March 28th, 2006, 09:41 PM
Not alot you can do from a legal perspective. No one forces ISPs, users, corporations, or anyone to use these lists. He has posted that it is a use "as is" list and accepts no liability for the...
January 1st, 2004, 09:49 AM
One caviot - you will start getting log messages stating that you have exceeded your licensing if you do not use the correct CAL on your system. Your system will still work - but it can be annoying...
January 1st, 2004, 12:16 AM
Besides the ethical reasons of running a P2P network - there are at least three known vulnerabilities for Kazaa:
There is a known denial of service associated with the adds that Kazaa serves
...
December 29th, 2003, 09:48 PM
You could try something this (This will write to standard output):
#!/bin/sh
while true
do
ps -ef | grep --silent <string you are looking for> | grep -v grep
if [ "$?" = 0 ]; then
echo...
January 18th, 2002, 09:49 PM
I have to agree with both of you to a certain extent. In my humble opinion, and in my experience, Social Engineering is a part of hacking. It is not technical, it is lying, and it is manipulation -...
January 10th, 2002, 11:18 PM
[QUOTE]Originally posted by nietzsche
I know this is just a rehash ... but it seems boggling to me that you can have a random hash of data and have *any* significant compression. As far as I know,...
January 10th, 2002, 08:52 PM
Hey Korp -
Basically what you are saying is you have the firewall running in bridging mode (sort of like a router) if I remember my sunscreen configs. If you have done all the OS hardening, and...
December 27th, 2001, 09:19 PM
What are you looking for in a firewall?
Are you simply looking for a personal firewall, or are you looking for a network firewall, to perform perimeter defense?
When you say "compatible with...