Jump to content

Lupius

Active Members
  • Content Count

    8
  • Joined

  • Last visited

  • Days Won

    1

About Lupius

  • Rank
    Hackling

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Hi guys! I'm about to graduate here and need a definitive plan to start builidng my career. Would anyone please explain the differences between network security and information systems security? What are their roles in a company and the relative market demand for each? Also, which professional certifications are more well received in North America? I'm currently looking into preparing for CCNA, but there's also MCSE and CISSP and all that, and I'm just getting more confused. Your advice is much appreciated.
  2. Thanks for all the replies! I did set up a VM and extracted the flash file in it. Decompiled it with Flash Decompiler Trillix and couldn't find anything foul with the scripts in the file (it was all written in Portuguese anyway). I guess the moral of the story is, I'm glad I finally came up with a scare story that will stop my mom from forwarding chain emails.
  3. So the other day my mom forwarded me a chain email with an Excel attachment, saying it's a game. I opened it without giving it much thought and found out it was a flash game embedded inside. Because I can't think of a good reason for anyone to put flash in Excel, I got suspicious of it and discovered that this is a known method of trojan attack. Now, this exploit was discovered patched years ago and I'm pretty sure my Excel 2010 with the latest updates handled it safely. The question is, how do I find out if there was malicious code in that file to begin with? What tools can I use to prove my
  4. Taken from wikipedia: So it's really up to the programmer to allow the process access all memory then?
  5. This part is actually not true. I was looking at desktop CPUs. Server CPUs can support up to a crap load of RAM. So... can a single core access all RAM on a dual socket board?
  6. My workplace is interested in building a workstation for large-memory applications. I've looked at dual socket boards which support up to 64 GB memory, but CPU specs usually list that they can support only up to 32 GB. Does this mean that the 64 GB is split between the two sockets? If I were to run a single-threaded application, would it be able to access all 64 GB of memory?
  7. Thanks for the suggestions. We are an off-campus research lab and we need a website to do sciency things (recruitment, collaboration, etc). The research institute we're located at has really strict IT policies so we had to host our old server on campus, which meant we had to walk over there every time something's gone majorly wrong. I don't think we're allowed access to the corporate DMZ, if there is one. So is there really no other way to host a server locally?
  8. Our office is upgrading from an off-site web server to a new on-site web server that is behind a corporate firewall that we don't want to mess with. I'm wondering if there is a way to keep the old server running as a proxy for public users to access the new server? My current approach is to have an ssh tunnel running between the two servers and have an unused port on the old server forwarded to port 80 on the new server, but I must be missing something because it won't work at all. To put it simply, here is what I want to accomplish in a nutshell: Is this at all possible? Any help is appr
×
×
  • Create New...