Jump to content
xisto Community

RemoteConnection

Members
  • Content Count

    109
  • Joined

  • Last visited

Everything posted by RemoteConnection

  1. Seems nice, but really how do they can help us ? how do they gather info about their patiens? really strange ! They will do all the things for us or just tell us to do some instructions ..?
  2. why u don't try VMWare , wif this tool u can run many OSes toghther! depends on your hardware >>>> VMWare.com
  3. well , personally I choose Dell D810D as the one of the best available laptops , really strong and powerful . I'm not goin to describe the features , you can get more ino here >>>> Dell.comGood Luck
  4. well I thing computer course in high school is just limited to as a public lesson ... just for getting mark , not learning ... what do u thing ?
  5. Yea , that's right, it's about 3years that this kind of mobile phones have come.... and right now most of the cell phones have this feature
  6. oh .... what's your idea about WAP on mobile? isn't it too small?
  7. Well, by wireless internet , I mean transfer data from access points in ISP, but i've heard it's unsecured and at the most it supports 54MB/s
  8. oh ... I didn't collect the tools , i just put them here , and what's wrong?
  9. :: All I ever wanted is in youLove, laughter, a pillow for my fears.I want to give and to be given toSo I might feel myself flow through the yearsAlive in you, the wonder of my tears.-----------------------------------------I know you now so many ways,And yet I don't know you at all,Will never know you,For you are a mystery impenetrableEven by joy.Love, like a wave, joins sea and sand,But then must roll back into itself,Singing in its lusty longing,Ever resurrected.Yet beyond love is love,Which neither lives nor diesBut simply is.Which now we share in a burst of inner glory.Which we become through will and time.---------------------------------------I never wanted to invadeThe forest of a friend.I never meant to plant myselfBeyond where I might end.But there it was--I wandered in--And seized a wild field,And turned its berries into corn,And took what it would yield.Years later, we would often walkOut to the boundary line,And picnic where the fence once stoodThat marked off what was mine.-----------------------------------------I love you with all I amAnd all I'll ever be.You are my moon, my sun and stars,My earth, my sky, my sea.My love for you goes down and downBeneath both life and death,So deep it must remain when IHave drawn my last faint breath.Holding you for months and yearsWill make Time disappear,Will make your lips my lips, your faceMy face, your tear my tear;Will make us one strange personageAll intertwined in bliss,Not man or woman, live or dead--Just nothing--but a kiss!please give me your opinion ...
  10. well , about novel security, I didn't to install to check it's security .... but i thing also it's secure .... here anybody tried novel?
  11. hi friends, anyone have tried Wireless Internet ? the differences between dialup or other connections wif wireless? is it secure?
  12. well, when u gain access to another system u need install a backdoor on that system to have more access or static access , when u choose it as a service it'll harder to stop that backdoor! and also with being as service , u have more options about running this backdoor in windows .... well mayank , what's ur OS ? your hardware models ? let me know to do sth.
  13. working link : http://forums.xisto.com/no_longer_exists/
  14. Part 1 , useful command line tools for network security. Info.txt: A handy collection of command line tools cpuinfo.exe - gets the processor type and CPU clocking speed (mhz) fport.exe - shows open ports and the process that owns the port iplist.exe - enumerates the ip's of the computer md5.exe - gets the md5 hash of a file pw2kget.exe - for win2k gets the password of the currently logged on user pwreveal.exe - gets the passwords of any window that has a ****** editbox regshell.exe - a commandline registry explorer/editor resolve.exe - a commandline URL resolver sendmail.exe - a commandline email sender uptime.exe - gets the machines current uptime xwhois - advanced whois lookup Screencap.exe - makes a screenshot of the screen and saves it to screenshot.bmp CMDget.exe - Downloads a file from a website from user provided parameters webscr.exe - creates a snapshot from the webcam and saves it shutd.exe - program that forces shutdown/reboot of machine bnc.exe - bnc for windows (see bnc.cfg) clslog.exe - clears app/security/system logs XP/NT/2k enum.exe - enumerates IPC$ share to collect information winfo.exe - enumerates IPC$ share to collect information FTPd.exe - small ftp server for dos (see slimftpd.conf) Global.exe - process dos command on all disc/subdirs iCmd.exe - telnet server 98/xp/nt/2k iislog.exe - clears IIS logs Info.exe - gets system information nc.exe - netcat pv.exe - process manager for dos Pwdump.exe - dumps SAM hashes scrnmode.exe - change screen mode from dos unrar.exe - unrar for dos wget.exe - wget for windows wizmo.exe - command tool (see w.txt) dwpp.exe - dial up password graber winrelay.exe - relay tcp/udp connections getad.exe - escalate to admin user in w2k pipeup.exe - escalate to admin user in w2k dnsid - identify remore dns server rinetd.exe see rinetd.txt Link well , the pass is : http://forums.xisto.com/ . i've tested with norton av and it's detect some of them as security tools ... doesn't matter.
