Search the Community
Showing results for tags 'protection'.
-
So after having a laptop stolen, and finding really no help to recover it, I had to come up with an idea of my own, or maybe it exists, and I don't know. I want to exploit my own laptop by soldering a USB to the motherboard. This USB, once the computer is turned on and logged into, and detects a network, will do one, or all of three things: 1) Will drop a specific remote access file matching one that is pre-saved in a cloud server, allowing the original owner to remotely access their stolen computer. This file will be dropped every single time on startup, and if the file already exis
- 5 replies
-
- remote access
- theft
-
(and 3 more)
Tagged with:
-
Hello hak5! My name is Danny and im 20 years old. I come from Denmark and at this point I'm writing my final project. My subject is "DDoS" - "How can the British authorities tackle DDoS-attacks" Therefor I have to explain how a DDoS attack actually works. Also I have to involve technical, legal and ethical issues that may arise in connection with DDoS-attacks. I hope you can help me with some of these questions. Appreciated. Regards from Kappa!
- 3 replies
-
- DDoS
- protection
-
(and 3 more)
Tagged with:
-
/etc/sysctl.conf ##############################################################3 # Functions previously found in netbase # # Uncomment the next two lines to enable Spoof protection (reverse-path filter) # Turn on Source Address Verification in all interfaces to # prevent some spoofing attacks #net.ipv4.conf.default.rp_filter=1 #net.ipv4.conf.all.rp_filter=1 This is in the backtrack "/etc/sysctl.conf" So why this option give to us? what is the reverse-path filter? Are you think This option is most important to hide my ID? Help me...
-
- Spoof
- protection
-
(and 6 more)
Tagged with: