Search:

Type: Posts; User: Guus; Keyword(s):

Page 1 of 20 1 2 3 4

Search: Search took 0.09 seconds.

  1. Replies
    0
    Views
    8,735

    Message Digests in Java 1.5

    I'm exploring some of Java's Cryptography Extension. I'm trying to create a function that lets me calculate a hash of some string (for storing passwords in a database, for example). Using various...
  2. Replies
    0
    Views
    6,702

    Intro to securing FreeBSD, part 5

    After gore's first four parts, I'd like to contribute a little on the subject as well. So far, gore touched these topics:
    Part 1: Determine a security policy
    Part 2: Password safety
    Part 3:...
  3. Replies
    2
    Views
    8,408

    udpcast worked for me about two years ago. I used...

    udpcast worked for me about two years ago. I used it in a netboot/backup-situation where the used ramdisk (for booting) was under four mb's. You'll find more information at http://udpcast.linux.lu/
  4. Replies
    67
    Views
    13,859

    All the "you're all morons, I'm never posting...

    All the "you're all morons, I'm never posting here again" bullshit aside: Congressman Tom Davis dropped a bill that makes internet hunting punishable by up to five years in prison. (source:...
  5. Replies
    7
    Views
    6,932

    I never used perlscript before, but as I'm seeing...

    I never used perlscript before, but as I'm seeing it, you're never suppling a value for your textfield. That way, the contents of that textfield will always be empty. Try this:



    <HTML>
    <HEAD>...
  6. Thread: Java Help NEEDED

    by Guus
    Replies
    5
    Views
    5,988

    Dude, about one third of your posts are...

    Dude, about one third of your posts are Java-related. You do know that there's a huge Java-forum at http://forums.java.sun.com, do you? There's a list of topics that covers most questions you could...
  7. Replies
    4
    Views
    6,470

    This could be the first time that I can use a...

    This could be the first time that I can use a "All your base are belong to us" reference in a context that actually makes sense! ;)

    Translated by someone not familiar with botnets, probably.
  8. Replies
    2
    Views
    7,405

    Re: Operation Honey Pot.

    There are less attacks on a product that hasn't been around that long, that's common sense. Wait a year, try again, and I'll bet you that you'll see significantly more attacks on SP2 machines.
  9. Replies
    4
    Views
    5,573

    Disregard me, I have my head stuck up my ass. I...

    Disregard me, I have my head stuck up my ass. I was quoting sshd_config, not ssh_config. In ssh_config, the order -does- indicate preference.
  10. Replies
    4
    Views
    5,573

    I'm not an expert, but as far as I know...

    I'm not an expert, but as far as I know specifying "Protocol 2,1" doesn't force the client to use SSH2. You're merely giving the client the choice between two versions. The order of the numbers...
  11. Replies
    20
    Views
    12,850

    You can block port 80 perfectly fine. You will be...

    You can block port 80 perfectly fine. You will be able to keep browsing. You won't be able to host your own webserver though (not configured to use that default port anyways).

    Identd is typically...
  12. Replies
    29
    Views
    17,871

    I know I'm from a backward place, but we already...

    I know I'm from a backward place, but we already have something like this! It's called 'dog' and works on ambulances and fire-engines too!

    Seriously, I don't think you'll be hearing much of this:...
  13. Thread: Sql

    by Guus
    Replies
    11
    Views
    4,384

    Re: Sql

    I'm not sure what you mean by this. Did you actually install a SQL-server (or do you have access to a SQL-server?)

    What your message is saying is that it cannot connect to a SQL server. It's...
  14. Replies
    0
    Views
    3,961

    Calculate password-safety as you type

    I registered on EBay yesterday and when I was registering, I had to make up a password. When I entered my new password, EBay showed me how safe my password was while I typed it. That made me add...
  15. Replies
    2
    Views
    4,319

    Simulating a network

    I enrolled in a CCNP course today. I'd like to run some of the assignments at home, but I don't have any suitable hardware laying around. Does any of you know of some software to simulate a Cisco...
  16. Thread: html help

    by Guus
    Replies
    3
    Views
    5,762

    If I understand correctly, you're having troubles...

    If I understand correctly, you're having troubles positioning the pictures within your pages. I think a technique called CSS (or Cascading Style Sheets) will make your life easier: You can group some...
  17. Replies
    3
    Views
    4,866

    Thanks, Ega, but I had it figured out. count(*)...

    Thanks, Ega, but I had it figured out. count(*) did the trick :)
  18. Thread: Hacked network...

    by Guus
    Replies
    35
    Views
    21,256

    Thought: You're mostly concentrating on removing...

    Thought: You're mostly concentrating on removing the concequenses of the hack, you're not really looking for the origin of it. You might get lucky and find some trojan, but that trojan had to come...
  19. Replies
    7
    Views
    5,885

    Using tables for text-alignment is getting a bit...

    Using tables for text-alignment is getting a bit outdated. Preferred way to format HTML nowadays is using CSS.

    There are a lot of usages for CSS - it's quite powerful - but I'll give you just a...
  20. Replies
    10
    Views
    11,126

    I'm using some sentenced-based passwords too, but...

    I'm using some sentenced-based passwords too, but I've wondered what whould happen if instead of bruteforcing using every combination of, say, the letters of the alfabet, someone whould write...
  21. Replies
    9
    Views
    8,536

    I'm a little pressed for time right now...

    I'm a little pressed for time right now (finishing up my internship, still have loads of documentation to write), can't look into it any further.
  22. Replies
    9
    Views
    8,536

    MSM, the first few lines of that code (the...

    MSM, the first few lines of that code (the section with all the %-signs) unescape to something like this:


    function k(m)
    {
    var d='',t,f,v,r;
    for(t=0;t-1)
    {
    r=((v+1 )%i-1);
  23. Replies
    3
    Views
    4,866

    XML / XSLT question (how to count elements?)

    This should be an easy question for someone who's a little more experienced in XML/XSLT than me. :) Please help me out!

    I'm displaying an object (java graph) that needs a varying number of...
  24. Replies
    1
    Views
    5,932

    You'll find the security alert that Mysql.com...

    You'll find the security alert that Mysql.com issued for this worm at the address below. A word on detecting it:



    http://dev.mysql.com/tech-resources/articles/security_alert.html
  25. Replies
    9
    Views
    11,639

    *ironical grin*

    *ironical grin*
Results 1 to 25 of 500
Page 1 of 20 1 2 3 4