Posts
 
Reputation
Joined
Last Seen
Ranked #350
Strength to Increase Rep
+7
Strength to Decrease Rep
-1
100% Quality Score
Upvotes Received
10
Posts with Upvotes
9
Upvoting Members
9
Downvotes Received
0
Posts with Downvotes
0
Downvoting Members
0
4 Commented Posts
3 Endorsements
Ranked #486
Ranked #1K
~146.44K People Reached
About Me

Senior Security d00d

Interests
Computers, SCUBA, flying, reading, riding, BSD, computers, ...
PC Specs
...too many to list :)

214 Posted Topics

Member Avatar for samaru
Member Avatar for cajunsunshine
Member Avatar for oalee

It depends on the switch - some models don't require them, others do. If you don't want to spend the money on switches, since you already have 2 hubs, just connect the hubs together with a crossover cable. There should be ports marked on the hubs to indicate where the …

Member Avatar for mason_nosam
0
1K
Member Avatar for kalel21

One thing to keep in mind - if you bypass your company's proxy server to gain access to unauthorized websites, you may be violating your company's network/security/Internet access policy, which in some companies is grounds for termination. Is it worth it to lose your job because you just had to …

Member Avatar for CCProxy
0
4K
Member Avatar for frankycool

Rewrite the syslog protocol to use TCP by default, using an SSL tunnel. That'd sure make MY life easier..

Member Avatar for aprajita jha
0
1K
Member Avatar for bigpoppapumpg

With OpenOffice.org you have compatability across platforms, something you don't have with KDEOffice. If you're not going to be sharing documents with anyone, KDEOffice is fine, but there's a lot of functionality that OpenOffice.org has that KDEOffice is still missing. Also, OOo actually has support (mostly fee-based) that KO doesn't …

Member Avatar for tyson567
0
439
Member Avatar for Mosco

[QUOTE=Mosco]I tryed it d:/www/.htpasswd and d:\www\.htpasswd None of them seem to work.! Yes the password file is in the riht dir.[/QUOTE] If you're trying to limit access on a particular directory within your /www/ directory, you have to first create a user account and password using the htpasswd utility using …

Member Avatar for isouza
0
452
Member Avatar for AlPhA

I remember the days of running eggdrops on irc... Somewhere I still have some of my old scripts, but unless everyone's on irc, they don't do much good :/

Member Avatar for Progr4mmer
0
714
Member Avatar for Dani

chmod 777 /path/to/samba/share provided you want everyone to have read+write access [b]man chmod[/b] for more info about assigning attributes to a directory/file

Member Avatar for xiejiangtian
0
3K
Member Avatar for Dark_Phoenix

You can't. To sniff it would mean that someone else has the username/password, and you would sniff it out of the network traffic to the router. Since you don't KNOW what it is, you can't sniff it. You'll probably have to reset the router, then reset your username/password, and restore …

Member Avatar for happygeek
0
283
Member Avatar for nizzy1115

[url]http://unixfun.net/howto/bsd/proxy.html[/url] If you allow traffic out on TCP 443, here's one way of bypassing your proxy. I've been doing this for awhile now. Of course, it's just a matter of finding out which ports are blocked from the inside and finding one that's open in the event 443 is closed, …

Member Avatar for stokes1900
0
5K
Member Avatar for Ritesh_4

Try running Wireshark on the new computer to see the details about the traffic. You'll be able to determine if the machine is trying to send out spam once it has an Internet connection, and you can see where that traffic is destined, as well as any other outbound connections …

Member Avatar for Ritesh_4
0
192
Member Avatar for xjenn1130x

...or install TweakUI, and change the option to clear computer history at login/logoff. You can also clear the "Run.." history, and a ton of other stuff with it. Best of all, it's FREE :)

Member Avatar for BobMaria
0
302
Member Avatar for jg440

[QUOTE=jg440] My issue is email. I am using mailenable standard. I can recieve mail fine. I can not send mail. Is anyone running an email server through optonline??[/QUOTE] I've been running mail(imap & pop3)/web/ftp/icecast/gnump3d servers for awhile now (some over 3 years) and haven't had a problem yet. I've never …

Member Avatar for duodu
0
1K
Member Avatar for xixixi

Try asking that question again without letting the cat walk on the keyboard so we can understand WTF you're saying.

Member Avatar for NewbieXcellence
0
113
Member Avatar for rinoa0424

Do what Ancient Dragon suggested and practice. I'll add this: read. I'll add this as well: You won't get too much information by asking people "how to become a hacker", and you won't be taken seriously.

