Infiltrator
Dedicated Members-
Posts
4,287 -
Joined
-
Last visited
-
Days Won
22
Content Type
Profiles
Forums
Gallery
Events
Everything posted by Infiltrator
-
Are you trying to do something similar to StegHide?
-
Just out of curiosity, your wireless router is it on the same subnet as the wired network? Do both networks share the same ip address scheme. 10.0.0.X or 192.168.1.x
-
I was talking about this functionality with a friend of mine the other day, and he told me there is no way to turn this tracking functionality off. Its something that Apple made built into the phone. When I first heard about it, I was like WTF. Since this functionality can't be turned off, you can however delete the file that keeps record of your location.
-
Thanks Digip!!! Now I wonder if it was a firewall port issue or something else.
-
With Digip examples, you should be able to add those ports to the firewall. If you follow them correctly, it should work without any issues. Also what type of service are you trying to run?
-
Windows Server 2008 Network Share
Infiltrator replied to hacker07's topic in Business and Enterprise IT
He could add an exception to the antivirus, and see if that's really causing the issue. Also Microsoft made a hotfix available to correct the problem http://support.microsoft.com/kb/955427 -
Linux Using Ip Tables To Forward Webtraffic To Another Network.
Infiltrator replied to slugman's topic in Questions
Found something that may help you http://www.simplehelp.net/2009/04/15/how-to-redirect-traffic-to-another-machine-in-linux/ -
Windows Server 2008 Network Share
Infiltrator replied to hacker07's topic in Business and Enterprise IT
Check if there is a hotfix, for the problem. Edit: Also try disabling "Remote Differential Decompression" that has a tendency of slowing file transfers sometimes. This only works in Windows Vista or 7. The article that, digip suggested has some registry tweaks you can try, to boost file transfer performance in XP. In the past, I had a lot of issues with XP, so I decided to ditch in favor of Win 7. Besides tweaking the registry, you could also try enabling jumbo frame support on your network. A few things to be aware of tough are, your NIC and switch much support jumbo frame, in order for this to work. -
I found this discussion on Subnetting on Tom'shardware website, quite interesting I think its worth a read, just to get some general idea of how to tackle your situation. http://www.tomshardware.com/forum/21918-42-setting-network-subnets
-
First off all, does your router support RIP protocol? If it does, you will need to enable it and specify the subnets.
-
You cannot delete it, did u log in with an administrator account at all?
-
Sorry double post, connection kept on dropping out.
-
That's the problem with malware, viruses and worms in general. They can come from anywhere. 1) Email attachments 2) Infected USBs 3) Infected PCs on a network 4) From the internet, by visiting websites 5) From network file sharing apps, such Limewire, Emule or Torrents. To minimize the risks of infections, always keep your computer software updated, have a good antivirus installed and always maintain it updated. Don't go clicking on links or downloading files that you are not certain where they are from. The above should keep you safe. Furthermore, if I am going to do something that I know it's going to infect my PC, I always use Vmware or Virtual Box to create a virtual machine where the infection will be contained within the VM itself.
-
A friend of my mum, asked me to take a look at her computer and determine the cause why it was running so slowly. After analyzing it for sometime, discovered it was infected with more than 5 different types of Malware and Trojan. Whenever I opened an Internet Explorer window, at the title bar I could read the very same line "Ygoow And Moorhunt". If I were you I would run a full virus scan and if that doesn't fix the issue, reinstall Windows. Good luck.
-
Yeah that's already fixed.
-
Hello, online shoppers! Today we have new and improved products from online stores at the low, low price of free! That's right, security researchers discovered how to exploit security holes in a software development kit from Amazon Payments so that anyone with a computer and about $25 can be a "qualified attacker." If a person exploited logic flaws, then that malicious shopper could purchase at "an arbitrarily-set price, shop for free after paying for one item, or even avoid payment." Full story: http://www.networkworld.com/community/node/72919
-
Critical Nasa Network Was Open To Internet Attack
Infiltrator replied to Infiltrator's topic in Security
They should employ some white hat personnel to do the computer security for them. -
That's something I would not risk. I would make sure, I did not include the memory card, or would buy a new one as a replacement. For the physical memory, I would try to run some kind of software to destroy any evidence.
-
Top 10 Most Famous Hackers Of All Time
Infiltrator replied to Infiltrator's topic in Everything Else
Maybe he wasn't a very notorious hacker for what he did. Taking down websites everyone can do nowadays. But what made Kavin truly known to the public, was the way how he manipulated people into disclosing confidential information. Kevin was a truly master of Social Engineering. -
No need to apology, at some point in our lives we must go through some obstacles. That's why we never stop learning. Its also important to note that, not all systems are going to be easily exploitable. There are ways to make your system vulnerable. Read this article, it should help you understand how to use Metasploit better, besides there are tons of videos to watch in Youtube.com and Irongeek.com http://www.offensive-security.com/metasploit-unleashed/Introduction
-
See if its under /pentest/payloads/ directory.
-
Top 10 Most Famous Hackers Of All Time
Infiltrator replied to Infiltrator's topic in Everything Else
I know what you mean, but I didn't publish the article. And yes, I don't see Kevin as a black hat either. Tough back in the old days, but nowadays hes changed. -
I bet some of you didn't know, but its a worth a shot of knowing them. Black Hat Crackers The Internet abounds with hackers, known as crackers or "black hats," who work to exploit computer systems. They are the ones you've seen on the news being hauled away for cybercrimes. Some of them do it for fun and curiosity, while others are looking for personal gain. In this section we profile five of the most famous and interesting "black hat" hackers. Jonathan James Adrian Lamo Kevin Mitnick (My favorite hacker) Kevin Poulsen Robert Tappan Morris White Hat Hackers Hackers that use their skills for good are classified as "white hat." These white hats often work as certified "Ethical Hackers," hired by companies to test the integrity of their systems. Others, operate without company permission by bending but not breaking laws and in the process have created some really cool stuff. In this section we profile five white hat hackers and the technologies they have developed. Stephen Wozniak Tim Berners-Lee Linus Torvalds Richard Stallman Tsutomu Shimomura If you want to know more about them, just visit the link below. http://www.itsecurity.com/features/top-10-famous-hackers-042407/
-
What Is The Cheapest Gaming Laptop That Works Good Out There?
Infiltrator replied to damian's topic in Gaming
Couldn't agree more, but you know how much they cost a lot. And besides WOW is not a very resource demanding game. I've seen college of mine, playing it before and even a budget laptop can run it without any complain. Any $500 dollars or $1000 dollar laptop will run WOW just fine. Just make sure it has a good CPU clock speed and plenty of RAM.