Search found 32 matches

by nethic
Thu Oct 21, 2004 10:31 pm
Forum: Microsoft
Topic: file formats
Replies: 1
Views: 2390

file formats

i was owndering since i got a bum version of mandrake and it won't let me update is there a way i can get those updates on windows then put them in my swap space and transfer them over and install them like that or is this just a silly question ?
:)
by nethic
Thu Sep 30, 2004 1:09 pm
Forum: Linux
Topic: GRUB it's a b****
Replies: 1
Views: 1670

GRUB it's a b****

ya i have installed mandrake 10 once again but on my other mcomp now the first time i did it it worked sweet , but i had to format for sum un aparent reason but now when i have installed it and everything i reboot and i get "GRUB geom error " i have googled 4 a solution but i can't seem to find it b...
by nethic
Wed Sep 29, 2004 11:28 am
Forum: Web
Topic: website coder needed
Replies: 2
Views: 2346

i think i posted this in the wrong section to :P
by nethic
Wed Sep 29, 2004 11:26 am
Forum: Web
Topic: website coder needed
Replies: 2
Views: 2346

website coder needed

hi i need a websire coded and was wondering some one could point me in to a direction of a good mark up language or even possible help me on one i can only offer a shell account as a thank you but any ideas or offers please let me know (i'm still into html a little not to much thow ):(
by nethic
Wed Sep 29, 2004 11:23 am
Forum: Hardware
Topic: mor e networking
Replies: 1
Views: 24800

mor e networking

ok i have recently got a router and i have 2 boxs hooked up to it one is a server for webmail ftp website and shell hosting , i was wondering why i can not access the other threw the router only the webpage i can is there any way to login to it over the net work threw a konsole ? just need a little ...
by nethic
Sun Sep 26, 2004 11:43 am
Forum: Security
Topic: packet filtering by someone else
Replies: 0
Views: 10484

packet filtering by someone else

Permissive packet filtering You can construct a packet filter so that it stops packets destined for specified services from passing through an interface. This allows access to all services except those that you specifically block because they may be used to attack your site's systems. A drawback wit...
by nethic
Sun Sep 26, 2004 11:14 am
Forum: Security
Topic: Cryptography by soe one else
Replies: 0
Views: 12464

Cryptography by soe one else

Cryptography There are two kinds of cryptosystems: symmetric and asymmetric. Symmetric cryptosystems use the same key (the secret key) to encrypt and decrypt a message, and asymmetric cryptosystems use one key (the public key) to encrypt a message and a different key (the private key) to decrypt it....
by nethic
Sun Sep 26, 2004 11:10 am
Forum: Security
Topic: ip Tracing by someone else
Replies: 0
Views: 14237

ip Tracing by someone else

Getting geographical Information using an IP Address _________________________________________________________________________ Getting the Internet Protocol or the IP Address of a remote system is said to the most important step in hacking of a system. Sometimes, however we get an IP in order to get...
by nethic
Sun Sep 26, 2004 10:37 am
Forum: Security
Topic: ip masqurade how-to by someone else
Replies: 0
Views: 9898

ip masqurade how-to by someone else

http://en.tldp.org/HOWTO/IP-Masquerade-HOWTO/ This document describes how to enable the Linux IP Masquerade feature on a given Linux host. IP Masquerade is a form of Network Address Translation or NAT which NAT allows internally connected computers that do not have one or more registered Internet IP...
by nethic
Sun Sep 26, 2004 10:33 am
Forum: Other
Topic: Ddos by someone else
Replies: 1
Views: 28308