Member Avatar for Narue
0
218
Member Avatar for NewbieXcellence

It's not just the 4-foot cable - it's across your LAN, and if wireless is added to the mix, it's now in the air (unless you know for a fact that your key hasn't been compromised.) Also, if you're sending login credentials to your router, they should be over HTTPS. …

Member Avatar for ryan461
0
128
Member Avatar for tyrell.hawkins

Sure, I'd be happy to contact you, but [snipped] or [snipped] are both out of service/disconnected.

Member Avatar for TheOgre
0
81
Member Avatar for nissiinfotech
Member Avatar for floris

You can add the code to the shell script. I'm guessing you're doing a MySQL dump of the data into a .sql file? Just add another line to the shell script to tar -czf {file.sql}. Either that or provide more details on what the shell script is doing in the …

Member Avatar for TheOgre
0
254
Member Avatar for aman007
Member Avatar for Dirus

You mean aside from committing a felony and breaking your ISP's TOS? If you really don't know that much about it, I'd suggest you learn how to setup a secure proxy. By the time you learn enough about what's involved, you'll realize they'd be better off just using Tor.

Member Avatar for TheOgre
0
191
Member Avatar for fluffinator007
Member Avatar for TheOgre
0
168
Member Avatar for GiPonRa

Have you bothered to read the manual to see if it changed? Did you try connecting to it over a LAN connection first to make sure it isn't a WiFi issue? No? The problem seems to be either PEBCAK or an ID-10-T error..

Member Avatar for TheOgre
0
58
Member Avatar for GregPan

You mentioned audio in your OP. If 30 laptops are going to connect to a single app server over WiFi on 2 APs, you'll either have to limit the bandwidth to each wireless client that connects, or add another 5 or 6 APs to your network to handle the load. …

Member Avatar for TheOgre
0
140
Member Avatar for vndlyndstrs

Make sure the WiFi NIC is configured for DHCP, and nothing is hardcoded (DNS, WINS, etc.). The address range 169.254.0.0/16 is used when a valid DHCP lease can't be updated or acquired.

Member Avatar for TheOgre
0
162
Member Avatar for ANKITAbhatia

I'd recommend learning how to type using full and complete sentences, with proper spelling and pronunciation. I'd hate trying to read the first paragraph of your resume if that's how you type..

Member Avatar for TheOgre
-3
58
Member Avatar for trashed
Member Avatar for TheOgre
0
142
Member Avatar for Thanh-BKK

From what you stated, you did everything properly, but it's weird that you had that issue with both drives. I've seen times where you have to boot from the master (CD/DVD) drive when there are 2 installed, but never had both fail to spin up before. Luckily you solved your …

Member Avatar for anusha11
0
400
Member Avatar for spikes

The name of the firewall script is usually called rc.firewall, and located in /etc or /etc/rc.d/ IPTABLES is the current program (IPCHAINS I think was last in RH 6.3, but I could be wrong, since I don't use RH) There are some good examples of a firewall script for IPTABLES …

Member Avatar for princealway
0
202
Member Avatar for alihamilton

You should only have [b]one[/b] antivirus program installed on a machine at any given time. If you're looking to replace Norton, [url="http://www.avast.com/i_idt_1016.html"]Avast![/url] is a good substitute.

Member Avatar for Simeon Naranjit
0
210
Member Avatar for mj1141

Uncheck the "Use default gateway on this connection" in your settings for the VPN. I'd give you a better "mini-howto" but I'm on FreeBSD right now and don't use it often enough to have it memorized. Basically, you're telling your system not to use the default gateway setup on the …

Member Avatar for Castorpoluks
0
309
Member Avatar for pottertw

Could be a number of issues: loose CPU, cable(s) loose, RAM not seated properly, and any number of things that can happen when a system gets dropped. My suggestion would be to either have a local tech look at it, or if all else fails you can contact someone who …

Member Avatar for c0de4badf00d
0
415
Member Avatar for Ricko

I think all the conversations talking about bypassing proxies should be banned/removed/modded. But hey, that's just me. (They're there for a reason, people!)

Member Avatar for mikey54
0
271
Member Avatar for bigpoppapumpg

What NIC does the mobo have? Once you find that out, you'll be able to find out which module for the NIC you need. Example: NIC = Realtek 8139 Module needed: rtl8139.o To install the module after you've located/identified it, you use either [b]modprobe [/b]or [b]insmod [/b]

Member Avatar for james1960
1
339
Member Avatar for gauravsolified

Use either Internet Exploder or Firefox to search Google. I hope you're not planning on using this in Windows, but then again, if you're asking that question, ... well... nevermind.

