Search:
Type: Posts; User: Trojan; Keyword(s):
Search:
Search took 0.02 seconds.
-
August 9th, 2004, 10:34 AM
I think most of the basics have been covered, however one key point to remember: Bridges/Switches cannot route data over different networks, whereas router can.
Because bridges (or now known as...
-
August 2nd, 2004, 09:56 AM
Indeed, however it depends on how the network operator has set up its GPRS system. Most operators will use NAT and then have a firewall implemented, this way it's fairly difficult to get to a...
-
August 2nd, 2004, 09:43 AM
All,
I haven't read through all the posts, but any cell network that utilises the SIM card has not to date been compromised. Cell phone phreaking and attacking the network are 2 completely...
-
July 16th, 2004, 02:57 PM
Not true, most MIDP2.0 supporting handsets have access to the camera, and because JSR177 has only beeen approved recently those handsets do NOT implement any security model. Even now, handsets such...
-
July 15th, 2004, 09:03 AM
True, in the Japanese market AV is already deployed on the client side. This is mainly to do with network operators having the liability and not the handset vender. We will soon see anti-virus...
-
July 15th, 2004, 08:23 AM
AFAIK, MIDP1.0 does not implement any security controls at all, MIDP2.0 recommends to use JSR 177, which is the recommended security practice (this implements the Mexe like security domain system) -...
-
July 14th, 2004, 03:34 PM
Hi,
My 2 pence on all of this.
Regarding breaking encyrption algorithms, there are alot easier ways of eavesdropping on a call. At the end of the day encryption to an entity must end somewhere...
-
Hi,
Virus scanners and cleaning your drive isn't going to any good in your circumstances.
Most IM services work with a portal, where the IM service provider proxies messages through to the...
-
January 4th, 2002, 09:41 AM
A quick question relating to Java and registry access.
To access the registry from an applet it surely has to be signed by a trusted third party right?
-
October 15th, 2001, 02:38 PM
Hi,
What restricts applications to access kernal related files in WinX. If their is this restriction how are those API's filtered out?
|
|