Search:

Type: Posts; User: Otto

Page 1 of 3 1 2 3

Search: Search took 0.02 seconds.

  1. Replies
    4
    Views
    529

    Re: What is Wireless IDS?

    Yet another stumbling block makes WIDS difficulties: 802.11n. This latest wireless LAN standard WIDS is forcing you to spend more time with the jumping back and forth between the radio channels, as...
  2. Re: Access Control in LAN and Wireless Network in 802.1x

    EAP was originally developed for the point-to-Point Protocol (PPP) and is specified in RFCs 2284 and 2716th By using EAP, two communication partners before the actual authentication negotiate which...
  3. Replies
    6
    Views
    1,143

    Re: Increased risk of threats to e-mail security

    The importance of messaging technologies continues to grow, proving an invaluable advantage for companies around the world. The system operators are faced with the need to provide advanced features...
  4. Replies
    5
    Views
    2,435

    Re: Fiber-optic network architecture

    Fiber-to-the-Curb (FTTC) means fiber to the curb / roadside. Since the roadside is usually a gray box that contains a terminal block connector. The FTTC architecture provides that the fiber ends in...
  5. Replies
    6
    Views
    1,350

    Re: Future of mobile communications

    Combining the mobility, ie mobility, with the communication, the result is a picture of a man who can communicate in any situation anywhere, anytime with anyone. This scene represents the state that...
  6. Replies
    6
    Views
    1,254

    Re: How to set administrator password in firewall?

    The firewall operating system has a built-in data backup that you hand on the shell level eliminates tedious. Do you want a backup create, you can do in this screen, you can create the meantime there...
  7. Replies
    5
    Views
    1,603

    Re: How to reduce security risks of cloud computing

    Be less afraid, because the risks can be reduced to a minimum. Even from provider to provider or analyst to analyst different definition of the Cloud lead to serious misunderstandings: Mostly it's...
  8. Re: Information about Remote Desktop Connection and RemoteApp

    To establish a Remote Desktop connection, one a series of programs to choose from. So among other VNC or NetMeeting. But since every program on the install may not sure this tutorial describes how to...
  9. Replies
    6
    Views
    1,207

    Re: VPN and IPSEC protocols

    I once had a Linux magazine, in which the different possibilities for VPNs are discussed. Unfortunately I can not find it. The Linux Magazine Special Bulletin 1 / 2004 deals with it and again found...
  10. Replies
    5
    Views
    4,175

    Re: Sonicwall TZ 180 Port Forwarding

    System> Administration: Administrator Name Password: a very complex password ... System> Administration: Web Management Settings: HTTPS Port: 444 (for example, can be used to 443 for SSL). Network>...
  11. Replies
    6
    Views
    2,030

    Re: WRT54GL firmware via tftp import??

    How do you reflashing it? If the file is because in C: \??

    Then the command is as follows:

    tftp-i 192.168.1.1 PUT WRT54GL_4.30.7_code.bin WRT54GL_4.30.7_code.bin
    Your command is simply wrong...
  12. Replies
    5
    Views
    1,160

    Re: Seeking adsl router with modem

    The ancestral pressure system after the client-server model is the Berkeley Printing System (including LPD / LPR). It was for Unix development, but also in Windows NT (and later implemented). have...
  13. Re: Help to connect to network with WPA-PSK wpa_supplicant

    To tell you the truth they are just as insecure, only one has more security levels than others, definitely these encryption algorithms are useless. That is why it is developing a new encryption...
  14. Replies
    5
    Views
    928

    Re: Sharing files and printer

    The main thing that you should know about the permissions. I think that explaining you about the same example given by the 'Jarvis', would be useful. Serge sees the shared folder on another computer...
  15. Replies
    5
    Views
    972

    Re: Problems with Bridge Networks

    I would like to discuss about the XP network bridge between wired and wireless network. It may be that we want to share an Internet connection to another PC connected in wireless Ad-Hoc, in addition...
  16. Replies
    5
    Views
    1,676

    Re: WiFi does not reconnect with Windows XP

    Windows XP natively integrates wireless officer, also known as the zero configuration. If you install other software in addition to WiFi you disable this setting or zero if you have multiple wireless...
  17. Replies
    5
    Views
    1,366

    Re: Linksys ADSL2 modem problem

    The Linksys ADSL2 Modem gives you a high-speed Internet connection, much faster and convenient than a standard dial-up. ADSL technology lets you access the Internet via your existing phone lines...
  18. Re: Local Area Connection Icon in Network Connections missing

