Search:

Type: Posts; User: AngelofRevenge; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.01 seconds.

  1. Replies
    22
    Views
    10,096

    Okay

    Thanks eveyone for that, my main security consideration is cryptography, that's where I seem to excel in. I find that the contents of drive should be encrypted in a business situation to prevent...
  2. Replies
    9
    Views
    14,851

    Implimentation

    How can such a system be implimented?

    It would be useful, as it could help configure networks.
  3. Replies
    5
    Views
    4,046

    Problem

    I think the problem is in the OE 6 software, where it is I don't know, I think clean the computer up completely and see what happens.
  4. Replies
    6
    Views
    6,131

    Kudos

    You still wrote it, which is more than I can do
  5. Replies
    1
    Views
    1,569

    haha

    that's good stuff, go to www.eviloverlord.com because that list is also very funny.
  6. Replies
    4
    Views
    10,198

    Hmm

    Gump

    what you say certainly has clarified the situation, but 128 bit encryption is not a viable option, do not have the formal training, but an interest in Cryptography, and am able to brute...
  7. Replies
    0
    Views
    2,442

    Calling all crypies

    hello

    Any one out there who is really interested in Cryptography etc?
  8. Replies
    16
    Views
    8,489

    DNS

    Could a DNS server help send the message?
  9. Replies
    16
    Views
    8,489

    InterNetsend

    I study networking like you and am not aware of any such program, popups are ad's written into a web pages script, and they can be blocked, eg Norton Security. 'll see if I can find a program similar...
  10. Replies
    6
    Views
    6,131

    Game

    Hey

    at leat you wrote this, even if it's got bugs galore (win 98ish) you stil wrote it, which is more than I can do.
  11. Replies
    2
    Views
    3,225

    Go forth

    you should go forth and write this program, it will be invaluable to future network administrators.
  12. Replies
    5
    Views
    4,046

    options

    is it posible to reinstall those components by themselves, otherwise i recomend a complete reinstall after a format, then updating antivirus software and or firewalling the network.
  13. Replies
    4
    Views
    6,988

    Windows

    I've got some Win 98 SE to sell, but I'm in Australia, sorry.
  14. Replies
    22
    Views
    10,096

    Security

    I believe the question is wrong, what you need to know is that encryption protects data, not FAT32 or anything else.

    Any way security issues Microsoft never fix.
  15. Replies
    9
    Views
    6,770

    Rates

    I presume the charge is for line hire, but what type of line I don't know?

    If given extra info I could hep out more.
  16. Replies
    7
    Views
    9,996

    What?

    I would like to know how securityfocus responded and what is the ultimate goal, elminate the shell weakness?
  17. Replies
    11
    Views
    10,442

    Cisco Products

    communication of that type is easy to access, use a packet sniffer, like a port sniffer, except reads packets.
  18. Message

    I can't be much help as I am only familar with Cisco products, and I wrote a firewall so I could do stuff like that.
  19. Replies
    4
    Views
    4,870

    Encryption

    Go to the RSA Laboratories web page because a business will require a secure file storage system, and RSA is almost unbreakable.
  20. Replies
    22
    Views
    12,477

    Ethics?

    Trace and locate without illegal activities
  21. Replies
    10
    Views
    6,836

    Keyloggers

    Do you have a specific Keylogger program?

    If so whch one and how are the logs accessed?
  22. Replies
    4
    Views
    10,198

    Security

    The security of the communications iss my concern in this area. The use of RSA and similar encryption would be a secure system to use, however these signals could be intercepted, and with enought...
  23. Replies
    7
    Views
    10,017

    verification

    Do you want true verification?

    Try a code phrase only that person would know.
  24. Replies
    14
    Views
    6,513

    What to do

    What to do? I think you should get a router/ hardware firewall and configure it properly. Make sure the details are only possessed by you though.
  25. Security

    The firewall should have some configuration options which should allow outbound traffic through, eg net surfing, while preventing external access.
Results 1 to 25 of 28
Page 1 of 2 1 2