Magic-PS is a key logger that only affects Yahoo Messenger users. It's purpose it to log and send the user's password to another Yahoo Chat member through a private message sent by the victim's Yahoo Messenger. It disables Yahoo Messenger's Save Password feature, so you are required to type in...
Magic-PS is a key logger that only affects Yahoo Messenger users. It's purpose it to log and send the user's password to another Yahoo Chat member through a private message sent by the victim's Yahoo Messenger. It disables Yahoo Messenger's Save Password feature, so you are required to type in...
John the Ripper is a great *nix password cracker. It's speed isn't so bad. It checks common passwords initially, like names, words, places, etc. If the password isn't found in the initial check, it then does true brute forcing (trying all possible password combinations). This step takes some...
Nope, not mistaken. Why would anyone preform any DoS attack on randon hosts? Doesn't make sense doing it that way.
--Sapient2003 - sapient@sapient2003.com
"The worst insecurity is believing you are too secure."
Zonelarm is a bad firewall. You can cause ZoneAlarm to crash if you send too many packets that cause the alert popups to occur. Blackice Defender isn't a firewall, rather just an IDS. Sygate Personal Firewall/Pro (www.sygate.com) is a great firewall for Windows-based systems. As long as you...
Ping packets are common to everyone, being a large network or an individual user. They are sent by anyone, your ISP, or anyone wanting to know how long it takes for packets to be sent to you. There is no need to worry, as it is typical Internet activity.
--Sapient2003 -...
If the IP address is being spoofed, the alleged attacker wouldn't get any responses from your computer, so that is out of the question. The attacker could go through a sock/proxy server, but for port scanning, it wouldn't be worth the hastle as port scanning is legal in the United States. You...
My Linux box chooses a random MAC address everytime it boots up. It does not make it so you cannot recieve packets. Everything you could do with your actual MAC address you can do with a fake one.
--Sapient2003 - sapient@sapient2003.com
"The worst insecurity is believing you are too...
You cannot change the MAC address physically, as that is stored on an IC chip. However, when the computer turns on, the MAC address is then stored into the computer's memory. You can edit this part of the memory to spoof your mac address. In Linux, you cac use changemac...
The server is most likey behind a firewall. Normally, when ports are closed, the operating system would respond to SYN packets accordingly, telling the source that the port is closed. When behind a firewall, the operating system will not respond to the SYN packets accordingly, not replying at...
Routers can use stateful packet inspection, depending on the router, the IOS version, etc. Routers do an excellent job at protecting networks as long as you know how do it. For an example, just read up on ACLs.
--Sapient2003 - sapient@sapient2003.com
"The worst insecurity is believing you...
It isn't the firewalls fault anyhow. It is the service running on available ports that is the problem.
--Sapient2003 - sapient@sapient2003.com
"The worst insecurity is believing you are too secure."
The computers inside of the LAN should be using private address space. This way outside traffic cannot access any computers inside the LAN. Each computer should be running anti-virus software, AVG seems to work fine. The computer that has access to the internet should have a firewall. Sygate...
Linux has substitue programs for Dreamweaver MX, Flash MX, and Photoshop. Learn to use those instead of trying to get the Windows program to work in Linux. It isn't worth messing with Windows.
--Sapient2003 - sapient@sapient2003.com
"The worst insecurity is believing you are too secure."
The router would supply efficient amount of protection alone.
--Sapient2003 - sapient@sapient2003.com
"The worst insecurity is believing you are too secure."
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.