NewNameSamePerson
-
Posts
55 -
Joined
-
Last visited
Posts posted by NewNameSamePerson
-
-
-
ok lets see if i got this right hamachi is a p2p file sharing program that can use windows file sharing (meaning make a direct connection like if you were sharing files/folders on a home network so you can get files instantly but what hamachi is doing is using a IP address running vpn (tunneling protocol) for security.
right?
-
-
its different from the search engine because with a you can search with a proxy and also control what you send you do not need to send out your cookies to search with a search engine
a toolbar is a 3rd party software so its connected right to your harddrive data
-
With the advanced features enabled, Google's free toolbar for explorer phones home with every page you surf,
and yes, it reads your cookie too. Their privacy policy confesses this, but that's only because Alexa lost a class-action lawsuit when their toolbar did the same thing, and their privacy policy failed to explain this. Worse yet, Google's toolbar updates to new versions quietly, and without asking. This means that if you have the toolbar installed, Google essentially has complete access to your hard disk every time you connect to Google (which is many times a day). Most software vendors, and even Microsoft, ask if you'd like an updated version. But not Google. Any software that updates automatically presents a massive security risk.
-
-
-
you know i have to give both sides of the story
Anti Honeypot Technology
What is Anti-honeypot technology?
lTools that are used to identify honeypots
lFor example “Honeypot Hunter�
Effects on honeypots
lIf a honeypot is detected, users can attempt to bypass detection
lHoneypot can be attacked if detected
lThe honeypot could be used to attack other systems
More effects on honeypots
lPrevents honeypots from collecting valuable information
lHoneypot itself loses effectiveness of being a covert system once compromised
lGives attackers more characteristics to identify honeypots
Characteristics of identifying honeypots
lFinding honeypots is a difficult process
lAttackers look for differences between a real system and a honeypot representation of a system
lHoneypot systems typically limit outgoing bandwidth and the outgoing number of connections
lAlters outbound packets to prevent attacks
Connection Limiting
lHoneypot will count the outbound connections within a period of time.
lOnce the threshold is reached the new outbound connections are denied
lOne of the most easiest characteristics to detect
lSimply open up 10-20 websites and see if the connection is blocked
Outbound packet alteration
lModifies packets that are believed to be of an exploitive nature
lHoneypots compute a hash of portions of the packet
lReturns a response based on the hash
lAttacker expects to receive a known response but instead receives a modified response from the honeypot
Send-Safe Proxy Scanner
lSend-Safe’s proxy scanner searches for multiple open proxy servers for obscuring a spammers identity.
Honey Pot Hunter
l“Send-Safe Honeypot Hunter is a tool designed for checking lists of HTTPS and SOCKS proxies for so called “honeypots�. “Honeypots� are fake proxies run by the people who are attempting to frame bulkers by using those fake proxies for logging traffic through and then send complaint’s to one’s ISPs�
Honeypot Hunter
Honeypot Hunter
lThe first commercially available honeypot detection tool
lHoneypot hunter tests open proxy connectivity
lIt classifies the proxy as:
nSafe(good)
nBad(failed)
nTrap(honeypot)
How Honeypot Hunter works
lOpens a false mail server on the local system using port 25 to test the proxy connection
lHoneypot hunter attempts to proxy back to its own false mail server
lThis approach identifies most invalid proxies and honeypots.
Other tools
lVarious noncommercial code used to identify honeypots
lSebek.c , sebek-find.c , unsebek.c, vmware_detect.s
lThese tools exploit vulnerabilities in popular honeypot systems like Sebek, Honeyd and VMWare
Honeypot timeline
l1. Honeypot
l2. Honeypot Detection Tools
l3. Anti Honeypot Detection tools
l4. Anti Anti Honeypot Detection tools
lWill the cycle ever end?
Conclusions
lHoneypots are a great way to observe, identify and capture potential attackers.
lThe effectiveness of honeypot technology only exists if it is unknown to the attacker
lHoneypot administrators must make every effort to avoid being detected (eg. Changing default error messages)
Conclusions….
lEssentially, the honeypot technologies must remain secret in order for them to be effective in the field.
lHoneypot program writers must continually update and change their program to avoid being identified by attackers.
-
PC Support
Get all your Windows, Hardware, Networking, and software support questions answered here
PC Tips and Tricks, Modding
Linux/Unix Support
Get all your Linux/Unix questions answered here
Linux/Unix Tips and Tricks
Mac Support
Get all your mac questions answered here
Mac Tips and Tricks
Electronics
Get all your questions on MP3 players, Digital Cameras, Digital Video Cameras, TV's, etc. answered here
its all up to you of what you want on this thread so post your questions and suggestions
-
If you've elected to upgrade all of your equipment and do not have devices on your network that do not support WPA functionality, you can set up a honeypot to distract would-be intruders if you are in an environment prone to war drivers or neighborhood snoops. A honeypot is a fake target that deters hackers from locating your real network. Take an old 802.11b access point and:
1.
