Jump to content


Dedicated Members
  • Posts

  • Joined

  • Last visited

  • Days Won


Everything posted by Sparda

  1. Use a remote port scanning tool to tell if there are any listening services you don't know about. Hope it's firmware doesn't have any remotely exploitable vulnerabilities that can be deployed over the internet and cannot practically be blocked. You have done everything one can practically do, now just hope :D
  2. This works ok, but it's really slow, slower then using filezilla or a proper FTP client for doing FTP stuff, but if you need to treat it like a normal file system this works. The only way to improve on this is by using a different protocol, which is always advisable as FTP is a rubbish protocol.
  3. Probably too much interference from all the people trying to use wireless causing your network to stop working.
  4. Why do they need hiding? Changing these settings shouldn't have any negative effects...
  5. Upload the files, use a proper version control system for the version-ing (I would recommend git). This does introduce some problems for e.g. removing super old versions could become a bit tricky. Regardless of these problems, I would strongly recommend looking at an existing version control system rather than making your own that's potentially not going to be as good in the long run.
  6. At least you passed the Turing test, non of the bots can get it lol.
  7. What type of box is it that you need to make transparent?
  8. Obvious troll is obvious. DRM in Linux means Direct Render Manager.
  9. Perhaps the issue is that individual elements in the arrays are coming from some where else and are been put into the array by reference. This would have the same behavior has previously described. Could this be the case?
  10. objects and arrays have a clone method ;)
  11. I suspect the issue is the same as before, except this time harder to find where it's happening. Basically in Java when you go a = new A(); b = a;, a and b are now the same object, so b.setVal(2). will result in a.getVal() been 2. This applies to arrays and objects. This does not apply to primitives.
  12. char is a Java primitive type, and thus not an actual object. If you where to change it to be a String or some thing that error would go away, and, in fact, String is possibly the type it's meant to be since the length method is used. Admittedly it could be nearly any object, but String length method has meaning (String is an object btw).
  13. Sounds like you've been thrown in at the deep end a bit. Apologies for been so direct about it :).
  14. Programs been listed in add/remove programs is optional, and a convince but not mandatory. You should not be expecting every thing to show up there. Numerous applications are able to deal with not been 'installed' (this concept only exists because applications consist of files that must be situated just so, but that doesn't mean they actually have to tell the operating system they exist) as an administrator, in such cases the application will put it's self in the users home directory and run from there. To the user it works perfectly, but it is only available to them (arguably not installed at all, depending on the definition you wish to use). As much as this is a side note and a personal one at that, it saddens me to see a system admin doesn't know this, particularly one who has the task of snooping on peoples computers. It just winds me up no end that this has eluded you. Apologies if this causes any offense, but truth be told, you aren't doing your job properly (in my opinion at least). What I would do if I was one of the people who worked at your company would clone my machine into a VM, then take over the real computer, not necessarily because I would then do things that I shouldn't, but be cause I can, to show that all the money and time spent on this is pointless and stupid. What I would do is review your policies definition of 'Installed' before any thing else. Then figure out if the policy has been broken.
  15. Try a different PDf printer? Set up a VM with a pdf printer?
  16. In what way wouldn't printing it work?
  17. Install a PDF printer, print the document to the PDF printer, create unprotected PDF?
  18. You can control your exit nod with tor, which is really the most important part of this. The use of VMs is largely unnecessary as Chrome (and other browsers) in 'private mode' will appear to be a separate computer to most web service providing it has a different public IP (assuming that matters).
  19. For this amount of virtual machines you probably want to look at ESX (ESXi may do, not sure).
  20. This approach may not be suitable depending on what the servers are using for. You could setup LDAP and give those who need root sudo.
  21. It's possible that new wireless card has it written in to the firmware to prevent using a fake mac address. It's impossible to say for certain, and I'm not familiar with that particular card, but it's a possibility. Have you tried it with another distro (e.g. Backtrack, yes I know the latest version is based off Ubuntu, but it's worth a shot)? have you tried it on another machine?
  22. Correct sir. On motherboards that support above the specified 500mA of power on USB 2.0 ports the second USB connector is often not necessary. USB 3 has a higher power specification (can't remember what it is).
  • Create New...