Type: Posts; User: tatui; Keyword(s):
Search took 0.01 seconds.
March 18th, 2004, 09:21 AM
An updated antivirus may be useful, since they detect such programs.. There are also programs aimed to remove and detect keyloggers. Try them.
While you dont fetch a brand new antilogger...
November 12th, 2003, 07:32 PM
Scanning for a small set of ports, as well as having a large time gap between scans is also a measure to avoid being blocked by IDS. The idea is being stealth, isnt it? You may need some more effort...
April 15th, 2003, 11:22 PM
Slarty, you may use ulimit. (i think it's a shell built-in :D.
ulimit -u 20
ulimit -n 50
Would allow the user to create 20 processes and open 50 files. There are plenty of options, check man...
April 1st, 2003, 05:01 PM
Answer to Ma_purol: Well, after all these answers, I don't think I have a lot to say. What I would suggest is that you check your computer for running services you don't need (how to do it will...
April 1st, 2003, 04:24 PM
Indeed, it is really useful :). The IETF working groups are developing them, so it's no wonder we would use RFCs as sources for info on protocols.. :D . Anyway, unless you have the RFC number, a...
March 8th, 2003, 08:04 PM
www.vim.org , check documentation and download the vimbook :) . You can use vimtutor as well, and you will find an user guide at /usr/doc/vim or something like this. Anyway, something to help you...
March 8th, 2003, 08:18 AM
I canīt write about tools I use at work just because I donīt have this kind of job (no job at all, probably changin in a couple of months). So, I will just mention 3 tools I am very fond of:
March 6th, 2003, 12:37 AM
One option would be 1st page, really handy because you can just use buttons to insert tags, while still having control on the tags used. And my other option, since I am not a table fan, is using Vim...
March 6th, 2003, 12:27 AM
Based on all above, make sure she will change the password from another computer, better yet, connected through another ISP. This will allow you (and her) to relax a bit while checking for malware...
March 5th, 2003, 01:23 AM
As already said before, these aggressive countermeasures may harm innocent people, and might also warn them that you are aware of the attack. There are cases (example, honeypots) where you want to...
March 3rd, 2003, 02:18 AM
Liked the interface ;) . The encryption feature seems quite handy as well. I could do with some testing soon, it seems to deserve the 4 stars award.
February 26th, 2003, 06:55 PM
doxical:: Thereīs a way to do it, quite easy. Use the (surprise) base64 program
Thereīs a link to an *nix version and a windows one.
February 24th, 2003, 11:38 PM
Apart from the VB vs C affairs that might appear, I think you should learn something that gives you freedom of choice, and doesn't bind you to a specific operating system (btw, vb is a bit expensive...
February 18th, 2003, 08:27 AM
The best way to massage a crackerīs, kiddieīs whateverīs ego is calling them hacker. Perhaps we could use: A moron, a dork, a loser, and so on.. :D .
Damn, access to milions of cc is really scary.
February 18th, 2003, 08:19 AM
AFAIK (i am not a satanist, and not into it, so I canīt say much), there are two "satanisms". A group believes that there is the devil portraited in the bible, and that they must worship him. And...
February 15th, 2003, 07:05 PM
Once you have installed an irc client (mirc, klient, kvirc, bitchx, xchat whatever), and configured your nick (you may use /nick nickyouwant )
February 15th, 2003, 08:30 AM
hatebreed2000, you are better off with a firewall or a firewall/local ids (Oh, program X wants to run this: alow?), like latest versions of tiny and kerio. Well, supposing itīs a trojan like netbus,...
February 8th, 2003, 12:40 AM
slewrate, there's a post from phishphreek80 linking to this arcticle: http://www.antionline.com/showthread.php?s=&postid=600309
credits to him for finding it :)
There's something you might be aware...
February 7th, 2003, 11:15 PM
Indeed, a great service. You may learn a lot, and use several *nix tools that wouldn't be available to you otherwise (in case you cant install any *nix version). I don't know if they allow you to...
February 7th, 2003, 10:44 PM
Hmm.. the text from Aleph1, "Smashing the stack for fun and profit", has some examples as well, and I found some buggy example code in a page, but it is in portuguese. I will paste some examples...
February 6th, 2003, 10:54 PM
Lol.. I do like vi, though. At least vim. damn, i am not leet! And my first experience, I must confess, was a bit like this.. "how do i quit it?!" hehe..
Back to our IE, I noticed that there are...
February 6th, 2003, 10:31 PM
hmm I know you can do it with CD, by placing a file called autorun.inf in the root directory. You could get an autostart CD and check how it is made. If you burn a cd, its the only thing you will...
February 6th, 2003, 09:45 PM
February 6th, 2003, 08:08 PM
Well, it might be quite hard to be sure that the intruder didn't do anything. Ok, he/she said so, but would you believe? To be sure, you will need to do an extensive check (and costly), and very...
February 6th, 2003, 04:25 PM
There is also icq2go.. wich runs in your browser. Indeed, they might be a security issue. Anyway, there are some ways you can stop your nice employees that think they will get away with it.. proxies,...