dcsimg

Search:

Type: Posts; User: Neorage; Keyword(s):

Search: Search took 0.01 seconds.

  1. Replies
    5
    Views
    1,305

    How do Heuritic Scanners Work?

    Any idea how heuristic scanners work? I read a lot about how how the infected file is put in a "sandbox" and is checked for any activity...Wat exactly takes place??And secondly...is this really...
  2. Replies
    40
    Views
    5,158

    in d last comment i meant u'r admin will NOT be...

    in d last comment i meant u'r admin will NOT be able 2 trace u dat easily....
    chill
  3. Replies
    40
    Views
    5,158

    Contrary to the above commentz i don't think u'r...

    Contrary to the above commentz i don't think u'r admin will be able to track u that easily.
    You said that u use a notebook with the option of obtain ip automatically...
    Now along with u'r ip if u...
  4. Replies
    2
    Views
    970

    Tunneling Proxy

    Hey Guyz...
    I got 2 connect via my company's proxy...
    Itz running Squid on linux...
    it has disabled all portz xcept 8080...
    it has only https proxy enabled...
    now stuff like Kazaa and Mirc can...
  5. Replies
    2
    Views
    1,712

    Connecting via Proxy server

    I connect to the internet through a linux based proxy server "Squid" on my network which needs authentication. As a result, Yahoo messenger, Msn Messenger,irc etc. don't work. How do i work aroung...
Results 1 to 5 of 5