Search:

Type: Posts; User: ziploc; Keyword(s):

Search: Search took 0.02 seconds.

  1. Replies
    4
    Views
    5,241

    Hackquest this post could not have better( or...

    Hackquest this post could not have better( or maybe worse ) timing...

    I'm currently a student at Iowa State University, which is one of 6 or 7 universities in the nation that offer the cybercorp...
  2. Replies
    6
    Views
    7,578

    I will try the suggestions, thanks for taking the...

    I will try the suggestions, thanks for taking the time to reply..

    to answer a few questions, I would say that it is mostly random, and I will take into account someone walking in front of the AP,...
  3. Replies
    6
    Views
    7,578

    Windows wireless problem

    I realize this is not entirely security related, but everyone knows(or at least I do!) that security professionals know most of the networking answers =D

    Anyhow, I have a new Toshiba tablet PC...
  4. Replies
    6
    Views
    8,983

    Thanks for all your replies thus far! I have...

    Thanks for all your replies thus far! I have taken into consideration most of your suggestions and I will move the router away from the infrared sauna as well. Thanks again fellas/(and gals)?
  5. Replies
    6
    Views
    8,983

    Wireless router problems

    I was just wondering what kind of things could be interfering with my wireless signal to cause the strength to read at low or very low when the router is only 50 feet(max) away. We have an infrared...
  6. Replies
    8
    Views
    6,793

    Create a post before you and your family goes on...

    Create a post before you and your family goes on a little vacation and look what happens! I'm sorry to create any frustration, and I apologise for that!

    To further specify my question, I was more...
  7. Replies
    8
    Views
    6,793

    Identifying an exploit in source code

    I have read a few tutorials on identifying buffer overflows, and how to correct them, but I was wondering if anyone could demonstrate a few examples of an exploit in source code that would not be...
Results 1 to 7 of 7