Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations SkipVought on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Search results for query: *

  1. DarkShad

    Javascript security

    Exploits make it possible to enter abitrary code which infact could disrupt some systems by the use of that code into html pages. Java tags alone seems to play little towards disruption, active x would be another story.
  2. DarkShad

    SNOOPERS

    You presented a two part question, on the second half can anyone read your email messages. That is to say without know your internet password ect. Yes, if they have some aquired knowledge about computers or computer programs. Your have messages in your inbox or saved areas, that may be able...
  3. DarkShad

    SNOOPERS2

    Known exploits have made it possible to enter arbitrary code through an html page. This leave a known fault with IE susceptable to access trough the execution of this code. Thus the hacker can gain entry via gateway to your system and leave "backdoor server and client" programs to...
  4. DarkShad

    Which is better?

    Security has always been a problem in a classroom enviroment, on one hand you have students who need to access there files without lenghty password schemes and on the other hand the students may choose to violate your trust by downloading viruses, enter chat channels, etc. Use of a shared files...
  5. DarkShad

    dropped packets?

    In order to connect to TCP, a hacker must be able to see the responses. This is because the server will send the hacker its "Initial Sequence Number (ISN)", which must used in all of the subsequent packets sent to the server. Therefore, blind IP spoofing will not work with TCP, in...
  6. DarkShad

    Cheap firewall solution?

    I know that I have pushed this product on the forum to much already, though I am sold on the inexpensive, highly secure firewall software offered at Network ICE. Consider using BlackICE Defender, it has grate support at its site, it has been tested against high dollar firewall systems and came...
  7. DarkShad

    protecting financial information

    It is my opinion if you keep any financial infomation on-line, you should consider managing the information on your own system, and using redundant back-up processes, but most of all consider using Black Ice Defender program. It is cheap and effective and in testing the programs out performed...
  8. DarkShad

    Denial of Service using Nameservers

    You are most probably right about the IP spoofing, you may wish to view some of this text at this link. http://www.cis.ohio-state.edu/htbin/rfc/rfc2267.html Hope this will help you.

Part and Inventory Search

Back
Top