- Strength to Increase Rep
- +7
- Strength to Decrease Rep
- -1
- Upvotes Received
- 10
- Posts with Upvotes
- 9
- Upvoting Members
- 9
- Downvotes Received
- 0
- Posts with Downvotes
- 0
- Downvoting Members
- 0
Senior Security d00d
- Interests
- Computers, SCUBA, flying, reading, riding, BSD, computers, ...
- PC Specs
- ...too many to list :)
Re: Is this a machine at home or at work? | |
Re: It depends on the switch - some models don't require them, others do. If you don't want to spend the money on switches, since you already have 2 hubs, just connect the hubs together with a crossover cable. There should be ports marked on the hubs to indicate where the … | |
Re: One thing to keep in mind - if you bypass your company's proxy server to gain access to unauthorized websites, you may be violating your company's network/security/Internet access policy, which in some companies is grounds for termination. Is it worth it to lose your job because you just had to … | |
Re: Rewrite the syslog protocol to use TCP by default, using an SSL tunnel. That'd sure make MY life easier.. | |
Re: With OpenOffice.org you have compatability across platforms, something you don't have with KDEOffice. If you're not going to be sharing documents with anyone, KDEOffice is fine, but there's a lot of functionality that OpenOffice.org has that KDEOffice is still missing. Also, OOo actually has support (mostly fee-based) that KO doesn't … | |
Re: [QUOTE=Mosco]I tryed it d:/www/.htpasswd and d:\www\.htpasswd None of them seem to work.! Yes the password file is in the riht dir.[/QUOTE] If you're trying to limit access on a particular directory within your /www/ directory, you have to first create a user account and password using the htpasswd utility using … | |
Re: I remember the days of running eggdrops on irc... Somewhere I still have some of my old scripts, but unless everyone's on irc, they don't do much good :/ | |
Re: chmod 777 /path/to/samba/share provided you want everyone to have read+write access [b]man chmod[/b] for more info about assigning attributes to a directory/file | |
Re: You can't. To sniff it would mean that someone else has the username/password, and you would sniff it out of the network traffic to the router. Since you don't KNOW what it is, you can't sniff it. You'll probably have to reset the router, then reset your username/password, and restore … | |
Re: [url]http://unixfun.net/howto/bsd/proxy.html[/url] If you allow traffic out on TCP 443, here's one way of bypassing your proxy. I've been doing this for awhile now. Of course, it's just a matter of finding out which ports are blocked from the inside and finding one that's open in the event 443 is closed, … | |
Re: Try running Wireshark on the new computer to see the details about the traffic. You'll be able to determine if the machine is trying to send out spam once it has an Internet connection, and you can see where that traffic is destined, as well as any other outbound connections … | |
Re: ...or install TweakUI, and change the option to clear computer history at login/logoff. You can also clear the "Run.." history, and a ton of other stuff with it. Best of all, it's FREE :) | |
Re: [QUOTE=jg440] My issue is email. I am using mailenable standard. I can recieve mail fine. I can not send mail. Is anyone running an email server through optonline??[/QUOTE] I've been running mail(imap & pop3)/web/ftp/icecast/gnump3d servers for awhile now (some over 3 years) and haven't had a problem yet. I've never … | |
Re: Try asking that question again without letting the cat walk on the keyboard so we can understand WTF you're saying. | |
Re: Do what Ancient Dragon suggested and practice. I'll add this: read. I'll add this as well: You won't get too much information by asking people "how to become a hacker", and you won't be taken seriously. | |
Re: It's not just the 4-foot cable - it's across your LAN, and if wireless is added to the mix, it's now in the air (unless you know for a fact that your key hasn't been compromised.) Also, if you're sending login credentials to your router, they should be over HTTPS. … | |
Re: Sure, I'd be happy to contact you, but [snipped] or [snipped] are both out of service/disconnected. | |
Re: [url]http://www.google.com[/url] | |
Re: You can add the code to the shell script. I'm guessing you're doing a MySQL dump of the data into a .sql file? Just add another line to the shell script to tar -czf {file.sql}. Either that or provide more details on what the shell script is doing in the … | |
Re: You mean aside from committing a felony and breaking your ISP's TOS? If you really don't know that much about it, I'd suggest you learn how to setup a secure proxy. By the time you learn enough about what's involved, you'll realize they'd be better off just using Tor. | |
Re: Have you bothered to read the manual to see if it changed? Did you try connecting to it over a LAN connection first to make sure it isn't a WiFi issue? No? The problem seems to be either PEBCAK or an ID-10-T error.. | |
Re: You mentioned audio in your OP. If 30 laptops are going to connect to a single app server over WiFi on 2 APs, you'll either have to limit the bandwidth to each wireless client that connects, or add another 5 or 6 APs to your network to handle the load. … | |
Re: Make sure the WiFi NIC is configured for DHCP, and nothing is hardcoded (DNS, WINS, etc.). The address range 169.254.0.0/16 is used when a valid DHCP lease can't be updated or acquired. | |
Re: I'd recommend learning how to type using full and complete sentences, with proper spelling and pronunciation. I'd hate trying to read the first paragraph of your resume if that's how you type.. | |
Re: You can also try (as root): [code] # chmod 755 /dev/dsp [/code] | |
Re: From what you stated, you did everything properly, but it's weird that you had that issue with both drives. I've seen times where you have to boot from the master (CD/DVD) drive when there are 2 installed, but never had both fail to spin up before. Luckily you solved your … | |
Re: The name of the firewall script is usually called rc.firewall, and located in /etc or /etc/rc.d/ IPTABLES is the current program (IPCHAINS I think was last in RH 6.3, but I could be wrong, since I don't use RH) There are some good examples of a firewall script for IPTABLES … |