Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: br_fusion; Keyword(s):

Page 1 of 7 1 2 3 4

Search: Search took 0.03 seconds.

  1. Any good information gathering utilities?

    My boss has asked me to find a good command line utility that will query remote computers and find basic information about them. He is looking for hardware, software, network information(shares). ...
  2. Replies
    17
    Views
    1,316

    We have a linksys router at our apartment and...

    We have a linksys router at our apartment and every week or so we have to reset it because it freezes up. Cheap routers and especially Wireless routers never work the way they should.

    I always...
  3. Replies
    15
    Views
    1,195

    Maybe the WoW servers detect duplicate connecting...

    Maybe the WoW servers detect duplicate connecting IPs and deny the connection? Back when I was in the dorm duplicate IPs were common since everyone was being Source NATed with the same public IP. ...
  4. Replies
    26
    Views
    2,360

    I work for tech support at a college university. ...

    I work for tech support at a college university. I support the administration PCs on campus day in and day out. Amoung the other employees, I have the record for the most spyware found on a PC.
    ...
  5. Replies
    12
    Views
    2,751

    Well if it is indeed your file.... Try moving...

    Well if it is indeed your file....

    Try moving the file that is encrypted with EFS, I assume its located on a NTFS partition, and move it over to a FAT32 partition.

    Since FAT32 doesn't support...
  6. Replies
    4
    Views
    1,158

    This is pertaining to linux, but if this WinXp...

    This is pertaining to linux, but if this WinXp machine had cygwin or similar, you could try using ssh.

    Create a ssh tunnel from behind the firewall to the outside system.
    "ssh -v -R...
  7. Replies
    10
    Views
    5,407

    At your borderline routers/firewalls, I would try...

    At your borderline routers/firewalls, I would try filtering out any outbound proxy connections. Some common proxy ports are:
    81,8080,1080,3128,6588

    So this:...
  8. Replies
    17
    Views
    2,531

    Would it make sense to say that the longer the...

    Would it make sense to say that the longer the encrypted text produced by a polyalphabetic cipher, the easier it is to discover the original text? Especially if the keyword that produces the...
  9. Replies
    12
    Views
    2,228

    Ive also had problems with Superscan, mainly...

    Ive also had problems with Superscan, mainly versions before the latest. For each scan several ports would appear open when they weren't. Also I don't think SuperScan scans UDP ports...

    For...
  10. Replies
    35
    Views
    3,014

    Last time I checked, Microsoft is always being...

    Last time I checked, Microsoft is always being sued...
  11. Replies
    10
    Views
    2,886

    You might want to try sentinel or sniffdet. ...

    You might want to try sentinel or sniffdet. These programs are meant to detect any promiscuous cards on a network.

    Good luck
  12. Replies
    2
    Views
    1,237

    Nice! I was having this problem on my RedHat 9...

    Nice! I was having this problem on my RedHat 9 system.
  13. Replies
    4
    Views
    696

    From what I know I dont think you can properly...

    From what I know I dont think you can properly bind ftpd to localhost, lo. You probably will have to set up some form of ACL's.

    Besides using tcpwrappers, have you tried looking at...
  14. Replies
    32
    Views
    3,242

    Poll: I'm sure the guy from symantec is going to want...

    I'm sure the guy from symantec is going to want to seem paranoid to the public, making it look necessary to buy the latest and best anti-virus/security software! Even if this has nothing to do with...
  15. I would like to know the same thing. I get the...

    I would like to know the same thing. I get the same problem when Norton2002 detects a virus but can not remove it. How lame is that. Either way I can either just delete it myself or I have to...
  16. Thread: Proxies

    by br_fusion
    Replies
    38
    Views
    55,253

    Even IF DCS1000 put a stop to proxies, only...

    Even IF DCS1000 put a stop to proxies, only higher authority has access to its contents. Someone correct me if I'm wrong. So the average joe would be stuck searching through the trail of proxies...
  17. Here is a question for anyone who knows. In...

    Here is a question for anyone who knows. In IronGeeks nice presentation he mentioned Protected Storage. Now is Protected Storage the same thing as LSA(Local Security Authority) Secrets? Which are...
  18. The only problem with Cain&Abel is that it does...

    The only problem with Cain&Abel is that it does not recognize CacheDump's format. In order to crack mscash hashes, you must run Cain&Abel from the target machine and import them from within...
  19. Replies
    5
    Views
    877

    I bet the horse13 knows a thing or two. As for...

    I bet the horse13 knows a thing or two.

    As for me, Ive played it with. It works well for most windows machines. However Ive tried running a few idlescans on two of my local linux machines, and...
  20. Replies
    18
    Views
    2,408

    Personally, I hate ZoneAlarm. The problem I was...

    Personally, I hate ZoneAlarm. The problem I was having, along with everyone else I know, is that when you disable ZoneAlarm's Firewall capablities, it still continues to block services. Even after...
  21. Replies
    54
    Views
    3,397

    I would just like to wish you the best of luck,...

    I would just like to wish you the best of luck, because from my past experiences and others, your heading down a tough but good road.

    Highschool = two things

    When in your position, there are a...
  22. Replies
    7
    Views
    1,571

    The only 2 scanners that I'm aware of that...

    The only 2 scanners that I'm aware of that attempt to ping hosts before scans are nmap and scanline(windows). Of course it doesn't ping the port because this isn't possible, but it does ping the...
  23. Replies
    7
    Views
    2,057

    Or if you are the reading inclined, here is a...

    Or if you are the reading inclined, here is a neat flash video that can get you started with using Nessus, however it doesnt give much insight on the dozens of commands for nessus. Thats where...
  24. Replies
    26
    Views
    1,691

    When will you learn, I told you to read a little...

    When will you learn, I told you to read a little closer before posting.

    "Before I continue, I found out that this isn't used to log and track students, it is just to insure that the public can not...
  25. Replies
    26
    Views
    1,691

    First off, I think you guys are lying if you tell...

    First off, I think you guys are lying if you tell me you have never crossed the line (even if it was just for one minute of your life) in order to find something out or to learn something new.

    As...
Results 1 to 25 of 169
Page 1 of 7 1 2 3 4

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides