Posts
 
Reputation
Joined
Last Seen
Ranked #348
Strength to Increase Rep
+7
Strength to Decrease Rep
-1
100% Quality Score
Upvotes Received
10
Posts with Upvotes
9
Upvoting Members
9
Downvotes Received
0
Posts with Downvotes
0
Downvoting Members
0
4 Commented Posts
3 Endorsements
Ranked #486
Ranked #1K
~144.11K People Reached
About Me

Senior Security d00d

Interests
Computers, SCUBA, flying, reading, riding, BSD, computers, ...
PC Specs
...too many to list :)
Member Avatar for samaru
Member Avatar for cajunsunshine
Member Avatar for oalee

It depends on the switch - some models don't require them, others do. If you don't want to spend the money on switches, since you already have 2 hubs, just connect the hubs together with a crossover cable. There should be ports marked on the hubs to indicate where the …

Member Avatar for mason_nosam
0
1K
Member Avatar for kalel21

One thing to keep in mind - if you bypass your company's proxy server to gain access to unauthorized websites, you may be violating your company's network/security/Internet access policy, which in some companies is grounds for termination. Is it worth it to lose your job because you just had to …

Member Avatar for CCProxy
0
4K
Member Avatar for frankycool
Member Avatar for aprajita jha
0
1K
Member Avatar for bigpoppapumpg

With OpenOffice.org you have compatability across platforms, something you don't have with KDEOffice. If you're not going to be sharing documents with anyone, KDEOffice is fine, but there's a lot of functionality that OpenOffice.org has that KDEOffice is still missing. Also, OOo actually has support (mostly fee-based) that KO doesn't …

Member Avatar for tyson567
0
421
Member Avatar for Mosco

[QUOTE=Mosco]I tryed it d:/www/.htpasswd and d:\www\.htpasswd None of them seem to work.! Yes the password file is in the riht dir.[/QUOTE] If you're trying to limit access on a particular directory within your /www/ directory, you have to first create a user account and password using the htpasswd utility using …

Member Avatar for isouza
0
446
Member Avatar for AlPhA

I remember the days of running eggdrops on irc... Somewhere I still have some of my old scripts, but unless everyone's on irc, they don't do much good :/

Member Avatar for Progr4mmer
0
696
Member Avatar for Dani

chmod 777 /path/to/samba/share provided you want everyone to have read+write access [b]man chmod[/b] for more info about assigning attributes to a directory/file

Member Avatar for xiejiangtian
0
3K
Member Avatar for Dark_Phoenix

You can't. To sniff it would mean that someone else has the username/password, and you would sniff it out of the network traffic to the router. Since you don't KNOW what it is, you can't sniff it. You'll probably have to reset the router, then reset your username/password, and restore …

Member Avatar for happygeek
0
281
Member Avatar for nizzy1115

[url]http://unixfun.net/howto/bsd/proxy.html[/url] If you allow traffic out on TCP 443, here's one way of bypassing your proxy. I've been doing this for awhile now. Of course, it's just a matter of finding out which ports are blocked from the inside and finding one that's open in the event 443 is closed, …

Member Avatar for stokes1900
0
5K
Member Avatar for Ritesh_4

Try running Wireshark on the new computer to see the details about the traffic. You'll be able to determine if the machine is trying to send out spam once it has an Internet connection, and you can see where that traffic is destined, as well as any other outbound connections …

Member Avatar for Ritesh_4
0
189
Member Avatar for xjenn1130x

...or install TweakUI, and change the option to clear computer history at login/logoff. You can also clear the "Run.." history, and a ton of other stuff with it. Best of all, it's FREE :)

Member Avatar for BobMaria
0
275
Member Avatar for jg440

[QUOTE=jg440] My issue is email. I am using mailenable standard. I can recieve mail fine. I can not send mail. Is anyone running an email server through optonline??[/QUOTE] I've been running mail(imap & pop3)/web/ftp/icecast/gnump3d servers for awhile now (some over 3 years) and haven't had a problem yet. I've never …

Member Avatar for duodu
0
1K
Member Avatar for xixixi

Try asking that question again without letting the cat walk on the keyboard so we can understand WTF you're saying.

Member Avatar for NewbieXcellence
0
111
Member Avatar for rinoa0424

Do what Ancient Dragon suggested and practice. I'll add this: read. I'll add this as well: You won't get too much information by asking people "how to become a hacker", and you won't be taken seriously.

Member Avatar for Narue
0
215
Member Avatar for NewbieXcellence

It's not just the 4-foot cable - it's across your LAN, and if wireless is added to the mix, it's now in the air (unless you know for a fact that your key hasn't been compromised.) Also, if you're sending login credentials to your router, they should be over HTTPS. …

Member Avatar for ryan461
0
125
Member Avatar for tyrell.hawkins

Sure, I'd be happy to contact you, but [snipped] or [snipped] are both out of service/disconnected.

Member Avatar for TheOgre
0
80
Member Avatar for nissiinfotech
Member Avatar for floris

You can add the code to the shell script. I'm guessing you're doing a MySQL dump of the data into a .sql file? Just add another line to the shell script to tar -czf {file.sql}. Either that or provide more details on what the shell script is doing in the …

Member Avatar for TheOgre
0
247
Member Avatar for aman007
Member Avatar for Dirus

You mean aside from committing a felony and breaking your ISP's TOS? If you really don't know that much about it, I'd suggest you learn how to setup a secure proxy. By the time you learn enough about what's involved, you'll realize they'd be better off just using Tor.

Member Avatar for TheOgre
0
188
Member Avatar for fluffinator007
Member Avatar for TheOgre
0
167
Member Avatar for GiPonRa

Have you bothered to read the manual to see if it changed? Did you try connecting to it over a LAN connection first to make sure it isn't a WiFi issue? No? The problem seems to be either PEBCAK or an ID-10-T error..

Member Avatar for TheOgre
0
56
Member Avatar for GregPan

You mentioned audio in your OP. If 30 laptops are going to connect to a single app server over WiFi on 2 APs, you'll either have to limit the bandwidth to each wireless client that connects, or add another 5 or 6 APs to your network to handle the load. …

Member Avatar for TheOgre
0
136
Member Avatar for vndlyndstrs

Make sure the WiFi NIC is configured for DHCP, and nothing is hardcoded (DNS, WINS, etc.). The address range 169.254.0.0/16 is used when a valid DHCP lease can't be updated or acquired.

Member Avatar for TheOgre
0
159
Member Avatar for ANKITAbhatia

I'd recommend learning how to type using full and complete sentences, with proper spelling and pronunciation. I'd hate trying to read the first paragraph of your resume if that's how you type..

Member Avatar for TheOgre
-3
56
Member Avatar for trashed
Member Avatar for TheOgre
0
136
Member Avatar for Thanh-BKK

From what you stated, you did everything properly, but it's weird that you had that issue with both drives. I've seen times where you have to boot from the master (CD/DVD) drive when there are 2 installed, but never had both fail to spin up before. Luckily you solved your …

Member Avatar for anusha11
0
396
Member Avatar for spikes

The name of the firewall script is usually called rc.firewall, and located in /etc or /etc/rc.d/ IPTABLES is the current program (IPCHAINS I think was last in RH 6.3, but I could be wrong, since I don't use RH) There are some good examples of a firewall script for IPTABLES …

Member Avatar for princealway
0
199