- Strength to Increase Rep
- +7
- Strength to Decrease Rep
- -1
- Upvotes Received
- 10
- Posts with Upvotes
- 9
- Upvoting Members
- 9
- Downvotes Received
- 0
- Posts with Downvotes
- 0
- Downvoting Members
- 0
Senior Security d00d
- Interests
- Computers, SCUBA, flying, reading, riding, BSD, computers, ...
- PC Specs
- ...too many to list :)
214 Posted Topics
Re: Is this a machine at home or at work? | |
Re: It depends on the switch - some models don't require them, others do. If you don't want to spend the money on switches, since you already have 2 hubs, just connect the hubs together with a crossover cable. There should be ports marked on the hubs to indicate where the … | |
Re: One thing to keep in mind - if you bypass your company's proxy server to gain access to unauthorized websites, you may be violating your company's network/security/Internet access policy, which in some companies is grounds for termination. Is it worth it to lose your job because you just had to … | |
Re: Rewrite the syslog protocol to use TCP by default, using an SSL tunnel. That'd sure make MY life easier.. | |
Re: With OpenOffice.org you have compatability across platforms, something you don't have with KDEOffice. If you're not going to be sharing documents with anyone, KDEOffice is fine, but there's a lot of functionality that OpenOffice.org has that KDEOffice is still missing. Also, OOo actually has support (mostly fee-based) that KO doesn't … | |
Re: [QUOTE=Mosco]I tryed it d:/www/.htpasswd and d:\www\.htpasswd None of them seem to work.! Yes the password file is in the riht dir.[/QUOTE] If you're trying to limit access on a particular directory within your /www/ directory, you have to first create a user account and password using the htpasswd utility using … | |
Re: I remember the days of running eggdrops on irc... Somewhere I still have some of my old scripts, but unless everyone's on irc, they don't do much good :/ | |
Re: chmod 777 /path/to/samba/share provided you want everyone to have read+write access [b]man chmod[/b] for more info about assigning attributes to a directory/file | |
Re: You can't. To sniff it would mean that someone else has the username/password, and you would sniff it out of the network traffic to the router. Since you don't KNOW what it is, you can't sniff it. You'll probably have to reset the router, then reset your username/password, and restore … | |
Re: [url]http://unixfun.net/howto/bsd/proxy.html[/url] If you allow traffic out on TCP 443, here's one way of bypassing your proxy. I've been doing this for awhile now. Of course, it's just a matter of finding out which ports are blocked from the inside and finding one that's open in the event 443 is closed, … | |
Re: Try running Wireshark on the new computer to see the details about the traffic. You'll be able to determine if the machine is trying to send out spam once it has an Internet connection, and you can see where that traffic is destined, as well as any other outbound connections … | |
Re: ...or install TweakUI, and change the option to clear computer history at login/logoff. You can also clear the "Run.." history, and a ton of other stuff with it. Best of all, it's FREE :) | |
Re: [QUOTE=jg440] My issue is email. I am using mailenable standard. I can recieve mail fine. I can not send mail. Is anyone running an email server through optonline??[/QUOTE] I've been running mail(imap & pop3)/web/ftp/icecast/gnump3d servers for awhile now (some over 3 years) and haven't had a problem yet. I've never … | |
Re: Try asking that question again without letting the cat walk on the keyboard so we can understand WTF you're saying. | |
Re: Do what Ancient Dragon suggested and practice. I'll add this: read. I'll add this as well: You won't get too much information by asking people "how to become a hacker", and you won't be taken seriously. | |
Re: It's not just the 4-foot cable - it's across your LAN, and if wireless is added to the mix, it's now in the air (unless you know for a fact that your key hasn't been compromised.) Also, if you're sending login credentials to your router, they should be over HTTPS. … | |
Re: Sure, I'd be happy to contact you, but [snipped] or [snipped] are both out of service/disconnected. | |
Re: [url]http://www.google.com[/url] | |
Re: You can add the code to the shell script. I'm guessing you're doing a MySQL dump of the data into a .sql file? Just add another line to the shell script to tar -czf {file.sql}. Either that or provide more details on what the shell script is doing in the … | |
Re: You mean aside from committing a felony and breaking your ISP's TOS? If you really don't know that much about it, I'd suggest you learn how to setup a secure proxy. By the time you learn enough about what's involved, you'll realize they'd be better off just using Tor. | |
Re: Have you bothered to read the manual to see if it changed? Did you try connecting to it over a LAN connection first to make sure it isn't a WiFi issue? No? The problem seems to be either PEBCAK or an ID-10-T error.. | |
Re: You mentioned audio in your OP. If 30 laptops are going to connect to a single app server over WiFi on 2 APs, you'll either have to limit the bandwidth to each wireless client that connects, or add another 5 or 6 APs to your network to handle the load. … | |
Re: Make sure the WiFi NIC is configured for DHCP, and nothing is hardcoded (DNS, WINS, etc.). The address range 169.254.0.0/16 is used when a valid DHCP lease can't be updated or acquired. | |
Re: I'd recommend learning how to type using full and complete sentences, with proper spelling and pronunciation. I'd hate trying to read the first paragraph of your resume if that's how you type.. | |
Re: You can also try (as root): [code] # chmod 755 /dev/dsp [/code] | |