  15. A prototype implementation of a wireless intrusion detection and active response system is described. An off the shelf wireless access point was modified by downloading a new Linux operating system with non-standard wireless access point functionality in order to implement a wireless intrusion detection system that has the ability to actively respond to identified threats. An overview of the characteristics and functionality required in a wireless intrusion detection system is presented along with a review and comparison of existing wireless intrusion detection systems and functionalities. Implemented functionality and capabilities of our prototyped system are presented along with conclusions as to what is necessary to implement a more desirable and capable wireless intrusion detection system. Link
  16. simply enter in command proment : reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v ServiceName /d "c:\path\to\service\file\exe"
  17. well , we can disable echo command for security ... let's go on: WARNING: make a backup copy of cmd.exe first!! open cmd.exe ( if you don't know where is it, use windows search) with a hex editor, and then search for echo ... you should get this results : 0002F8D0 | 5000 4400 0000 0000 4100 5300 5300 4F00 | P.D.....A.S.S.O. 0002F8E0 | 4300 0000 4600 5400 5900 5000 4500 0000 | C...F.T.Y.P.E... 0002F8F0 | 4400 4500 4C00 0000 4500 4300 4800 4F00 | D.E.L...E.C.H.O. 0002F900 | 0000 0000 4500 4E00 4400 4C00 4F00 4300 | ....E.N.D.L.O.C. 0002F910 | 4100 4C00 0000 0000 4500 5200 4100 5300 | A.L.....E.R.A.S. Now just change just change "4500 4300 4800 4F00" to "0000 0000 save and exit from editor ... now run cmd.exe * edit to fix typo in Topic Title and add Topic Description *
  18. This document describe the usage of Bluetooth security as well as additional security mechanisms for selected Bluetooth wireless profiles. Link
  19. well mayank , i'll give u an example , u have gained access to a system by exploit and it gave u the admin rights ... but u wanna create another admin account that u don't want to show on logon screen becase of the primary administrator /// ait?
  20. well , Firefox is really better than IE as it's high secure and ... but somehow we have to to use both of them , cuz maybe some plugins don't work with firefox ...
  21. I agree to u,but u know in some situations u should only have win2000 .... Win2003 Server is really perfect.
  22. Internet Explorer allows users to utilize Windows's COM Objects. A vulnerability with javaprxy.dll allows attackers to craft a special HTML code that will cause Internet Explorer to execute a remote command by using one of Windows's COM Objects. u can find the patches here : http://www.microsoft.com/err/technet/security/ also i just posted the exploit link here for educational perposes : http://imp.ovh.net/fr/
  23. Well I thing most users of here are using Microsoft , yea ? maybe some of them use Win2000 , It's from microsoft >>> Overview This document provides administrator guidance for how to set up and configure secure Windows 2000 systems in several scenarios. This document is a baseline for other hardening guides published by Microsoft, such as the Microsoft Solutions for Security. This document is not meant as a replacement for the Windows 2000 Common Criteria Security Configuration Guide, but rather as a more generally applicable hardening guide which applies to a much broader range of specific systems which may include or exclude services specified in the Windows 2000 Common Criteria evaluated configuration. The Common Criteria guide is designed for general purpose systems that specifically need to be compliant with the Common Criteria evaluation requirements and sacrifices some usability to do so. The document you are currently reading is designed to provide more generic guidance for a wider range of specific system classes, without necessarily trading off basic operating system functionality. The recommendations in this guide were generally chosen to safely allow Microsoft customers to deploy the recommended settings on existing Windows 2000 systems, not just on newly-built systems. We have also reviewed the default permissions on Windows Server 20003 and recommended those permissions here where they did not break existing Windows 2000 Server services. This guide covers hardening of Windows 2000 in three different configurations each for Windows 2000 Professional and the Windows 2000 Server family. The configurations are designed to be very generic to enhance applicability. Link
×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.