Search:
Type: Posts; User: cire; Keyword(s):
Search:
Search took 0.03 seconds.
-
December 23rd, 2003, 09:17 PM
you should also check to see if there are any hardware key loggers and remove them if there is one. they are little electronic devices that go in between the keyboard cord and the computer's ps/2...
-
December 14th, 2003, 09:19 PM
there is a similar program called tripwire. it checks the integrity of files. more information about it can be found at http://www.tripwire.org/
hope this helped.
-
December 5th, 2003, 12:54 AM
it is also easier (in my opinion) to use chmod without the numbers but with u(ser), g(roup), o(ther), a(ll), +, -, r(ead), w(rite), and (e)x(ecute). For example, to add execution permissions to...
-
November 29th, 2003, 06:05 PM
the website has a history of its name at http://www.cotse.com/story.htm
-
November 27th, 2003, 02:20 AM
i use it and like it alot. it is extremely widely used and have not heard of any vulnerabilities in it.
-
November 18th, 2003, 11:21 PM
if you know the file extension than you can usually determine what language it is written in. ie. *.c is c, *.cpp is c++, *.java is java, *.pl is perl, *.sh is a bash shell script
-
October 26th, 2003, 05:10 PM
just use sockets (winsock in windows, all those libraries in *nix) to connect to the server and read in the webpage. this is an extremely easy program to write if you are familiar with socket...
-
September 28th, 2003, 04:59 PM
That article makes it sound like the malicious web page downloads a program to your computer. This is not true, atleast for the AIM vulnerability that many people I know have been hit with. What...
-
September 21st, 2003, 05:44 PM
you will have to learn socket programming to do this. if you are writing this program for windows then you should look into the winsock library, if this is for *nix then i would really recommend you...
-
September 3rd, 2003, 02:41 AM
you could also just replace router2 with a switch or hub
-
August 21st, 2003, 07:29 PM
...who run they're own webservers use default ports for daemons like ftp, ssh, etc? it would make more sense to me for them to use different ports so if some script kiddie is scanning a subnet for a...
-
August 16th, 2003, 11:08 PM
don't forget about ettercap for sniffing on switched networks, they have a windows version.
-
August 10th, 2003, 03:18 AM
it worked for me too but for future reference pinging a computer and getting a reply does not mean that it is running a webserver, it just means that it is online and responding to pings. to ensure...
-
August 9th, 2003, 04:06 AM
im not too familiar with cable but maybe you forgot to configure your network for your ISPs DNS servers.
-
August 7th, 2003, 06:28 PM
i don't think this is the issue with you because the 2 sizes are pretty close but there is a prefix conflict with hard drive, memory, operating system, etc. companies. with computers, prefixes like...
-
July 27th, 2003, 09:46 PM
yes, just watch how many packages you install so you can have some free space. for linux isos and burning instructions i highly recommend going to www.linuxiso.org
-
is it possible for the admin account on Win2k to grant a regular (power) user admin access only a specific program? if so, how can this be done? thanks.
-
June 17th, 2003, 02:40 PM
Nice post, heres some more.
11. In order to hack/be a hacker, you need to use *nix- while most unix/linux distrobutions come with many more programs and commands for internet security (nmap,...
-
you have the situation right networker. i will look into what you said. thanks.
-
in my house I have a small network of three windows computers to share files and internet. two of the computers, computers a and b, are on the same floor and are connected via a switch. the third...
-
I hope this is the right forum for this question, sorry if it isn't. I need to write a report for school and need to know when the internet became widely used by the public. I know this is sort of...
-
This tutorial gives the basics of Object Oriented Programming (OOP) in
C++. In programming, an object is used to group related data. In C++
this is done through classes. This tutorial assumes...
-
I thought that packets that were not meant for your machine could not be sniffed on a switched network. It was my impression that that is the advnatage of a switch over a hub. Please correct me.
-
i found out the hard way yesterday that you can get in serious trouble for even using a program that you have access to. on my school network you are not supposed to access DOS but using a batch...
-
by modular math i believe hes talking about the % operator. it returns the remainder given two numbers, ie 10%4 is 2 and 100%10 is 0. as for how it can be used for a fast encryption system, i dont...
|
|