Re: From what you stated, you did everything properly, but it's weird that you had that issue with both drives. I've seen times where you have to boot from the master (CD/DVD) drive when there are 2 installed, but never had both fail to spin up before. Luckily you solved your … | |
Re: The name of the firewall script is usually called rc.firewall, and located in /etc or /etc/rc.d/ IPTABLES is the current program (IPCHAINS I think was last in RH 6.3, but I could be wrong, since I don't use RH) There are some good examples of a firewall script for IPTABLES … | |
Re: You should only have [b]one[/b] antivirus program installed on a machine at any given time. If you're looking to replace Norton, [url="http://www.avast.com/i_idt_1016.html"]Avast![/url] is a good substitute. | |
Re: Uncheck the "Use default gateway on this connection" in your settings for the VPN. I'd give you a better "mini-howto" but I'm on FreeBSD right now and don't use it often enough to have it memorized. Basically, you're telling your system not to use the default gateway setup on the … | |
Re: Could be a number of issues: loose CPU, cable(s) loose, RAM not seated properly, and any number of things that can happen when a system gets dropped. My suggestion would be to either have a local tech look at it, or if all else fails you can contact someone who … | |
Re: I think all the conversations talking about bypassing proxies should be banned/removed/modded. But hey, that's just me. (They're there for a reason, people!) | |
Re: What NIC does the mobo have? Once you find that out, you'll be able to find out which module for the NIC you need. Example: NIC = Realtek 8139 Module needed: rtl8139.o To install the module after you've located/identified it, you use either [b]modprobe [/b]or [b]insmod [/b] | |
Re: Use either Internet Exploder or Firefox to search Google. I hope you're not planning on using this in Windows, but then again, if you're asking that question, ... well... nevermind. | |
Re: OptOnline BLOCKS port 80 from outside your node. I run an FTP server which doesn't get hit very much, and sofar haven't had any problems with them. They also block 25 and 110, but if you have someone nmap your IP, it shows *everything* under the sun open and waiting. … | |
Re: Looks like the webserver is turned off, or the box is down/bluescreened/whatever - got a timeout trying to access the site, so I checked to see if it was valid (snipped out the boring stuff): kevin@perseus [~]$ dig myftp.org myftp.org. 1D IN A 63.215.241.203 kevin@perseus [~]$ dig tutorials.myftp.org tutorials.myftp.org. 1M … | |
Re: Make sure that Windows isn't turning off power to the NIC to conserve power (which is the default setting) if you're on a Windows machine. Look in the Device Manager for the NIC, right-click your wireless card, choose "Properties", and click the "Resources" tab. It should be the top option. … | |
Re: Then again, there's always fips for the more tech-savvy. You can use a Win98 boot floppy to wipe a linux-formatted drive to put Windows on - it'll say it doesn't have a recognizable filesystem (obviously) but you can take it from there... | |
Re: You can restrict connections to it in the "Source" column when you define the new rule allowing specific IP addresses (public or internal) to connect to the specific port. If you would like additional, detailed information, feel free to contact me and I can walk you through it. I have … | |
Re: It might be uPNP, as described here: [url]http://www.linuxsa.org.au/mailing-list/2002-11/1134.html[/url] Grab a copy of Wireshark (unless you're familiar with tcpdump and have a *nix machine) and check out your local traffic. | |
Re: There's more to breaking into a webserver than following a list of "do this, then do that." If you don't know what you're doing, start hitting the books (CEH study guides, etc.) and use Google to find out what tools to use, how to use them, and most importantly, WHY … | |
Re: Are the images in a publicly-accessible directory, or outside the docroot? | |
Re: [QUOTE=shwick;754730]My iptables script is getting bloated, redundant, and there's code duplication everywhere, how can I clean it up?[/QUOTE] Can you paste some examples of this "bloating" and "code duplication"? If there's duplicate rules defined in different areas, it shouldn't be too difficult to spot them and help you get them … | |
Re: It means the process itself is running as root, which is required for sshd to function properly. | |
Re: If it doesn't listen on localhost, it won't work. Secondly, use iptables to allow/deny connections on a different interface if you don't want to allow connections to a specific interface. FYI, "interface" is NOT the same as IP address, since you can have numerous IP addresses bound to the same … | |
Re: Not true by any stretch. Not to be rude (hey, I'm in a good mood this morning :) but I don't think you have a clue about how this works, based on your posts in the [URL="http://forum.pfsense.org/index.php?topic=13194.msg70914"]pfsense forum[/URL]. The certificates are for authentication, not for signing. When you want an … | |
Re: Copy the full headers of the e-mail and forward them, along with the original message, to abuse@ whatever ISPs the message either originated from or passed through. You may have to do some digging (no pun intended :) to find out what the domain name is, since some MTAs only … | |
Re: If the admin is the one who configured everything, then YES to all of your questions. If he didn't setup/configure the computer you use, but they did configure the network, then assume that your Internet progress/usage/history can and will be tracked/logged/inspected. And no, there's nothing you can do about it, … |
The End.