Search:

Type: Posts; User: drpepperONE; Keyword(s):

Page 1 of 3 1 2 3

Search: Search took 0.00 seconds.

  1. Replies
    3
    Views
    1,492

    Hi Little_Dice this is an example of getopts...

    Hi Little_Dice this is an example of getopts usage



    usage () {
    echo -e “Usage: $0 -e \”What To Echo\” [ -q \”Output\” ]”
    echo -e “\t-e: specifies what to echo (required)”
    ...
  2. Yes ther's a cpulimt prog that works on process...

    Yes ther's a cpulimt prog that works on process and in %.

    What is it?

    cpulimit is a simple program that attempts to limit the cpu usage of a process (expressed in percentage, not in cpu time)....
  3. Replies
    18
    Views
    4,992

    Nice shaman!!!! This is a very useful tools...

    Nice shaman!!!!


    This is a very useful tools and I hope that this tool will became a TOTAL/GLOBAL vuln test for all kind of forum!!!
  4. Replies
    11
    Views
    6,127

    Hi ravalox. download the wicd package for...

    Hi ravalox.

    download the wicd package for slack


    wget http://repository.slacky.eu/slackware-12.0/network/wicd/1.4.1/wicd-1.4.1-i486-2mch.tgz


    Install dbus package for python
  5. Replies
    5
    Views
    9,661

    Hi I know the following software: This is here...

    Hi I know the following software:

    This is here in Italy a good project about it:

    D-ITG, Distributed Internet Traffic Generator

    http://www.grid.unina.it/software/ITG/
    ...
  6. Hi scully69 this is an easy script that I made...

    Hi scully69 this is an easy script that I made strictly to your need you described.

    Copy and paste the following code in a new file "rand_pwd_gen.sh" set execution permission "chmod 755...
  7. Hi you could find here a good place from to start...

    Hi you could find here a good place from to start

    http://www.linuxjournal.com/article/2770

    If you have low memory I suggest to you to create a supplementary swap partition and use FluxBox...
  8. Replies
    34
    Views
    6,094

    Niceeeeeeeeeeeeeee!!!!!! Thank you!!!!!!! Is...

    Niceeeeeeeeeeeeeee!!!!!! Thank you!!!!!!!

    Is it only about router/ap/ default password or all default password in general(OS, SOFTWARE,OTHER DEVICES, etc etc)?
  9. Discussioni: The HATELIST

    by drpepperONE
    Replies
    82
    Views
    35,575

    Thank u pureh@te. I presume that the kind of...

    Thank u pureh@te.

    I presume that the kind of password is an English language.

    Is it right?
  10. Replies
    5
    Views
    3,858

    The best way to fix it is replace xandros with...

    The best way to fix it is replace xandros with BT3 beta!!!:D

    We did it here in Italy after eee arrived the first things we did was to install BT3 on ssd!!:D
  11. From kde forum: ...

    From kde forum:


    http://bugs.kde.org/show_bug.cgi?id=132587
  12. Replies
    187
    Views
    46,210

    Hi dalma the problem is that the Charon package...

    Hi dalma the problem is that the Charon package is build for slack BT3 and not for ubuntu.
    So you must have install all the java packages needed and then do the symbolink link of the rigth place...
  13. Replies
    13
    Views
    3,969

    Nice shaman!!!!Yuo are amazing!!! Thank you for...

    Nice shaman!!!!Yuo are amazing!!!
    Thank you for all your project!!!
  14. Replies
    19
    Views
    5,457

    Hi!! I suggest you all SYNGRESS books about...

    Hi!! I suggest you all SYNGRESS books about security & pentesting issues, that are very very interesting!!!!

    2nd Part

    Ira Winkler's Zen and the Art of Information Security (ISBN 1597491683)
    ...
  15. Replies
    19
    Views
    5,457

    Hi!! I suggest you all SYNGRESS books about...

    Hi!! I suggest you all SYNGRESS books about security & pentesting issues, that are very very interesting!!!!

    1st part

    2008 Cyber Crime Investigator's Professional CD (ISBN 1597492019)

    2008...
  16. Replies
    8
    Views
    3,441

    Hi Thorin what do you wanna do with this hash...

    Hi Thorin what do you wanna do with this hash string??



    It's not possible recovery original text when it's used on a hash function.



    To break-in hash function is only possible if there...
  17. Replies
    8
    Views
    3,441

    Hi thorin you could use this online hash...

    Hi thorin you could use this online hash generator to compare the hash that you have with one in list and test same hash generation.

    http://www.insidepro.com/hashes.php?lang=eng
  18. Replies
    17
    Views
    4,992

    Please don't insult and injure. There are many...

    Please don't insult and injure.

    There are many and many way to do the same things.

    The script that I made it's only for testing.
  19. Replies
    17
    Views
    4,992

    Yes simply use the option -u like that: ...

    Yes simply use the option -u like that:





    This is the man :


    NC(1) NC(1)
  20. Replies
    17
    Views
    4,992

    According to the following request: this...

    According to the following request:



    this script is only for testing on purpose!!

    The nc daemon take little memory & cpu usage but obviously spwaned for 65535 it will take some consistent...
  21. Replies
    17
    Views
    4,992

    Hi xatar use the following script. It used the...

    Hi xatar use the following script.

    It used the nc (Netcat network utility)






    #!/bin/bash
  22. Replies
    0
    Views
    1,682

    How to filter kismet stuff with proxy-strip.pl

    Hi to all.

    I want suggest to you an useful perl script to strip unwanted kismet messages or remove unwanted ssid/bssid or other stuff, to show only what we need in kismet gui.

    Web site author:...
  23. Replies
    55
    Views
    17,268

    My cards are: ubiquiti src300 alfa AWUS036H...

    My cards are:

    ubiquiti src300

    alfa AWUS036H

    proxim ORiNOCO gold 8470-WD

    logilink WL0025
  24. Replies
    6
    Views
    4,332

    In Backtrack 3 beta. On kde desktop right...

    In Backtrack 3 beta.

    On kde desktop right click ---->Create new --->Link Application


    Set name of the link


    In permission Tab set "is executable"
  25. Replies
    3
    Views
    1,913

    Which anti-interception comunication?

    Hi all I want know your opinion about anti-interception comunication.

    Is there a secure method to digital-comunicate without risk of interception?

    With no gov(NSA for example) backdoor, no...
Results 1 to 25 of 52
Page 1 of 3 1 2 3