Search:

Type: Posts; User: thepretender84; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.00 seconds.

  1. Replies
    12
    Views
    3,256

    Patriot Hacker Hits Jihad With DDoS Attacks

    Anyone else been following this?

    Patriot Hacker Hits Jihad With DDoS Attacks : Information Security Resources

    Jester (th3j35t3r) on Twitter

    I've got mixed feelings about this...should the...
  2. Replies
    17
    Views
    2,851

    Very interesting...What are the specs on your...

    Very interesting...What are the specs on your cluster mikec?
  3. Replies
    10
    Views
    2,780

    I was just curious b/c vendors have a habit of...

    I was just curious b/c vendors have a habit of changing chipsets on newer models. Sometimes the newer chipsets don't work "as well" as the others. A perfect example would be the WRT54G.

    @Jarmo can...
  4. Replies
    10
    Views
    2,780

    What chipset is it using?

    What chipset is it using?
  5. Replies
    10
    Views
    2,780

    Concerning legality in the US, check out this...

    Concerning legality in the US, check out this page:
    FccRules < SVWUX < SVWUX

    From what I have read, 1 watt is legal as long as your antenna doesn't exceed to gain limits set by the FCC. If it...
  6. Replies
    2
    Views
    1,299

    There is really no difference in "how" you are...

    There is really no difference in "how" you are connected to the host wired or wireless...it just really helps to be on the same subnet.
  7. Replies
    15
    Views
    11,419

    Fixed my issue also. Thanks!

    Fixed my issue also. Thanks!
  8. Replies
    7
    Views
    3,066

    Here's a list of bluetooth pentesting apps...

    Here's a list of bluetooth pentesting apps included in BT.

    Tools - Offensive-security.com
  9. Sorry fixed typo in previous post. Should be ...

    Sorry fixed typo in previous post. Should be

    /etc/network/interfaces
  10. My cell is my primary internet connection. I...

    My cell is my primary internet connection. I would highly recommend wmwifirouter for ICS on your Windows Mobile phone.

    Here is how you configure a linux box to work with a cell phone for...
  11. No offence, but don't be surprised if this ends...

    No offence, but don't be surprised if this ends up in the Idiot's Corner for obvious reasons.
  12. Replies
    10
    Views
    1,411

    Nothing better to try out different distros than...

    Nothing better to try out different distros than with vmware server (or vmware desktop if you have the $). Check it out
    www.vmware.com
  13. Replies
    5
    Views
    891

    Don't laugh, but I just retired mine last year. I...

    Don't laugh, but I just retired mine last year. I now tether my cell to my laptop or use WMWifiRouter to turn it into a celluar router.
  14. Brilliant

    Love the idea of the donations to the charity...
  15. Replies
    5
    Views
    7,559

    It would be more helpfull to keep someone on the...

    It would be more helpfull to keep someone on the local lan or your ISP from knowing what sites you are visiting. Anyone with any common sense should know not to access anything sensitive over tor...
  16. THANK YOU...'bout time someone spoke with a...

    THANK YOU...'bout time someone spoke with a little sense. (I would love to see this thread closed :D )
    For the real side effects, please refer to my previous post:...
  17. Replies
    2
    Views
    1,280

    Very nice, thanks for the info! Vyew looks very...

    Very nice, thanks for the info! Vyew looks very promising...
  18. This is starting to sound like those cell phone...

    This is starting to sound like those cell phone gives you cancer threads....btw, this is what really happens:

    http://farm1.static.flickr.com/33/98749662_43d8460a68.jpg?v=0
  19. Replies
    21
    Views
    3,087

    2 words...Clark Connect. Just about every school...

    2 words...Clark Connect. Just about every school in my state uses it. We have students trying to bypass our filtering 24/7. The only thing that I have seen get by it is Tor. However, with a quick...
  20. Replies
    10
    Views
    3,481

    I've had the same type issue with metasploit...it...

    I've had the same type issue with metasploit...it worked fine in BT, but not so well on Sidux. Really makes you appreciate the dev's.
  21. Replies
    20
    Views
    2,967

    http://isc.sans.org/diary.html?storyid=1537 Not...

    http://isc.sans.org/diary.html?storyid=1537
    Not having a default route in the router network is a great way to minimise the impact of malware on the corporate environment. This practice enforces...
  22. Replies
    10
    Views
    3,481

    Check this out.... Rogue Accesspoint + MitM...

    Check this out....
    Rogue Accesspoint + MitM Sniffing tutorial


    http://forums.remote-exploit.org/showthread.php?t=19048
  23. Replies
    20
    Views
    3,896

    Sorry for the confusion, but I was actually...

    Sorry for the confusion, but I was actually referring to the thread's author writing the script, not the BT dev's. ;) He could post it on his own website, linking to it from the forums. I agree, it's...
  24. Replies
    20
    Views
    3,896

    As far as bandwidth, why not use bittorrent? With...

    As far as bandwidth, why not use bittorrent? With the "bloatware" apps, why not use a script like smxi in Sidux?
  25. Replies
    5
    Views
    7,559

    {Staying anonymous}Tor- The Onion Router

    torproject.org/

    Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new...
Results 1 to 25 of 36
Page 1 of 2 1 2