Jump to content

ZazenSec

Active Members
  • Posts

    17
  • Joined

  • Last visited

  • Days Won

    1

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

ZazenSec's Achievements

Newbie

Newbie (1/14)

  1. My picks would be the Corsair Force Series GT or if you don't like the SandForce controller(decent mix of speed/reliability complaints), the Crucial M4.
  2. Virtual machines will still have their own IP addresses so you can filter by that as long as they're on another vlan. This *might* work. But I don't have your type of setup so I really can't test it. iptables -I FORWARD 1 -s 192.168.1.xx -d 192.168.2.xx -p tcp -m multiport --dports 21,80,443,3389 -j ACCEPT iptables -I FORWARD 2 -m state --state ESTABLISHED,RELATED -j ACCEPT iptables -I FORWARD 3 -s 192.168.1.xx -d 192.168.2.xx -p all -j DROP Pretty much it says if your source is trying to get to this destination, only allow this protocol(TCP) and only allow it to access these ports. If it's anything else trying to get to this IP, drop the traffic. And GoDaddy has quite a large infrastructure with some pretty crazy virtual switch and layer 3 switch setups. :P
  3. Well, your issue is this. iptables won't filter traffic on the same subnet. The only thing I can think of(others may have more input as I'm not to hot with DD-WRT) is to make a vlan, then apply an iptable to that vlan to allow/deny traffic. Let me tinker with something real quick.
  4. Soo...what exactly IS the issue? That you don't have sound when it's not plugged into the iPhone? I would think that the sound is due to it interfacing with the Square app.
  5. Guess I'll give this a go. Favourite game: KOTOR II Favourite OS: Fedora/Win7 Favourite console: Xbox 360 Nationality: US Accent: The sexy kind Sex: Male Age: 25...I think Race: Messican Height: 6'2" Status: Taken Build: Athletic with some punching bags attached. Favourite band: Depends on the mood. Tool/Miles Davis/Sid Phillips/Sevendust/Children of Bodom/Lacuna Coil are all pretty much tied. Favourite book: I'm a sucker for Star Wars. Favourite author: Don't have one. Favourite movie: Who Framed Roger Rabbit? Favourite director: Takashi Miike Favourite TV Show: Family Guy Favourite actor: Johnny Depp Favourite actress: Natalie Portman/Kate Beckinsale/Olivia Wilde. :yum: Favourite Pinup: I'll just say that I'll take all of the suicide girls. Favourite Comedian: I suppose that would be Eddie Izzard. Other hobbies: Reptiles, yo-yos, motocross(long live 2 strokes!), snowboarding, mountain biking, running, weight lifting, making emo kids more emo, making little kids think that the Slipknot masks are made from the skin of children that they kidnap in the night. Car: 1999 Ford Ranger XLT 4x4 Occupation: Slacker, consultant, designer
  6. Honestly a deny all access list for it would probably work better, but I don't think DD-WRT has that type of functionality. Another way would be to use the deny feature using the Access Restrictions. But for adding for an IP table, the command would look something like this: iptables -I FORWARD -d IP ADDRESS -j DROP Or if you wanted it to generate a log to see if someones really trying to get into it, use: iptables -I FORWARD -d IP ADDRESS -j logdrop
  7. It's an old, pre-standard iostream. Visual Studio used to handle it but yes, it's not something you want to use. If you want some other stuff, hit up youtube and look up StanfordUniversity. They have CS 106 lectures that's mainly on C++ so that may give you some additional insight.
  8. You're probably connecting as root.
  9. Both will do what you want. IMO it's like Ford vs Chevy, Glock vs Springfield, and Miller vs Lincoln. All comes down to personal preference. But with my own experience I've found Hakko to be more "stable" temp. wise.
  10. This. Without the basics you'll never fully grasp how things work nor be able to create your own attacks. Learn how computers receive/view/send data through a network. How routers see packets and know how to route them. How web servers interpret data and process requests. I learned a good deal just by learning the OSI model. And learn HOW they work. EG: If someone asks you how a MITM attack works, be able to explain it in detail rather than "You just trick the computers into thinking you're their network/website."
  11. CCNA is good for three years. Not one. And if you want a solid game plan, get your CCNA, then when it comes to recertify go for your CCNP. That will recert your NA and give you the NP which will open your doors that much more. Right now the hotness is in security, cloud computing, and VMs.
×
×
  • Create New...