Sysinternals Regmon. http://www.sysinternals.com/ntw2k/source/regmon.shtml
Laters,
Dave King CISSP
http://www.thesecure.net
Danny wrote:
Anyone know of any free tools to analyze what changes have been made
to a Windows 2000/XP registry?
Thanks,
...D
Another possibility for static analysis would be to use Regedit to
export the registry to a text file before and after and then use WinDiff
or ExamDiff or some other file comparison utility to find the changes
for you.
Laters,
Dave King
http://www.thesecure.net
Cassidy Macfarlane wrote:
You
and has all the features I need, plus
it's free.
Laters,
Dave King
http://www.thesecure.net
[EMAIL PROTECTED] wrote:
List,
I'm an expert in nothing so when I saw this I had to ask, as Im sure theres
someone out there that is a WiFi expert.
Google has found no answer so here goes.
Last night we saw
://www.vnunet.com/news/1159171
http://www.theregister.co.uk/2004/11/04/phishing_exploit/
the only article that seems to says anything about patched users being
protected that I could find was this one:
http://software.silicon.com/security/0,39024655,39125549,00.htm
Dave King
http://www.thesecure.net
://www.vnunet.com/news/1159171
http://www.theregister.co.uk/2004/11/04/phishing_exploit/
the only article that seems to says anything about patched users being
protected that I could find was this one:
http://software.silicon.com/security/0,39024655,39125549,00.htm
Dave King
http://www.thesecure.net
username/password. Are you set to login
automagically?
Dave King
http://www.thesecure.net
DogoBrazil wrote:
Hi everybody!
I decided to test Google Desktop Search yesterday, 10-14-04. It's
supposed to seach almost any kind of information inside my
hard-drive. In the beginning I put my nick
my message, again as
expected. So, once again, I was unable to replicate the automagic sign
in without having explicitly enabled it on a previous sign in, looks
like Google's not pulling any crazy hacker tricks after all.
Dave King
http://www.thesecure.net
[EMAIL PROTECTED] wrote:
Hello All
F-Secure is reporting it as bangle.al. Looks like it's your basic email
virus with a trojan backdoor.
http://www.f-secure.com/v-descs/bagle_al.shtml
Dave King,
http://www.thesecure.net
Jonathan Grotegut wrote:
(In regards to new_price.zip file attachment)
Anyone have any idea what
this page seems to be thoughtful enough to only
display the ad the first time you visit it. Tricky little devils aren't
they (and getting trickier all the time).
Dave King
http://www.thesecure.net
James Woodcock wrote:
This might seem like it should be going to a webdev list, but there's
a possible
the same plaintext always makes the same MD5 hash, then
you've got your plaintext. It's bascially a memory vs. time tradeoff.
I agree with you about potential problems publically posting stuff to be
cracked, be leary. 150 hashes a day is pretty fast though. . .
Dave King
www.thesecure.net
as well.
You may also be able to get Adaware, or some similar program, to run
using WINE on a Knoppix based distro like Auditor Security Collection or
Knoppix-STD.
Good Luck,
Dave King
http://www.thesecure.net
Lee Leahu wrote:
Hello Everyone,
I recently came across a linux based live-cd
You might try nessus (http://www.nessus.org) and turn on all the
dangerous plugins and turn safe checks off. It also has some detection
evasion stuff. Good luck.
p.s. Marcin asked what to pentest means. It's just a slang term for
penetration test.
Dave King
http://www.thesecure.net
H D
12 matches
Mail list logo