dcsimg

Search:

Type: Posts; User: AngelofRevenge; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.01 seconds.

  1. Replies
    22
    Views
    2,511

    Okay

    Thanks eveyone for that, my main security consideration is cryptography, that's where I seem to excel in. I find that the contents of drive should be encrypted in a business situation to prevent...
  2. Replies
    9
    Views
    6,346

    Implimentation

    How can such a system be implimented?

    It would be useful, as it could help configure networks.
  3. Replies
    5
    Views
    985

    Problem

    I think the problem is in the OE 6 software, where it is I don't know, I think clean the computer up completely and see what happens.
  4. Replies
    6
    Views
    1,887

    Kudos

    You still wrote it, which is more than I can do
  5. Replies
    1
    Views
    609

    haha

    that's good stuff, go to www.eviloverlord.com because that list is also very funny.
  6. Replies
    4
    Views
    3,095

    Hmm

    Gump

    what you say certainly has clarified the situation, but 128 bit encryption is not a viable option, do not have the formal training, but an interest in Cryptography, and am able to brute...
  7. Replies
    0
    Views
    543

    Calling all crypies

    hello

    Any one out there who is really interested in Cryptography etc?
  8. Replies
    16
    Views
    3,066

    DNS

    Could a DNS server help send the message?
  9. Replies
    16
    Views
    3,066

    InterNetsend

    I study networking like you and am not aware of any such program, popups are ad's written into a web pages script, and they can be blocked, eg Norton Security. 'll see if I can find a program similar...
  10. Replies
    6
    Views
    1,887

    Game

    Hey

    at leat you wrote this, even if it's got bugs galore (win 98ish) you stil wrote it, which is more than I can do.
  11. Replies
    2
    Views
    1,189

    Go forth

    you should go forth and write this program, it will be invaluable to future network administrators.
  12. Replies
    5
    Views
    985

    options

    is it posible to reinstall those components by themselves, otherwise i recomend a complete reinstall after a format, then updating antivirus software and or firewalling the network.
  13. Replies
    4
    Views
    1,612

    Windows

    I've got some Win 98 SE to sell, but I'm in Australia, sorry.
  14. Replies
    22
    Views
    2,511

    Security

    I believe the question is wrong, what you need to know is that encryption protects data, not FAT32 or anything else.

    Any way security issues Microsoft never fix.
  15. Replies
    9
    Views
    1,913

    Rates

    I presume the charge is for line hire, but what type of line I don't know?

    If given extra info I could hep out more.
  16. Replies
    7
    Views
    5,053

    What?

    I would like to know how securityfocus responded and what is the ultimate goal, elminate the shell weakness?
  17. Replies
    11
    Views
    2,532

    Cisco Products

    communication of that type is easy to access, use a packet sniffer, like a port sniffer, except reads packets.
  18. Message

    I can't be much help as I am only familar with Cisco products, and I wrote a firewall so I could do stuff like that.
  19. Replies
    4
    Views
    1,467

    Encryption

    Go to the RSA Laboratories web page because a business will require a secure file storage system, and RSA is almost unbreakable.
  20. Replies
    22
    Views
    3,351

    Ethics?

    Trace and locate without illegal activities
  21. Replies
    10
    Views
    2,149

    Keyloggers

    Do you have a specific Keylogger program?

    If so whch one and how are the logs accessed?
  22. Replies
    4
    Views
    3,095

    Security

    The security of the communications iss my concern in this area. The use of RSA and similar encryption would be a secure system to use, however these signals could be intercepted, and with enought...
  23. Replies
    7
    Views
    2,713

    verification

    Do you want true verification?

    Try a code phrase only that person would know.
  24. Replies
    14
    Views
    1,820

    What to do

    What to do? I think you should get a router/ hardware firewall and configure it properly. Make sure the details are only possessed by you though.
  25. Security

    The firewall should have some configuration options which should allow outbound traffic through, eg net surfing, while preventing external access.
Results 1 to 25 of 28
Page 1 of 2 1 2