Ddos by someone else

G-48: TCP SYN Flooding and IP Spoofing Attacks September 20, 1996 18:00 GMT PROBLEM: Two "underground magazines" for intruders have recently published code to conduct denial-of-service attacks by creating TCP "half open" connections. PLATFORM: Any system connected to the Internet and providing TCP-b...
by nethic
Sun Sep 26, 2004 10:29 am
Forum: Security
Topic: spoofing by someone else
Replies: 1
Views: 28075

spoofing by someone else

IP Spoofing By Kapil Sharma A spoofing attack involves forging one's source address. It is the act of using one machine to impersonate another. Most of the applications and tools in UNIX rely on the source IP address authentication. Many developers have used the host based access controls to secure ...
by nethic
Sun Sep 26, 2004 9:35 am
Forum: Political
Topic: bush vs kerry
Replies: 4
Views: 3399

bush vs kerry

this is what i think about u.s pollitics's (considering canadians are far more stupider). i have read about theminstalling automated voting machines for this election upcoming . i think bush will win , but not by americas choice but by who ever is pullin his strings . see kerry is a good candidate h...
by nethic
Sun Sep 26, 2004 8:46 am
Forum: BSD's
Topic: installing
Replies: 1
Views: 1584

installing

ok i would like to get fbsd but i have no way of copying it to disc other then my buddy ,this is what i want to know, can i download it on this comp and then traNSfer it to the other comp and install it with no disc or is this a dream i'm having :)
by nethic
Sat Sep 25, 2004 7:31 pm
Forum: Hardware
Topic: networking
Replies: 2
Views: 3578

most likely linux .but i am considering tryin to get fbsd to try it out and see how that is but ya most likly linux don't know what distro thow i'll find out on tuesday;):cool:
by nethic
Sat Sep 25, 2004 1:01 pm
Forum: Microsoft
Topic: winblows
Replies: 1
Views: 1848

winblows

screw you bill :cool: nobody fux with tuX:D
by nethic
Sat Sep 25, 2004 1:00 pm
Forum: Linux
Topic: sh
Replies: 1
Views: 2318

sh

is there a certain way to open .sh files , do i have to drop to a diffrent shell cmd
or can i tar it or ./ the file i'm not sure
thanx guys :)
by nethic
Sat Sep 25, 2004 12:52 pm
Forum: Hardware
Topic: networking
Replies: 2
Views: 3578

networking

ok i have two comp's one with out a monitor and i am goin to run it as a dedicated server . now i have a cable connection is it possible to run my mandrake box threw this server i am goin to setup without a router and a hub , like i mean go directly threw ethernet cards as in the rj45 cables only co...
by nethic
Sat Sep 25, 2004 11:24 am
Forum: Security
Topic: config
Replies: 3
Views: 2285

ok thank you stealth , i don't run any programs like that anywase i don't use them , :)
by nethic
Sat Sep 25, 2004 11:22 am
Forum: Programming
Topic: wat
Replies: 9
Views: 4450

perl for now but am learning python and v.b and maybe some C and c++ but in time i will know more and so will you
by nethic
Sat Sep 25, 2004 12:32 am
Forum: Linux
Topic: installing and configuring
Replies: 1
Views: 1931

installing and configuring

ya i'm using mandrake 10.0community dwnld and i'm having problums installing software off the disc's i had burned there is 3 of them ,when i goto install using rpmdrake it will not install them and freezes that procces up and i have to close it , could it be from some configuration i need or have ma...
by nethic
Fri Sep 24, 2004 11:35 pm
Forum: Other
Topic: iso 2 fil3
Replies: 1
Views: 2139

iso 2 fil3

is it possible to change a iso into a executable file or at least a install.sh , :S
by nethic
Fri Sep 24, 2004 11:20 pm
Forum: Rants and babble
Topic: :x
Replies: 17
Views: 11305

scared ? why it's not that thick :P
by nethic
Fri Sep 24, 2004 11:18 pm
Forum: Security
Topic: config
Replies: 3
Views: 2285

config

ya i need to know what i need to do in order to keep my box the most unExploitible as possible other then updating (cause thats a manual processes) like such as keepin my ports closed and and monotring traffic and users activitys , i am currently still studying linux and am advancing more everyday ,...
by nethic
Fri Sep 24, 2004 7:20 pm
Forum: Rants and babble
Topic: :x
Replies: 17
Views: 11305

i don't wear underwear :D
by nethic
Fri Sep 24, 2004 7:12 pm
Forum: Programming
Topic: wat
Replies: 9
Views: 4450

there's lot's of thing's that ppl program in ;)