Search:
Type: Posts; User: spirovski.b; Keyword(s):
Search:
Search took 0.05 seconds.
-
June 26th, 2008, 12:08 PM
It may improve things, but there is a caveat: In the particular case of Citibank - if you've read the article in Wired, Citibank DENIES that actual PIN theft happened from their systems. According to...
-
June 24th, 2008, 04:53 PM
Not that I'm defending BT...but WEP security is in the default instruction set for configuration set delivered with the devices. I have seen this also in telco operators all over Eastern Europe. The...
-
June 18th, 2008, 06:08 AM
First take - didn't have too much time to play around
1. Install passed without a glitch
2. For some reason, the Google toolbar failed, i uninstalled it. Still didn't reinstall
3. Renders pages...
-
June 17th, 2008, 01:47 PM
I am just creating a container post for all readers to include their comments on the new Firefox 3
I'll be downloading it today (still isn't available) and will post comments tommorow
-
June 17th, 2008, 11:54 AM
Last week Bill C-61 was introduced in the Canadian parliament. Supposedly it protects digital media from copyright infringement.
To be clear, it's a bit better then US DMCA. The danger in C-61 is...
-
June 15th, 2008, 07:45 PM
Last week I attended the official IT Service Management (ITILv3) Foundations training.
The training is a 3 day boot camp, which covers the processes in the following ITIL areas
Service Strategy...
-
June 15th, 2008, 08:24 AM
Online Credit Card Theft is a very old and frequently discussed topic. And yet, a lot of people in the world are still victims to credit card theft. So, in a brief morning post, here are several...
-
June 15th, 2008, 07:19 AM
nihil is quite right. You mustn't approach this purely as a hack, it's actual crime. Immediately inform paypal and authorities. A good computer crime division will send expert forensic team to...
-
June 12th, 2008, 04:56 PM
The DNS service is a very low maintenance. The downside of such ease of use means that the DNS server is often forgotten by the admins, and DNS security can be lacking.
The easiest attack that can...
-
June 12th, 2008, 01:10 PM
I am using BT2 for a while now, but i find it lacking and inconsistent at times...
Can you suggest a newer/better alternative? Apparently BT3 is in planning, but i fear it's abandoned
-
June 11th, 2008, 08:10 PM
Actually a very nice piece of information. My bet is that the next killer protocol will include autogenerated dummy listeners to confuse the RIAA hunters
-
June 11th, 2008, 05:52 PM
Cider, be more specific. What is your planned setup, so we can help you with the set-up
-
June 10th, 2008, 08:21 AM
@Cider
I've had a similar setup at home for years. I used to work for an ISP, so i tried to recreate the functionalities of an ISP at home for training and expertise.
My suggestion would be to get...
-
When paranoid, i would go with wi-fi sniffer with the wi-fi adapter in monitor mode (AKA promiscuous mode). I like wireshark and kismet, by to use them properly, you NEED to set your wi-fi adapter to...
-
n00bius, other board members. Here are the results of my test:
The MS instructions are quite correct and works.
http://technet2.microsoft.com/window....mspx?mfr=true
I used a VMware to create...
-
@yellowcat - I'm truly amazed by the effort that you are making to eavsedrop on other people's communications.
If security is what you are trying to achieve, here's a link that I posted on home...
-
It will be a guideline standard, like iso 27002, which means that it will be a large paper telling you that you should do something but then again you may not want to, and it is best if you decide...
-
I seem to be missing the point...
What are you trying to achieve here?
If you have a surviving DC other then the failed one, the entire effort is moot (and a waste of time). Just install a fresh...
-
Hello everyone. A brief introduction to the users.
My name is Spirovski Bozidar. I work in information security and I feel that i will benefit from the experiences of the readers and posters of the...
-
Mission nearly impossible
Here is how the whois databases work:
The RIPE, AfriNIC, APNIC, ARIN, LACNIC databases keep information about the address of the company to whose Autonomous System (AS)...
|
|