but it also verifies wingates. I suggest a time-out of 1-500 depending on your connection, dedicate all ur system rescources to verifying. I have attached a list of...
June 17th, 2004, 03:15 AM
there are (reportedly by the EFF) 60 MILLION p2p users... why wouldnt they sign this petition?