Search:

Type: Posts; User: GunMonkey; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.00 seconds.

  1. Replies
    0
    Views
    1,399

    Access control for Hyper-V

    Hey everyone. My school is currently running a hyper-v server (server 2008 datacenter) for a wsus/SCCM class. The hyper-v client and server do not have native access control past the...
  2. Replies
    9
    Views
    2,787

    I think I'm in more trouble than that. What I...

    I think I'm in more trouble than that. What I thought was the raid controller... isn't. It would seem the scsi/raid controller is missing. I'm pretty sure its impossible to rebuild the data without...
  3. Replies
    9
    Views
    2,787

    Yup, I do know that much. However, we have no...

    Yup, I do know that much. However, we have no clue what raid level was used. They could be all mirrored, though that is pretty unlikely.
  4. Replies
    9
    Views
    2,787

    pulling informaton from raid

    Alright, I have a bit of a hum-dinger (forgive the term) I'm with a team that needs to pull data off a computer with raid. The challenge:

    1) One of the 9 drives was stolen
    2) The server is...
  5. Hmm. Interesting. I wonder how often ISP's use...

    Hmm. Interesting. I wonder how often ISP's use packet sniffers and record data as well.

    I might make this the topic of my final in my Information Assurance class.
  6. Discussioni: Wifi Jamming

    by GunMonkey
    Replies
    49
    Views
    14,837

    Make a faraday cage? :P

    Make a faraday cage?

    :P
  7. Replies
    7
    Views
    1,770

    I wonder how many script kiddies will jump on...

    I wonder how many script kiddies will jump on this one. :rolleyes:

    I suppose it isn't a crime to make money off the idiot's of the world? I see another marketing scheme: An outlet finder. Free...
  8. Discussioni: MS fined yet again

    by GunMonkey
    Replies
    63
    Views
    6,433

    "But Keynote and Safari could indicate some...

    "But Keynote and Safari could indicate some tension developing between Microsoft and Apple. In August, the two companies let lapse a five-year deal that required Microsoft to develop software for the...
  9. Discussioni: MS fined yet again

    by GunMonkey
    Replies
    63
    Views
    6,433

    Are you suggesting that MS is the only provider...

    Are you suggesting that MS is the only provider of OS's in the world? I certainly hope not.

    Lets take your analogy of GM. GM does make cars, yes, and owns several other companies now. Make certain...
  10. Discussioni: MS fined yet again

    by GunMonkey
    Replies
    63
    Views
    6,433

    Hmm. MS is a borderline monopoly. Essentially, to...

    Hmm. MS is a borderline monopoly. Essentially, to be a monopoly you need not only make an item, but control every facet of that item's construction AND (big emphesis on the and) prevent others from...
  11. Replies
    14
    Views
    3,466

    It would be a challenge, yes. But we aren't in IT...

    It would be a challenge, yes. But we aren't in IT because it's easy, right?

    The idea was more to prevent unauthorized devices from connecting to the network. If the military wanted in, they would...
  12. Replies
    9
    Views
    2,483

    http://forums.remote-exploit.org/showthread.php?t=...

    http://forums.remote-exploit.org/showthread.php?t=9063

    Also, make certain that your wnic supports injection and is in monitor mode.
  13. Discussioni: vnc client

    by GunMonkey
    Replies
    1
    Views
    1,775

    Wait, are you asking if there is a VNC client...

    Wait, are you asking if there is a VNC client that will give the server control of the client computer? I haven't seen one, but you could install both the server and client on both machines. It would...
  14. Replies
    14
    Views
    3,466

    Well, I was thinking the full wireless channels....

    Well, I was thinking the full wireless channels. 6, 8, 11, etc. Well aware of how spread spectrum works, but I was hoping AP's could do this without breaking connection with clean wireless clients....
  15. Replies
    14
    Views
    3,466

    Scanning and Jamming wireless

    This is a hypothetical and (very much) theoretical idea.

    I was wondering how possible it would be to jam WNICs in, say, a corporation. Let me give you a run down of the theory:

    The AP's and...
  16. Replies
    55
    Views
    17,488

    I'm using a Linksys WMP11 2.7 Has worked like...

    I'm using a Linksys WMP11 2.7

    Has worked like a charm without any extra commands or code. I was able to crack both my wep and wpa encryption in very little time (granted, I used an easy PSK and...
  17. Discussioni: MS fined yet again

    by GunMonkey
    Replies
    63
    Views
    6,433

    That's odd, considering there are networks in the...

    That's odd, considering there are networks in the states that run Windows and Linux servers hand in hand. Samba takes care of the problem rather nicely.

    MS Office can't utilize Open Office files,...
  18. Replies
    198
    Views
    98,378

    Thanks for seeding :) I'll leave it up as well,...

    Thanks for seeding :) I'll leave it up as well, but ETA is 37 hours.
  19. Discussioni: MS fined yet again

    by GunMonkey
    Replies
    63
    Views
    6,433

    My beef isn't the fact that MS is pretty ruthless...

    My beef isn't the fact that MS is pretty ruthless when it comes to business practices, or that it has so much of the market. My irritation has always been with their inability to relax their death...
  20. Replies
    27
    Views
    2,924

    This link may hold all the wisdom you need at the...

    This link may hold all the wisdom you need at the moment:

    click me
  21. Discussioni: Secuirty Certs

    by GunMonkey
    Replies
    13
    Views
    1,710

    Have you tried applying for internships? All...

    Have you tried applying for internships?

    All the intern/entry level security jobs I've seen so far require a junior level in a security focused major and current enrollement in a security program....
  22. Discussioni: MS fined yet again

    by GunMonkey
    Replies
    63
    Views
    6,433

    Nah, what they need to do is create a doubling,...

    Nah, what they need to do is create a doubling, exponential fine. Every day they refuse to comply, the fine doubles itself. Payment must be made every month, but does not diminish the fine.

    So...
  23. Discussioni: Laptop Exploit

    by GunMonkey
    Replies
    18
    Views
    1,723

    the problem isn't encryption, its the method that...

    the problem isn't encryption, its the method that the OS stores the key. When you use an integrated encryption program, like bit locker, windows uses your account as a key, so to speak. When you log...
  24. Discussioni: Laptop Exploit

    by GunMonkey
    Replies
    18
    Views
    1,723

    That is an excellent idea. I knew that some...

    That is an excellent idea. I knew that some companies have used hot glue guns to seal USB ports, buts I hadn't thought of sealing the memory sticks. The GPS units wouldn't work, however, since the...
  25. Discussioni: Laptop Exploit

    by GunMonkey
    Replies
    18
    Views
    1,723

    I recall asking for ideas, not a full paper that...

    I recall asking for ideas, not a full paper that I can copy and paste from.

    Thus far my group has come up with:

    A) modifying the acceptable usage policy
    B) disabling boot to USB abilities via...
Results 1 to 25 of 36
Page 1 of 2 1 2