Set the SSID to something different than what you are using in your new WPA capable access point or router.
2.
Use a channel at least 5 channels away from the channel you've set on the new access point or router to avoid interference.
3.
Place it near an outside window.
4.
Plug it in to a power outlet, but don't connect it to your network.
5.
Don't point any of your wireless computers or devices at this device.
You've just built a honeypot. This may engage casual (but not determined) snoops and neighbors. If you live in an area that is densely populated, you may need to experiment with channel settings because you could find that there are not enough available channels to implement this.
-
Songbird - The Music/Web Player
download it here http://www.songbirdnest.com/
Songbird was built from Mozilla’s popular open source (that means free to use and modify) web browser, Firefox. It will run on Windows, Mac OS X and even Linux.
Because Songbird is open source, it has some added features that are different than the popular players seen today.
-
World's largest Windows error message
We went down to New York for the long weekend. Despite the 16-degree weather, we walked down to Times Square - all the bright lights lured us the ten blocks from our hotel. When we got there, we stood like, well, tourists, gaping at all the electronic billboards. And then, across the square, I saw it: the world's largest Windows error message - on a two-story high e-billboard (I guess everything really is bigger in New York). It was the only billboard in the entire square with absolutely no movement - since the PC running it had obviously frozen.
-
-
Access Your Data From Anywhere
laplink everywhere http://laplink.com/products/lle/overview.asp
TightVNC Software http://www.tightvnc.com/
GoToMyPC https://www.gotomypc.com/en_US/entry.tmpl?_...ion=rgoto&_sf=2
PCAnywhere http://www.symantec.com/home_homeoffice/pr...a115/index.html
-
-
Originally posted by seeking@Feb 28 2006, 01:26 PM
live streaming updates for those interested...
http://www.macrumorslive.com/web/
moved to not waste a thread
-
ignorants? or ignorance?
yes ignorance sorry for the misspelling
-
Originally posted by Sarah Tonin+Feb 26 2006, 11:15 PM--><div class='quotetop'>QUOTE (Sarah Tonin - Feb 26 2006, 11:15 PM)</div><div class='quotemain'><!--QuoteBegin-BEEFEATER@Feb 26 2006, 10:53 PM
I'd rather mistreat blacks.
in honor of black history month, how sweet.
[/b]
wow yer so kool that shows true ignorants
-
awwww im tellin on you
-
HDClone Free Edition enables you to move the content from an entire hard drive to another, larger one. http://channels.lockergnome.com/windows/ar...tion_v318.phtml
-
Originally posted by I.C.Shadow@Feb 23 2006, 09:13 PM
Yea man, these fools call EVERY DAY. Whats fucked up is that their caller ID comes up as only "85". So you think that's what's up? There will be a total of 4 computers on the network, and my room mate and I are constantly downloading whatever on each of our pc's 24/7.
I might try DSL next time, even though its not as fast.
I don't really feel like giving anymore cash to Comcast, it's gotten so out of hand that I swear to god they are just adding charges to it and making it so confusing that we can't really figure out what the fuck the bills are.
Comcast and Sovereign have an etch date soon.
Wonk.
Thanks for the help man, is there anyway that I can figure out positively that that's what's happening?
get a network bandwidth monitor set it to a limit of 1.8mbs if it goes off that is your problem
-
hey look at that 3 names on one computer all at the same time :biglaugh:
-
Originally posted by Sparoism@Feb 23 2006, 09:07 PM
IC, I use Comcast too, and recently found out that they'll kick you off temporarily for using too much bandwidth. This would explain why it cuts out while you're gaming, obviously. I got a lecture from a customer service rep about this....
Think about cable broadband as being similar to a party line. That means it has an allocated amount of bandwidth that everyone shares, as opposed to traditional DSL which is one line that either runs directly into the box via a cat5 connection or into a router that distributes the connection over a LAN. Sure, Comcast DOES have higher speeds and tons of bandwidth, but the fine print is that the reason for the amount they put over the cable is due to the fact that you have to contend with numerous users sharing bandwidth. Had I known that, I probably would have passed.
As far as the mySQL screen with regards to 12 oz.- it happens to me every now and then, so I think it may be similar to flood control on the 12 oz. server.
There's all this new tech being developed for the Web that's supposed to make a lot of these problems a thing of the past. There's the Grid, LambdaRail, IPv6...look into it. I doubt any of it will be mainstream in the near future, but it's something to look forward to.
Good luck with that cable bill...man, I thought I was in deep with those guys. Thanks, I feel better now.
damn i was gonna switch to comcast because they just became avaible in my area good thing i didnt cause i get 3.4 mbs for like 75 bucks from my local cable company
-
hey this thread is pretty kool there is alot of great information in here
<<< 12Oz Computer Tech Support SuperThread >>>
in Channel Zero
Posted
bump