Search:

Type: Posts; User: Neorage; Keyword(s):

Search: Search took 0.02 seconds.

  1. Replies
    5
    Views
    5,551

    How do Heuritic Scanners Work?

    Any idea how heuristic scanners work? I read a lot about how how the infected file is put in a "sandbox" and is checked for any activity...Wat exactly takes place??And secondly...is this really...
  2. Replies
    40
    Views
    26,228

    in d last comment i meant u'r admin will NOT be...

    in d last comment i meant u'r admin will NOT be able 2 trace u dat easily....
    chill
  3. Replies
    40
    Views
    26,228

    Contrary to the above commentz i don't think u'r...

    Contrary to the above commentz i don't think u'r admin will be able to track u that easily.
    You said that u use a notebook with the option of obtain ip automatically...
    Now along with u'r ip if u...
  4. Replies
    2
    Views
    5,566

    Tunneling Proxy

    Hey Guyz...
    I got 2 connect via my company's proxy...
    Itz running Squid on linux...
    it has disabled all portz xcept 8080...
    it has only https proxy enabled...
    now stuff like Kazaa and Mirc can...
  5. Replies
    2
    Views
    5,141

    Connecting via Proxy server

    I connect to the internet through a linux based proxy server "Squid" on my network which needs authentication. As a result, Yahoo messenger, Msn Messenger,irc etc. don't work. How do i work aroung...
Results 1 to 5 of 5