Security Basics Mode:
(Page 6 of 1428)  < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >
freeware software that can identified specific vulnerability 2013-10-25
Narrainen Oulaganaden (Oulaganaden Narrainen mpcb mu)
Hi Team ,

Can someone help me to find a tool that can identified HTTP Header Vulnerability.

Regards,

Arougen Narrainen

________________________________
[MPCB]
________________________________

Disclaimer:

This e-mail and any files transmitted with it are confidential and intended for the addre

[ more ]  [ reply ]
how to find vulnerabilities in a freeware software 2013-10-25
shivaone gmail com (3 replies)
Hi Team,

Please help me out in identifying the tool which will capture vulnerabilities in a freeware/Shareware/ Open source applications

Regard's

Shiva

------------------------------------------------------------------------

Securing Apache Web Server with thawte Digital Certificate
In this g

[ more ]  [ reply ]
Re: how to find vulnerabilities in a freeware software 2013-10-25
Manolis Mavrofidis (mmavrofides gmail com)
Re: how to find vulnerabilities in a freeware software 2013-10-25
psiinon (psiinon gmail com)
Re: how to find vulnerabilities in a freeware software 2013-10-25
Robert Larsen (robert the-playground dk)
Re: UDP question 2013-10-16
ToddAndMargo (ToddAndMargo zoho com)
On 10/16/2013 05:38 AM, Rob Toback wrote:
> Why do I keep getting messages about moderators failing to act on my
> message, but I don't seem to be getting any of the communications from
> other users?
>

Drives me nuts too. I have taken to Cc'ing the person who originally
wrote me so that at least

[ more ]  [ reply ]
Re: UDP question 2013-10-16
ToddAndMargo (ToddAndMargo zoho com)
Hi! This is the ezmlm program. I'm managing the
security-basics (at) securityfocus (dot) com [email concealed] mailing list.

I'm working for my owner, who can be reached
at security-basics-owner (at) securityfocus (dot) com. [email concealed]

I'm sorry, the list moderators for the security-basics list
have failed to act on your post. Thus, I'm returning

[ more ]  [ reply ]
Re: Locate wifi client 2013-10-16
ToddAndMargo (ToddAndMargo zoho com)
Hi! This is the ezmlm program. I'm managing the
security-basics (at) securityfocus (dot) com [email concealed] mailing list.

I'm working for my owner, who can be reached
at security-basics-owner (at) securityfocus (dot) com. [email concealed]

I'm sorry, the list moderators for the security-basics list
have failed to act on your post. Thus, I'm returning

[ more ]  [ reply ]
Re: nmap root vs user question 2013-10-15
ToddAndMargo (ToddAndMargo zoho com) (1 replies)
On 10/15/2013 11:16 AM, Mikhail A. Utin wrote:
> Hi,
> Not sure about two you refer to. In any case core Nmap is CLI-based, and it could be any sort of frontend on its top. All use original CLI functionality, but may limit it by developer's taste.
>
> Regards
>
> Mikhail

Hi Mikhail,

What I was re

[ more ]  [ reply ]
3G & 4G security 2013-10-16
Fabio Alceu Fernandes (fabio_fernandes outlook com)
Re: UDP question 2013-10-14
ToddAndMargo (ToddAndMargo zoho com)
i! This is the ezmlm program. I'm managing the
security-basics (at) securityfocus (dot) com [email concealed] mailing list.

I'm working for my owner, who can be reached
at security-basics-owner (at) securityfocus (dot) com. [email concealed]

I'm sorry, the list moderators for the security-basics list
have failed to act on your post. Thus, I'm returning i

[ more ]  [ reply ]
Re: metasploit install problem 2013-10-14
ToddAndMargo (ToddAndMargo zoho com)
Hi! This is the ezmlm program. I'm managing the
security-basics (at) securityfocus (dot) com [email concealed] mailing list.

