Jump to content

Infiltrator

Dedicated Members
  • Posts

    4,287
  • Joined

  • Last visited

  • Days Won

    22

Everything posted by Infiltrator

  1. You could migrate the OS to a virtual machine, but migrating it to a new hardware platform, it might work but you will definitely run into some hardware or software compatibility issues.
  2. I don't know if virtual box has a setting that will allow you to take advantage of more than one CPU core. I know that VMware does. You might want to check this option out. Whether you are using x32 bit version of the Virtualbox or not that should not affect the performance. You could give the x64 bit version of VMware or Virtualbox a try to see if that yields any performance. However I still think you should increase your physical ram a little bit, because 3gigs doesn't seem enough, to run a guest and host at the same time. By the way what host OS are you running?
  3. Found some info regarding xploits and how they work. http://www.antionline.com/showthread.php?t=258693 http://www.avg-antivirus.net/index.php?opt...icle&id=112 http://linuxdevcenter.com/pub/a/linux/2006...codes-work.html Books on exploits http://www.fishpond.com.au/Books/Computers...ywords=exploits http://www.fishpond.com.au/Books/Computers...ywords=exploits http://www.fishpond.com.au/Books/Computers...ywords=exploits
  4. First download the source from this link http://openvpn.net/ Darren did a segment on PPTP and openVPN and I recommend you watching it. http://www.hak5.org/episodes/episode-612 http://www.hak5.org/episodes/episode-604 http://www.hak5.org/episodes/episode-605 This link will explain the process of configuring it. http://www.itsatechworld.com/2006/01/29/ho...figure-openvpn/ Let me know if you need any assistance, you can PM if you like.
  5. I liked your idea very much. As a suggestion, you guys could also put up a product review page, where other users could write up their own experience, likes or dislikes about a particular product. Apart from that, I give you guys credit. Great work keep it up.
  6. 1. My Family 2. My Own Room 3. My Own Computer 4. My Remote Control Toys 5. My Bank account.
  7. Write down your idea and document it. Make a mock up of your idea and get real users to try it out, and let them send to you their feedback. That way, if there is anything that sucks up it can be improved. And who knows it might become a real and a popular site one day.
  8. Sorry the port cannot be changed. You can however install openVPN and change from its default port to 80, 443.
  9. Welcome to the Hak5 forums, let me know if I can be of an assistance to you.

  10. Will I ever get a high salary paid job Will I ever find the right chick Will I ever realize my dreams Will I ever own a Mansion ?????????????????????????
  11. At your 2K3 machine is there any firewall active? Can you ping the 2K3 from any other machine on the network? At one stage during, my SSH Server configuration, I had to generate certificates, have you done it at all? Make sure you have the correct permissions on the user account in order to access the SSH server, if not that could be reason you are receiving Access is Denied.
  12. I know that implementing a domain controller is one step, in controlling access but there are other steps to control the flow of the information, than just adding one step. And sorry I got a bit carried away with the topic, my bad
  13. Another thread with same topic, can be found here http://www.hak5.org/forums/index.php?showtopic=17003
  14. Vaco's statement is valid, there is clearly a difference between a good hacker and a bad hacker. What just happened is a classic example of a gray hat hacker.
  15. And it doesn't stop honey, there are lots more to learn too.
  16. Very good observation you made there, I guess that will depend on how the school want to use the network. I think connecting to a central server, would be a good option cause you can control what users do and how the information is accessed. But if routing is required between the vlan groups, that could be enabled from the switch web-based admin interface, that is if the switch is a layer 3 device, because most layer 2 switches does not have routing capabilities, unless there is a router in between.
  17. Yes you are correct, there will be a slow down due to the traffic being routered between the Vlan groups. And tough it provides organizations with a good opportunity to segment their network. I think in terms of network management, Vlans will do a better job.
  18. These are good places to start learning subnetting http://www.ralphb.net/IPSubnet/ http://www.firstnetsecurity.com/library/mi...orialMaster.PDF http://www.cisco.com/en/US/tech/tk365/tech...0800a67f5.shtml
  19. Nice one Donkey, sorry I meant D1g1ta1
  20. I've ditched my 2wire modem a long time ago to a NetCom but it only offers HTTP for remote web administration no HTTPS. I did a bit of researching on the net but could not find any modem that is cable of using HTTPS for remote web administration. Perhaps someone here in these forums might have the answer.
  21. If you want to break down the network into small sub networks, I would first recommend learning how ip subnet works and once you fully understand. Buy a network switch that has Vlan capabilities. Creating vlans would be the best practice to segment your network, and that will also improve your network performance, as each subdomain will have its own broadcasting domain. For example say the school has 100 PCs. You break it down into 4 groups or 4 vlan groups each one of them holding a total of 25 nodes each. The good thing about this approach is security, one subnet can not interfere or talk to the other one unless you have configured some routing protocol like Rip Or IGMP. Hope this helps.
  22. I would definitely go with the second option, Dell box rather than buying a Fonnera box. Secondly, you can configure untangle to be a firewall as well, but you can however install comodo to strengthen the security.
  23. I am a very cheap person, so freeware/opensource suff is a must for me. I get really annoyed when I have to revert to something that is closed source.
  24. What's the attachment size, you are trying to upload?
×
×
  • Create New...