Search:
Type: Posts; User: neosamurai; Keyword(s):
Search:
Search took 0.03 seconds.
-
August 27th, 2005, 05:15 AM
Most likely the type of network would be a Lan. The school probably subscribes to
a main service provider, I dont know of hand if schools subscribe from a backbone
provider but that is possible....
-
December 9th, 2004, 04:14 PM
I have also had this question too. At my home system I have running:
Win XP Pro w/ SP2 messenger sevices turned off & XP firewall turned on
Avast HE(Updated Daily)
Zonealarm Personal Firewall...
-
December 9th, 2004, 03:55 PM
Very interesting. It would be very cool if you came up with a quick tut on how to dismantle the notebook case and build up, most of the barebones kits I saw come with Centrino or better cpus, does it...
-
December 9th, 2004, 12:06 AM
I checked the site and saw that they have a built on asus feature much like dell. I wonder, how did you go about the process of building the notebook? Where would you get the case and such?
-
December 8th, 2004, 11:39 PM
source:http://aroundcny.com/technofile/texts/tec092604.html
There is an interesting article about Mozilla Firefox I found. Havent had time to really get deep into browsing with it because of my...
-
December 4th, 2003, 03:27 AM
Hello fellow users, I am currently trying to broaden my computer horizons. I am going to get into laptop repair. I just wanted to know if there are any links you folks have on tutorials, books,...
-
December 3rd, 2003, 03:02 AM
Oh the infamous rainbow books again. You know these are from the eighties right? I have read that they are useless as a practical ref. material. Its cool for like the early to mid ninetie but they...
-
Thanx for the link MemorY it is exactly what I was looking for from how things work. I finally can understand IDS and the like. Thanx again.
...
-
Geppy informed you correctly. In Win2k and XP professional this setting is found in
network connectons-->Lan or high speed Intenet-->properties-->Intenet Protocals(tcp/ip)
...
-
(I didnt exactly know where to post this but plz dont flame me for my poor newbie existence)
Hi again to fellow AO'ers...
I was wondering if I ran a p2p on a moral basis (I know that sounds...
-
Interesting article. I think that people with wireless nets at a business is dangerous.The open radio waves; all the hings you can do to bandwith and systems. These are inevitably open to nefarious...
-
Nice rec. I like the fact that its free....:) yay!! Freebies. But other than that this one is going in the library!!!
-
June 24th, 2003, 08:15 AM
When this happened to me A few days ago I used sysem restore. This could be of some use. That suggestion was from a home use. But, if you were running from a master sever as an admin theoreticly you...
-
June 24th, 2003, 08:06 AM
Another tuth is that some hackers can embed the .dat extensions to various virii and trojan. Kazaa not being safe is an understatement, the true levity of the whole p2p idea is that it is not...
-
I have also found that these IP's are both under comcast so do I email abuse@comcast.net if thats what nslookup says as the server name?
Thanks to all of you.
-
Thank you so much for all of your help.
-
Hello,
I am a security newbie. For the past coulple of days I have been getting heavy warnings that my system is being hacked using a backdoor/trojan horse. I would like to know how to close...
-
July 18th, 2002, 04:29 AM
Thank you sooo much I am a newbie but still learning. I hope that I haven't annoyed you too
much.
Thank you all
-
July 18th, 2002, 04:03 AM
Could you give me a good compiler in linux? I would appreciate it, thank you.
-
July 16th, 2002, 11:57 PM
I am using visual c++, and I wanted to know how I could make prog.'s for linux.
Thanx for the help in advance.
-
July 16th, 2002, 11:22 PM
Hello everyone.
It may look like im a junior member but I haven't been around for several months.
Gald to see so many new faces.
-
July 16th, 2002, 11:15 PM
It is only useful for checks on the go, very scifi. Or almost Minority report.
This tech could only really be used for saftey or law enforcement, very useful in war for
linking commands to soilders.
-
December 24th, 2001, 09:47 PM
I agree with Uber COder to some extent, but we as security officials what to do and how to do it. We are not criminals but information seekers what we get is a bad wrap on everything. So what if we...
|
|