Member Avatar for gauravsolified
0
127
Member Avatar for mirage00

OptOnline BLOCKS port 80 from outside your node. I run an FTP server which doesn't get hit very much, and sofar haven't had any problems with them. They also block 25 and 110, but if you have someone nmap your IP, it shows *everything* under the sun open and waiting. …

Member Avatar for vicepre
0
3K
Member Avatar for cancer10

Looks like the webserver is turned off, or the box is down/bluescreened/whatever - got a timeout trying to access the site, so I checked to see if it was valid (snipped out the boring stuff): kevin@perseus [~]$ dig myftp.org myftp.org. 1D IN A 63.215.241.203 kevin@perseus [~]$ dig tutorials.myftp.org tutorials.myftp.org. 1M …

Member Avatar for ramannanda9
0
149
Member Avatar for Elite515

Make sure that Windows isn't turning off power to the NIC to conserve power (which is the default setting) if you're on a Windows machine. Look in the Device Manager for the NIC, right-click your wireless card, choose "Properties", and click the "Resources" tab. It should be the top option. …

Member Avatar for crb3
0
118
Member Avatar for Soral 3.0

Then again, there's always fips for the more tech-savvy. You can use a Win98 boot floppy to wipe a linux-formatted drive to put Windows on - it'll say it doesn't have a recognizable filesystem (obviously) but you can take it from there...

Member Avatar for Darkflib
0
867
Member Avatar for wildkat

You can restrict connections to it in the "Source" column when you define the new rule allowing specific IP addresses (public or internal) to connect to the specific port. If you would like additional, detailed information, feel free to contact me and I can walk you through it. I have …

Member Avatar for TheOgre
0
120
Member Avatar for linpagla

It might be uPNP, as described here: [url]http://www.linuxsa.org.au/mailing-list/2002-11/1134.html[/url] Grab a copy of Wireshark (unless you're familiar with tcpdump and have a *nix machine) and check out your local traffic.

Member Avatar for TheOgre
0
169
Member Avatar for f.ben.isaac

There's more to breaking into a webserver than following a list of "do this, then do that." If you don't know what you're doing, start hitting the books (CEH study guides, etc.) and use Google to find out what tools to use, how to use them, and most importantly, WHY …

Member Avatar for ahihihi...
0
132
Member Avatar for majualexander

Are the images in a publicly-accessible directory, or outside the docroot?

Member Avatar for DiGSGRL
0
101
Member Avatar for shwick

[QUOTE=shwick;754730]My iptables script is getting bloated, redundant, and there's code duplication everywhere, how can I clean it up?[/QUOTE] Can you paste some examples of this "bloating" and "code duplication"? If there's duplicate rules defined in different areas, it shouldn't be too difficult to spot them and help you get them …

Member Avatar for Comatose
0
555
Member Avatar for shwick

It means the process itself is running as root, which is required for sshd to function properly.

Member Avatar for TheOgre
0
155
Member Avatar for shwick

If it doesn't listen on localhost, it won't work. Secondly, use iptables to allow/deny connections on a different interface if you don't want to allow connections to a specific interface. FYI, "interface" is NOT the same as IP address, since you can have numerous IP addresses bound to the same …

Member Avatar for TheOgre
0
359
Member Avatar for shwick

Not true by any stretch. Not to be rude (hey, I'm in a good mood this morning :) but I don't think you have a clue about how this works, based on your posts in the [URL="http://forum.pfsense.org/index.php?topic=13194.msg70914"]pfsense forum[/URL]. The certificates are for authentication, not for signing. When you want an …

Member Avatar for TheOgre
0
173
Member Avatar for camelNotation

Copy the full headers of the e-mail and forward them, along with the original message, to abuse@ whatever ISPs the message either originated from or passed through. You may have to do some digging (no pun intended :) to find out what the domain name is, since some MTAs only …

Member Avatar for obyskool
0
154
Member Avatar for sendithere1122

If the admin is the one who configured everything, then YES to all of your questions. If he didn't setup/configure the computer you use, but they did configure the network, then assume that your Internet progress/usage/history can and will be tracked/logged/inspected. And no, there's nothing you can do about it, …

Member Avatar for TheOgre
0
159

The End.