Search:

Type: Posts; User: spirovski.b; Keyword(s):

Search: Search took 0.04 seconds.

  1. Replies
    14
    Views
    8,362

    It may improve things, but there is a caveat: In...

    It may improve things, but there is a caveat: In the particular case of Citibank - if you've read the article in Wired, Citibank DENIES that actual PIN theft happened from their systems. According to...
  2. Replies
    11
    Views
    19,166

    Not that I'm defending BT...but WEP security is...

    Not that I'm defending BT...but WEP security is in the default instruction set for configuration set delivered with the devices. I have seen this also in telco operators all over Eastern Europe. The...
  3. Replies
    11
    Views
    10,685

    First take - didn't have too much time to play...

    First take - didn't have too much time to play around
    1. Install passed without a glitch
    2. For some reason, the Google toolbar failed, i uninstalled it. Still didn't reinstall
    3. Renders pages...
  4. Replies
    11
    Views
    10,685

    Firefox 3 final version - Experiences

    I am just creating a container post for all readers to include their comments on the new Firefox 3
    I'll be downloading it today (still isn't available) and will post comments tommorow
  5. Canadian Bill C-61 - Another DMCA with a lot of problems

    Last week Bill C-61 was introduced in the Canadian parliament. Supposedly it protects digital media from copyright infringement.

    To be clear, it's a bit better then US DMCA. The danger in C-61 is...
  6. Replies
    4
    Views
    29,235

    ITILv3 Foundations Training

    Last week I attended the official IT Service Management (ITILv3) Foundations training.
    The training is a 3 day boot camp, which covers the processes in the following ITIL areas

    Service Strategy...
  7. Preventing Online Credit Card Theft - Revisited

    Online Credit Card Theft is a very old and frequently discussed topic. And yet, a lot of people in the world are still victims to credit card theft. So, in a brief morning post, here are several...
  8. Replies
    19
    Views
    21,320

    nihil is quite right. You mustn't approach this...

    nihil is quite right. You mustn't approach this purely as a hack, it's actual crime. Immediately inform paypal and authorities. A good computer crime division will send expert forensic team to...
  9. Replies
    0
    Views
    4,685

    Check Your DNS Zone Transfer Status

    The DNS service is a very low maintenance. The downside of such ease of use means that the DNS server is often forgotten by the admins, and DNS security can be lacking.

    The easiest attack that can...
  10. Thread: backtrack2

    by spirovski.b
    Replies
    5
    Views
    6,792

    I am using BT2 for a while now, but i find it...

    I am using BT2 for a while now, but i find it lacking and inconsistent at times...
    Can you suggest a newer/better alternative? Apparently BT3 is in planning, but i fear it's abandoned
  11. Replies
    2
    Views
    28,841

    Actually a very nice piece of information. My bet...

    Actually a very nice piece of information. My bet is that the next killer protocol will include autogenerated dummy listeners to confuse the RIAA hunters
  12. Replies
    14
    Views
    13,676

    Cider, be more specific. What is your planned...

    Cider, be more specific. What is your planned setup, so we can help you with the set-up
  13. Replies
    14
    Views
    13,676

    @Cider I've had a similar setup at home for...

    @Cider
    I've had a similar setup at home for years. I used to work for an ISP, so i tried to recreate the functionalities of an ISP at home for training and expertise.
    My suggestion would be to get...
  14. Replies
    8
    Views
    16,087

    When paranoid, i would go with wi-fi sniffer with...

    When paranoid, i would go with wi-fi sniffer with the wi-fi adapter in monitor mode (AKA promiscuous mode). I like wireshark and kismet, by to use them properly, you NEED to set your wi-fi adapter to...
  15. Replies
    13
    Views
    17,150

    n00bius, other board members. Here are the...

    n00bius, other board members. Here are the results of my test:
    The MS instructions are quite correct and works.
    http://technet2.microsoft.com/window....mspx?mfr=true

    I used a VMware to create...
  16. Replies
    8
    Views
    16,087

    @yellowcat - I'm truly amazed by the effort that...

    @yellowcat - I'm truly amazed by the effort that you are making to eavsedrop on other people's communications.

    If security is what you are trying to achieve, here's a link that I posted on home...
  17. Replies
    4
    Views
    32,454

    It will be a guideline standard, like iso 27002,...

    It will be a guideline standard, like iso 27002, which means that it will be a large paper telling you that you should do something but then again you may not want to, and it is best if you decide...
  18. Replies
    13
    Views
    17,150

    I seem to be missing the point... What are you...

    I seem to be missing the point...
    What are you trying to achieve here?
    If you have a surviving DC other then the failed one, the entire effort is moot (and a waste of time). Just install a fresh...
  19. Replies
    0
    Views
    4,243

    Glad to be here

    Hello everyone. A brief introduction to the users.
    My name is Spirovski Bozidar. I work in information security and I feel that i will benefit from the experiences of the readers and posters of the...
  20. Replies
    7
    Views
    6,106

    Mission nearly impossible Here is how the whois...

    Mission nearly impossible
    Here is how the whois databases work:
    The RIPE, AfriNIC, APNIC, ARIN, LACNIC databases keep information about the address of the company to whose Autonomous System (AS)...
Results 1 to 20 of 21