Search found 128 matches

by phiber
Mon Oct 22, 2007 11:41 pm
Forum: General Forum
Topic: IT forum game
Replies: 216
Views: 86190

Re: IT forum game

- phreaking
by phiber
Mon Oct 22, 2007 8:22 pm
Forum: General Forum
Topic: IT forum game
Replies: 216
Views: 86190

IT forum game

It's simple:

1st, someone writes a word. Next step is to write a word which STARTS with the last letter of the previous word.
Stupid? Yes.
Therefore, let's do it :D

Rules:
- it has to be a word from IT dictionary.

Example:
1st word: network
2nd word: kerberos

I'll go first:

- Ethernet
by phiber
Thu Aug 16, 2007 12:16 am
Forum: Security Forum
Topic: Security through obscurity
Replies: 5
Views: 4500

Re: Security through obscurity

In computer security, security through obscurity (security by obscurity) is a controversial principle in security engineering, which attempts to use secrecy (of design, implementation...) to provide security. A system relying on security through obscurity may have theoretical or actual security vul...
by phiber
Wed Aug 15, 2007 1:06 pm
Forum: Security Forum
Topic: Security through obscurity
Replies: 5
Views: 4500

Security through obscurity

Who practices security through obscurity and in which environment? (environment == home, office)

Is it enough? Was it sufficient?
by phiber
Fri Aug 10, 2007 8:47 am
Forum: Web Development
Topic: Word search solver
Replies: 5
Views: 7562

Re: Word search solver

I don't. :twisted:
Perhaps I'll like it when I try it :D
by phiber
Thu Jul 26, 2007 4:07 pm
Forum: Unix Security Discussions
Topic: Irrelevant?
Replies: 13
Views: 26662

Re: Irrelevant?

Quaon wrote:Like I said before, since there are a million different combinations for the different versions, wouldnt it be impossible to write a virus for any of the linux machines? Assuming the kernal is completely protected of course.
Got your point but it all comes down to what one would define as "virus".
by phiber
Thu Jul 26, 2007 2:07 pm
Forum: Microsoft Security Discussions
Topic: Fake Windows 2000 Login Screen
Replies: 6
Views: 7471

Re: Fake Windows 2000 Login Screen

SchoolHacka wrote:Are you talking image, or sub-routine?
a fake login screen would need a textbox control (so the user may type there), right? right.
therefore, in any-way, it has to be a program. basic VB programming will suffice.
by phiber
Thu Jul 26, 2007 7:43 am
Forum: Windows Forum
Topic: Windows Vista
Replies: 91
Views: 38629

Re: Windows Vista

Hey Scoolhacka... there's a BETA SERVICE PACK available for your favourite OS. :lol: :lol:
by phiber
Thu Jul 26, 2007 7:40 am
Forum: Unix Security Discussions
Topic: Irrelevant?
Replies: 13
Views: 26662

Re: Irrelevant?

does anybody remember the phf bug back from the... ninetees? :) it is still out there, although some servers have it faked on purpose. But to stay on-topic... for ex.: linux kernels lately have local privilege escalation vulnerabilities. The nature of this vulnerabilities is that they are harder to ...
by phiber
Tue Jul 24, 2007 7:04 pm
Forum: General Forum
Topic: Please don't spam.
Replies: 5
Views: 4188

Re: Information

LOL.
let's ban him... [done], then change his posts a bit [done]...
which should teach future advertisers a lesson.