I'm working for my owner, who can be reached
at security-basics-owner (at) securityfocus (dot) com. [email concealed]

I'm sorry, the list moderators for the security-basics list
have failed to act on your post. Thus, I'm returning

[ more ]  [ reply ]
Re: nmap root vs user question 2013-10-14
ToddAndMargo (ToddAndMargo zoho com)

>> On Fri, Oct 4, 2013 at 5:29 PM, ToddAndMargo <ToddAndMargo (at) zoho (dot) com [email concealed]
>> <mailto:ToddAndMargo (at) zoho (dot) com [email concealed]>> wrote:
>>
>> Hi All,
>>
>> "#" is my "root" prompt and "$" is my user prompt.
>>
>> Question: why does namp sometimes work as root
>> and not as a user? Why no warning

[ more ]  [ reply ]
Re: nmap root vs user question 2013-10-14
ToddAndMargo (ToddAndMargo zoho com)

On 10/07/2013 06:47 AM, Mikhail A. Utin wrote:
> HI,
> I never run Nmap as user. The software uses OS resources, which
require root privilege. BTW, if you run GUI Nmap Like NmapFE, and as a
user, it will tell you that "You are *NOT* root - Some options are not
available".
>
> Regards
>
> M

[ more ]  [ reply ]
Re: nmap root vs user question 2013-10-12
ToddAndMargo (ToddAndMargo zoho com)
On 10/07/2013 07:39 AM, Rob wrote:
> Is anybody else somewhat worried about this person doing penetration
testing
> and PCI compliance auditing?
>
> No offense dude, but this is not something that can be learned from a
> security basics mailing list.
>
> I do want to help, and I do want you

[ more ]  [ reply ]
Re: When some is infected? 2013-10-12
ToddAndMargo (ToddAndMargo zoho com)
On 10/11/2013 04:28 AM, Chris Hurst wrote:
> Wireshark takes a lot of knowledge and familiarity. It would be better
> suited for trying to find out what was being sent to the C&C server if
> you found a bot. Generally, running "netstat -n" in a cmd primpt, then
> checking the foreign addressess the

[ more ]  [ reply ]
Re: Aw: When some is infected? 2013-10-12
ToddAndMargo (ToddAndMargo zoho com)
On 10/11/2013 12:41 AM, Adam Pal wrote:
> Hi,
> sorry, i dont get it.
> What exactly are you asking about:
> 1. client security (including AV)?
> 2. scope of a Pentest (which should be clearly defined and performed by
> a trusted company)?
> 3. network security (you never mentioned a FW)?
> 4. heurs

[ more ]  [ reply ]
Re: When some is infected? 2013-10-12
ToddAndMargo (ToddAndMargo zoho com)
On 10/11/2013 04:17 AM, BillV-Lists wrote:
> Hi Todd,
>
> I'm not sure I understand what you're asking for. When you walk up to a
> "protected" computer... are you talking about a system protected with
> Kaspersky?

Yes. And reasonable steps taken to protected it.

> And what do you mean "get past

[ more ]  [ reply ]
Re: When some is infected? 2013-10-12
ToddAndMargo (ToddAndMargo zoho com)
On 10/11/2013 02:04 AM, Nicolas Mitchell wrote:
>
> On 11 Oct 2013, at 04:11, ToddAndMargo <ToddAndMargo (at) zoho (dot) com [email concealed]> wrote:
>
>> Hi All,
>>
>> Since I sell Kaspersky and have had a lot of customers
>> on it for years, I have learned that if something gets
>> by Kaspersky, it is going to be a wild r

[ more ]  [ reply ]
When some is infected? 2013-10-11
ToddAndMargo (ToddAndMargo zoho com)
Hi All,

Since I sell Kaspersky and have had a lot of customers
on it for years, I have learned that if something gets
by Kaspersky, it is going to be a wild ride getting rid
of it. (I get rid of them manually and/or run other
vendors stuff at the computer.)

Now a days, when I walk up to

[ more ]  [ reply ]
(Page 6 of 1428)  < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus