Search:

Type: Posts; User: dontquoteme; Keyword(s):

Search: Search took 0.03 seconds.

  1. Replies
    22
    Views
    2,700

    Re: OPT OUT of PRISM

    There are multiple services you can use to avoid or negate data mining and data collection.

    Clearly if the data is stored - the government will raise a court order to obtain that information, so...
  2. Replies
    7
    Views
    2,161

    [ubuntu] Re: Wireless is disabled by hardware switch

    I had network manager generate this error yesterday. (Exact same errors about hardware...)
    In a fit of temper.... went to software centre....

    Used software centre - WICD Network Manager -...
  3. Replies
    31
    Views
    1,740

    [ubuntu] Re: Wifi security

    My question would be how much do you trust your friends?
    They can easily give away the preshared key - or share it with girlfriends etc. If the girlfriends carry out illegal stuff? But you're...
  4. Replies
    7
    Views
    1,006

    [ubuntu] Re: Question about keyloggers

    As stated earlier, there are many methods of keylogging - most of those I've seen in action send entire screenshots back - and can be configured to isolate the information that is wanted. They can...
  5. Replies
    39
    Views
    4,487

    [ubuntu] Re: Cannot connect to www.google.com!!

    Found an interesting solution that might be worth doublechecking - as this fault varies website by website (it's a TCP setting) and triggers the error you're getting in Wireshark:
    ...
  6. Replies
    39
    Views
    4,487

    [ubuntu] Re: Cannot connect to www.google.com!!

    Prehaps you can use the /etc/hosts to your advantage.
    1.Ping Google from one of your other machines to get the local IP for Google.ro.

    2. Edit your /etc/hosts file to include the IP for the...
  7. Replies
    39
    Views
    4,487

    [ubuntu] Re: Cannot connect to www.google.com!!

    The good news is that if you can connect to other sites that rules out your Linux pc, routers, and configuration - everything is fine with your setup.

    The interesting news is that many others have...
  8. Replies
    20
    Views
    2,827

    [SOLVED] Re: SYN trickle attack (not flood)

    There was a high degree of preference for port numbers in binary to be simple sequences.
    ********

    I'm not sure if I've understood what you meant by binary sequence here... so dug up the...
  9. Replies
    11
    Views
    1,434

    [ubuntu] Re: Iptables query

    I hope these help. It's a guide to the top 25 rules to use with IPtables - to get you started in a safe manner. We all start with copy and paste. :)

    25 Most Frequently Used Linux IPTables Rules...
  10. Replies
    20
    Views
    2,827

    [SOLVED] Re: SYN trickle attack (not flood)

    *Smiles*

    A RST is to use the system against itself. The Art of War - always use the resources of the system against itself.

    You've no doubt closed down ping etc. But if the attacker can...
  11. Replies
    2
    Views
    3,766

    [ubuntu] Re: printer installation

    Ubuntu limits root access by default, which as a new user is one of the first sources of problems.
    By default, the Root account password is locked in Ubuntu. This means that you cannot login as...
  12. [ubuntu] Re: wicd wpa_supplicant "bad password" problem & workaround

    I've experienced this error message first hand, so know what you all mean.. it's pretty frustrating.

    Normally this error means that there's a mismatch in the encryption between
    * Router
    *...
  13. [ubuntu] Re: Do firefox add-ons and apparmor give full protection against attack due to browin

    It's worth suggesting that you try the startpage.com Proxy which has SSL options for viewing pages.

    www.startpage.com
    Startpage does not record your IP!! And they don't resell on your data like...
  14. Replies
    20
    Views
    2,827

    [SOLVED] Re: SYN trickle attack (not flood)

    Yay! Great find!

    Fyodor is the guru on Zombie scans.
    http://nmap.org/book/idlescan.html

    Idle scanning can sometimes be used to map out these trust relationships. The key factor is that idle...
  15. Replies
    20
    Views
    2,827

    [SOLVED] Re: SYN trickle attack (not flood)

    You asked for an opinion as to a purpose of such light scanning.

    Could this be reconnaissance to locate a zombie printer or idle dumb device - that's trusted inside your network?
    This attack...
  16. Replies
    31
    Views
    2,623

    [SOLVED] Re: Which is better Desktop Environment?

    Using Cinnamon on Ubuntu 11.10.

    Awesome. ;p Love the feel of it's menu system.

    Here's the "How to"

    Install Linux Mint's New Cinnamon desktop...
Results 1 to 16 of 19