Type: Posts; User: golam; Keyword(s):
Search took 0.01 seconds.
November 26th, 2004, 02:25 AM
The other problem with tracing IP addresses is that if the person is up to no good, then they are probably operating from a compromised computer and not their own. In this case it is almost...
November 25th, 2004, 05:34 AM
If you run a Google on the subject you will see that a bill was passed in the US to mandate that all cell companies must be able to locate anyone making a 911 call.
You will also see that many cell...
December 31st, 2003, 02:58 AM
Spam filtering applications are also a good way to go for a medium to large business, or check with your ISP (if you use one) as many ISP's now provide spam filtering.
Some applications to look at...
August 27th, 2003, 02:57 AM
You need to have the domain admin of each company add your laptop to their domain.
Once an account for your laptop in each domain has been created, you should see the 3 options in the login...
August 27th, 2003, 02:21 AM
I would go with the Zone Alarm group - used it for several years and is great as long as you turn off notifaction as suggested by ame1usn
August 27th, 2003, 02:17 AM
From memory this is not possible as the PC registers with the domain controll or active directory server for authentication. You would have access to other domains if a trust has been set up between...
August 26th, 2003, 12:37 AM
First off, there are a lot of reasons that you may not be able to access the hard drives.
Can other PCs access other drives on machines connected to the hub?
Can other PCs access drives on the...
August 22nd, 2003, 05:31 AM
No worries - its been fun
August 22nd, 2003, 04:52 AM
phishphreek80 - great paranoids think alike
August 22nd, 2003, 04:47 AM
Also with respect, what you say about PAT is indeed true if you are using the device to hide many users accessing the Internet from an internal source out on one public IP address. This is how the...
August 22nd, 2003, 04:33 AM
If you really want to be secure, run either of the software firewalls on your system (I prefer ZA, and have used it for years) then buy a NATing router like the Linksys BEFSR81 or similar and run...
August 22nd, 2003, 01:38 AM
I am not an expert at this but I have my Outlook client setup to do both - connect to internal mail server when at work and connect to my ISP for external mail outside.
In the client select Tools...
August 22nd, 2003, 12:34 AM
Sounds like you have a reasonably protected connection arthurking. The best test is to go to another connection point on the net (at a friend's house for example) and run a scan from there. I don't...
August 21st, 2003, 06:44 AM
I've always used Zone Alarm and found it to be great.
There is a free version and a Pro version which costs around US$40
August 21st, 2003, 06:17 AM
Very true merrimand, unless that address is the "external" address of a firewall or address translating router. Then you would not see the inside address as it will be changed on the outbound leg by...
August 21st, 2003, 03:28 AM
If you know the internal IP ranges of a company it is easy enough to craft an IP packet to access an internal resource, using the router as a gateway.
Part of a true hackers task (not script...
August 20th, 2003, 07:55 AM
If you selected to do a fresh install when you re-installed Windows (not a repair), and you agreed to install it in the same default partition (c:\winnt) then you may have problems re-claiming your...
August 20th, 2003, 07:45 AM
There is heaps of info on the web for this ....try searching for Hayes modem AT command set
Depending on the type of modem you are using (or emulator) you will need to...
August 20th, 2003, 07:20 AM
Another great product is nessus www.nessus.org
The product only runs on versions of *nix but has good support, is open software, and is free.
There are lots of support info on the WWW, and...
I have just been evaluating Retina and have found it to be an excellent vulnerability scanner, however it is not cheap.
Check out the site http://www.eEye.com
Check this out..its fairly good ;)
It is very easy to "join" a website using some one else's details, or even totally fictitious details. (Unless credit card details are required, and even that can be achieved)
At a previous...
I agree with T2K2 :) many proxy servers will increase you access and download times if the pages you are trying to access are held in the proxies' cache. Many ISPs run caching servers as part of the...
In the past I have always found it easier to have two boxes, one as the master (if you like) and the other which you can experiment on. If you have access to Ghost or a program simalar it makes...
You are quite correct a cross over cable between two PCs that both have ethernet ports will work. You will need to configure the network connection on each PC with an IP address (that is different)...