Search:
Type: Posts; User: qod; Keyword(s):
Search:
Search took 0.05 seconds.
-
This is a great site, it is growing very fast. I should have started the same thing when i had the idea.
-
Hmm first time i knew that SCO sells software, just thought they were on a sueing spree.
Just kidding although that is what they are doing right now. :D
-
User.dat is part of the registry, and they might contain some information such as serial numbers and such. The user name and password are stored in the SAM file in windows NT based, and in the .pwl...
-
April 25th, 2004, 04:42 AM
there is a good review on it at slashdot and probably 300 replies more ;)
-
April 25th, 2004, 04:39 AM
what C book did you use and would advise beginners to do.
-
April 25th, 2004, 04:38 AM
the best bet to do is to try to scan your system with an antivirus. If you formated you harddrive you should not see the error. Unless you have a floppy in your machine and you forgot all about it.
-
March 4th, 2004, 05:48 AM
my friend wanted to know if there is a site, or book that will teach him how to read hex log files from sniffers. Is there any books or sites that cover such topics indeapth.
thanks
-
February 28th, 2004, 02:15 AM
hi, i do not know which forum to post this message in but if you could please help.
Has anyone tried to make an Intel pro 10/100 Nic to wake on lan remotely, or evel locally.
If so could you please...
-
February 27th, 2004, 03:21 AM
consider me in. I will probably have something about IDS, or some Security thing.
-
February 27th, 2004, 03:19 AM
the best way to aviod to get hacked is to upgrade.
-
February 27th, 2004, 03:06 AM
i like the tutorial, although i would like to see some tutorial that goes deap and not just repeat what was said in some other articles. How does it work, what are there pros/cons, why should i use...
-
February 27th, 2004, 03:03 AM
i find it amazing that this tutorial was featured here
http://www.enterpriseitplanet.com/security/features/article.php/3299971
just found it today, was searching for snort news and there was link...
-
February 9th, 2004, 02:40 PM
using a passive scanning you are able to be invisable, look at tools such as p0f and as said, READ ALOT. :)
-
February 6th, 2004, 09:42 PM
i tried to make it as indepth as possible, but i could not put everything i knew into it, i simply do not have time
-
February 3rd, 2004, 02:50 AM
looks good i will probably read it tommorow.
-
January 27th, 2004, 11:28 PM
i would like the book to be advanced, although that is not good for making money it would be good for reading it.
-
January 27th, 2004, 10:44 PM
Thanks for this great rule files.
-
January 27th, 2004, 10:41 PM
you could use any part of it if you want, just put the name, email, and link to the article in the paper you will use it in, also your paper must also be GPL, or The GNU Free documentation licence.
...
-
January 27th, 2004, 04:14 PM
will going into runlevel 1 bypass the password authentication??
-
January 27th, 2004, 03:21 AM
A walkthough and how to make and use an exploit.
-
January 26th, 2004, 10:48 PM
passive monitoring will work best against active ones, look into RNA (Realtime network awarenes) by sourcefire, or you could modify a program such as p0f to do your needs.
-
January 26th, 2004, 01:22 PM
here is also the text, so you could edit it and play with it, just remember to give credit to QoD and put the email address of my self and the date.
-
January 26th, 2004, 01:18 PM
Here is the full article, all 3 parts.
---------------------------------------------------------------------------------------------------
A look into IDS/Snort
By: Q.o.D...
-
January 26th, 2004, 01:13 PM
Well this article was featured in the Antionline newsletter 11 but i decided to post it here as well, because some people do not know where on the world it is, any ways lets dive into this article...
-
January 26th, 2004, 01:07 PM
Cool, I might be writting one for the #12 newsletter, still do not know what though.
|
|