L3arn3r
-
Posts
55 -
Joined
-
Last visited
Posts posted by L3arn3r
-
-
Perhaps
yum reinstall libgcrypt
Not Solved, Still same issue.
-
This video is unavailable.
Why is that so? lol
-
#yum -y update
Downloading Packages:
Running rpm_check_debug
ERROR with rpm_check_debug vs depsolve:
libgcrypt.so.11()(64bit) is needed by crda-1.1.3_2014.06.13-1.el6.x86_64
libgcrypt.so.11()(64bit) is needed by gnutls-2.8.5-14.el6_5.x86_64
libgcrypt.so.11(GCRYPT_1.2)(64bit) is needed by gnutls-2.8.5-14.el6_5.x86_64
libgcrypt.so.11()(64bit) is needed by cryptsetup-luks-libs-1.2.0-11.el6.x86_64
libgcrypt.so.11(GCRYPT_1.2)(64bit) is needed by cryptsetup-luks-libs-1.2.0-11.el6.x86_64
libgcrypt.so.11()(64bit) is needed by gnupg2-2.0.14-8.el6.x86_64
libgcrypt.so.11(GCRYPT_1.2)(64bit) is needed by gnupg2-2.0.14-8.el6.x86_64
** Found 9 pre-existing rpmdb problem(s), 'yum check' output follows:
crda-1.1.1_2010.11.22-1.el6.x86_64 has missing requires of libgcrypt.so.11()(64bit)
cryptsetup-luks-libs-1.2.0-7.el6.x86_64 has missing requires of libgcrypt.so.11()(64bit)
cryptsetup-luks-libs-1.2.0-7.el6.x86_64 has missing requires of libgcrypt.so.11(GCRYPT_1.2)(64bit)
gnupg2-2.0.14-6.el6_4.x86_64 has missing requires of libgcrypt.so.11()(64bit)
gnupg2-2.0.14-6.el6_4.x86_64 has missing requires of libgcrypt.so.11(GCRYPT_1.2)(64bit)
gnutls-2.8.5-10.el6_4.2.x86_64 has missing requires of libgcrypt.so.11()(64bit)
gnutls-2.8.5-10.el6_4.2.x86_64 has missing requires of libgcrypt.so.11(GCRYPT_1.2)(64bit)
libxslt-1.1.26-2.el6_3.1.x86_64 has missing requires of libgcrypt.so.11()(64bit)
libxslt-1.1.26-2.el6_3.1.x86_64 has missing requires of libgcrypt.so.11(GCRYPT_1.2)(64bit)
#yum install libgcrypt.so.11
Setting up Install Process
Package libgcrypt-1.4.5-11.el6_4.i686 already installed and latest version
Nothing to do
-
I've just rephrase this question because problem seems not to be solved.
https://forums.hak5.org/index.php?/topic/33502-active-directory/
Windows seven with not administrator rights:
We have a user called "hak5" with and physically we are currently login on it now the second user called "quest" come remotely(RDP) and login into same machine so the question is the previous "hak5" would still be login or could be kick out automatically?
-
-
-
-
-
-
Then get a real cert instead of a self-signed one.
that's what i was asking but i have not much experience on this so would you explain some more bit how and where i can get cheapest one cert?
-
I know that anything can be done by personal exceptions as i do not want to do java security settings on every individual PC..
I wanna make verified applet which can be use without modify java security setting
-
I have web-server locally and java applet is required to work properly on web-server so i have made self-signed applet... It is working fine on older version of java but wanna run with new version of java..
Error!
"Your security settings have blocked a self-signed application from running?"
solution?
-
I have a windows server with active directory installed and i wanna block some specific ports...
so how it can be done through command line?
-
Is ssh not already installed on your server? If you have a linux server it's probably installed by default.
Why would you want a shell through VNC is there a special reason?
nop! It's a windows server so there is no SSH by default.... There is no special reason as you may read my nick so this is why i am asking..
-
-
Supposedly if you do what's suggested in the link I gave the security log will tell you who grabbed which file and possibly also who viewed which folder.
Did you try it?
This is about GUI dude! would be appreciate if you know how to perform this on CMD?
 
 Try "fsmgmt.msc" from a run prompt, see if it shows open files, or sessions/connections in use (but no logging, like Cooper mentioned - you should look into his suggestion as well though if you want to have an audit log or setup a group policy to keep track in the event viewer).
Thanks For this but i wanna do this task through cmd (not on GUI mode)
-
My PC is a sharing server as i can see who are connected with my PC but i would like to see what file/folder they are accessing on my PC?
-
As far as i know "net sessions" can show all connected networks but i would like to see which file/folder user using on this PC.
is it possible to see?
-
Solved
PC Formatted
-
Well! Question is complicated so read carefully.
I do not want to trace call Skype to Skype (Do not Want IP address of that person who talking with me)
I want to track the "cell Phone (Any network)"
Example:
I have Skype with some credit and i am calling to my brother on his "phone number" and i want his location using map or anything like that!
-
We have some XP system and some win7 as well as 2003 Server.
All Machine running perfect excluding one which is windows 7 and the issue is we have some "GB" space on C Drive of course in C we have put it the OS and C drive automatically removing free space and going onto "KB" than it come to "GB" (which is actual free space) then again it's going down on "KB" like a loop.
Here are some shots:
Now loop (It will again start like this)
No Error anything else. (Fully Scanned by AV)
Any idea? what the hell is it? any keyword for this issue to search on google?
-
Explain Please?Write a batch file. Something like this: https://gist.github.com/Sitwon/7214492
Where i can put my directory names?
Senario: Dir1 is in "D" Drive and in "Dir1" there are more than 100 folders with extra folder called "Dir99" now i want to move all folders into Dir99?
-
Want to know that how we can move all folder (not only one folder) into another directory using CMD in windows?
-
Sorry again for noobish question!EDIT: Searching ebay i came across this http://www.ebay.com/itm/170909379937
Might help you a little bit maybe up to a couple blocks if your lucky
------
I don't honestly don't have an answer for you. I gave you the only advice i know for being able to pick up signals from that far away. I'm not even sure if using a booster would help.
It's with a "Coaxial cable" and i just know about USB/RJ45 so How we can setup this Antenna?
WPA/WpA2
in Questions
Posted
I have recently go through from the archive thread there (digip) a user of this forum spoke about WPA tables to crack WPA so would be appreciate if anyone or (digip) can explain more about it?
https://forums.hak5.org/index.php?/topic/15382-wpa-wpa2-security/