    There are chances that the following steps will help you :

    Open your network connections
    Right-click your wireless connection to select "properties"
    In the general tab select "Internet...
  19. Replies
    5
    Views
    10,387

    Re: System error 53 - network path not found

    If that does not go SHOULD: Hang both computers at all in the same (Sub-) network? WLAN, dormitory network, VPN? Subnet mask determine the best rate with the data center, access to networks at all on...
  20. Replies
    7
    Views
    5,340

    Re: Problems with Wifi-link 5100 AGN

    Airodump-ng can listen to wireless networks and to save the packets in a capture file. The controls are fairly simple:

    usage: airodump-ng <options> <interface> [, ,...] <interface>
    A quick...
  21. Replies
    9
    Views
    3,058

    Re: Port Forwarding on Mac OS X

    Several people are using routers nowadays for the reason that most we have additional than one computer and share an Internet connection through router is better than using a switch with a computer...
  22. Replies
    6
    Views
    1,374

    Re: Configuring the Wireless-G Broadband Router

    A Wireless Router DLINK DI-624 and a DWL-G520 PCI card and a PCMCIA card DWLG-650. All that can run on a fast track to own 108Mbips DLINK and commonly called the Super-G. In short, as you see, I have...
  23. Replies
    7
    Views
    1,926

    Re: Conflicy with site gateway 192.168.1.1

    he IP address of a gateway (or gateway) often seems to 192.168.1.1 or 192.168.0.1 and uses some predefined ranges, 127.xxx, 10.xxx, 172.16.xx to 172.31.xx, 192.168.xx, that encompass or are reserved...
  24. Replies
    5
    Views
    2,275

    Re: 192.168.1.1 unreachable

    I think you know enough routers to configure a secure connection. The reset clears the rear hole and puts all the configuration and exit the factory and there admin work. Repeat the connection is...
  25. Re: My router doesnt open 192.168.1.1 in web browser

    To check if the router works, you will already see if it works in ethernet. Try you connect over ethernet cable (rj45 cable right). Go into network connections and active your ethernet card. Then do...
  26. Replies
    5
    Views
    3,172

    Re: How to change the ink in a Canon PIXMA MX310?

    After a long time without writing, I decided to comment on the new printer we have at home. FEATURES This printer CANON PIXMA IP 1200, we took her in three and four months. It's a photo printer, but...
  27. Replies
    6
    Views
    42,408

    Re: Dlinkap web page is not opening

    Configure your Internet settings. Go to Start - Settings - Control Panel. Double-click the Internet Options icon, go to Security tab and click the button to restore the defaults. You can do the below...
  28. Replies
    6
    Views
    5,760

    Re: Problem of DNS and Double-NAT

    When I purchased the PAP2 probe to connect to my WRT54G, which is a client of another router via WIFI, but there was no way to connect to the server Peoplecall with a NAT if it works, but with two or...
  29. Replies
    6
    Views
    1,915

    Re: Problems in iMac Airport Versalink 327W

    You can also reset your gate to the factory defaults if you have forgotten your username or password of your gate. To reset your gate VersaLink 327W with factory defaults :

    Hold down the reset...
  30. Replies
    6
    Views
    1,520

    Re: IP address issues in Snow Leopard

    Access to Internet when it will be managed by any box ISP. By helping you documentation of the box in question, make sure that the DHCP server has the IP in excluded and choose a fixed IP as your...
  31. Replies
    6
    Views
    2,536

    Re: BT4 VMWare image: networking broken

    If you go to your network administrator VMWare virtual preconfigured really two examples, the VMNet1 and VMNet8. The concerns you in your case is VMNet1, host only. Using teams is like having a...
  32. Replies
    6
    Views
    4,961

    Re: Auto Mapping Network Drive VBS

    The following are the code in VBS :

    Sun onet
    Set onet = CreateObject ("WScript.Network)
    oNet.MapNetworkDrive "Z", "\ \ foo \ shared directory"
    WScript.Quit

    The above script will connect...
  33. Re: ALFA Network AWUS036H 500mW Wifi USB Adapter and Packet Injection

    To crack the wireless network, I think using a USB key, that's good I think using a wrench USB, because I did not drive a PCMCIA card, my computer has a floppy Express Card (Express Card) so unless...
  34. Re: How to add auto map network drive in samba server config

    Create samba users on the Linux PC with smbpasswd (or pdbedit), by the following steps keeping in mind :

    The user must already be users of the Linux PC, create them as needed, put them in a...
  35. Replies
    6
    Views
    2,084

    Re: Firewall penetration testing

    This test is to simulate the attack by a malicious user or a malware. Risks are then analyzed potentials due to a misconfiguration of a system, a lack of programming or of a vulnerability in this...
  36. Thread: wireless MITM

    by Otto
    Replies
    6
    Views
    1,150

    Re: wireless MITM

    To perform this attack, the hacker must first locate a WiFi wireless network (or inlámbrica wifi network) to attack. It should also gather information about the SSID and other parameters of the...
  37. Thread: DLNA Slow

    by Otto
    Replies
    6
    Views
    4,202

    Re: DLNA Slow

    Hello
    Since you're already in your network cable from the RJ-45 AC is not a problem of flow (otherwise we would all big worry). I think your problem is to use the encoder windows media center,...
  38. Replies
    5
    Views
    1,629

    Re: How to get rid of Windows Vista Keyloggers?

    Try these following steps to get rid of Windows Vista Keyloggers :

    Download Malwarebytes Anti-Malware (MBAM) and save it on your desktop.
    At the end of the download, close all windows and...
  39. Replies
    4
    Views
    951

    Rmove Trojan SHeur.BMLE

    In that case i would suggest you to install your anti virus and also disable your Restore system and then download SmitfraudFix after downloading it reboot your computer and start your Windows in...
  40. Replies
    4
    Views
    730

    Remove VX2 file

    VX2 is one of the most problematic applications to remove from your computer. VX2 is an Internet Explorer browser helper object that may monitor the web pages you request and data you enter into...
  41. Replies
    4
    Views
    1,124

    Remove JS.SecurityToolFraud.B

    if you really want to remove JS.SecurityToolFraud.B from your system then i would suggest you to install Spy Hunter on your system which will will hunt down and remove Trojan from your system at the...
  42. Replies
    5
    Views
    5,927

    Information about BackDoor.Tdss.565

    BackDoor.Tdss.565 is a Trojan which is being used by hacker for to gain full access on the compromised computer and most of the time such kind of Trojan is not detected by antivirus because rootkit...
  43. Replies
    3
    Views
    3,374

    Remove Global.exe Virus from computer

    Global.exe is a virus which creates and execute a process on disk and at the same time it also add a registry auto start to load Program on Boot up. to overcome from this issue, reboot your system...
  44. Replies
    3
    Views
    718

    Remove New rogue TrustFighter virus

    Yes your computer is being infected with Trust Fighter virus which creates a fake security tool and this is usually delivered by Trojan which pretends to be an update for Adobe Flash. It also blocks...
  45. Replies
    2
    Views
    1,225

    How to delete W9UXX92.EXE

    Yes W9UXX92.EXE is a virus which is being seen to infect systems and resists interrogation by security products and the process is packed and/or encrypted using a software packing process. More over...
  46. Replies
    3
    Views
    1,117

    wuaclt.exe always running on computer

    Yes till my knowledge if you are having wuaclt.exe running on your system then your system is begin infected with Cult Trojan. Cult Trojan is likely a Trojan and as such, presents a serious...
  47. Replies
    3
    Views
    678

    Issue with a 2D array

    [QUOTE=Preetish;4652629]
    if(grill[cell][3]==1) / / then it works more[/CODE]

    [QUOTE]

    You try to do anything there? If yes, do not code for that line.

    And try to use see the following code i...
  48. Replies
    3
    Views
    678

    Re: Problems with a 2D array

    Sure i will help you out with this before that may i know programming language are you using it and can you provide me your code so that i will come to know where are you making mistake.
  49. Replies
    3
    Views
    902

    Re: backup &restore data by procedure

    A backup is nothing more than a copy of your important data files. The decision about how to create a copy is completely up to you. Windows Vista's Backup & Restore Center is included with the...
  50. Re: Unable to configure N1 wireless router and DSL modem

    Read your manual for further details. For the old notebooks I think you have to buy a wlan-pcmcia-card with the antenna (the new Dell-notebook should have it integrated). The configuration worked for...
Results 1 to 50 of 137
Page 1 of 3 1 2 3
Page generated in 1,711,629,414.21716 seconds with 25 queries