Search results

  1. R

    AOL Port Number?

    Port 5190 is often used only for the first authentification state. After this the Client disconnect from this server (most times login.oscar.aol.com) and connect to the real server. And this server often use port 53. Don't know why especially because 53 is for dns.
  2. R

    [HOWTO] - Digitaly Sign and Encrypt Email using Apple Mail

    Why not using the original PGP. Ok you have to pay a small amount for it but it's ways better that GnuPG... I used GnuPG and some others like OpenPG bevor and they worked most the time (sometimes not compatible with a new PGP version) but they are nothing compared to PGP Personal Edition with a...
  3. R

    Mail encrypting

    I'm missing the option "Yes, if it's content is important" but so I've choosen "Yes" Depends here on the content. Simple mails with normal chatting or simple questions i.e. go unencrypted. More important things leave here using my SSL enabled Mailserver in the US so the content is encrypted...
  4. R

    audio ripper

    And if you search a ripper able to rip audiostreams out of the net or any other audio output from a application try AudioHijack. In my opinion AudioHijack Pro is the best stream/audio ripper ever written.
  5. R

    who's using my wireless and how to prevent it

    Yeah. You also may have a look at the first movie (the one at the bottom and server 2 ist fastest here) at www.thebroken.org But you should first get informed if it's legal to watch movies showing how to hack or use such programs (even if the description is meant to show it in order to know...
  6. R

    who's using my wireless and how to prevent it

    a honeypot (sorry had it wrong in my last post) is a security device/program that emulates or offers services in a network . So for example if someone gains access to your network and scans/test it he will find a fresh installed Windows server at IP x.x.x.5 But what he of cause doesn't know is...
  7. R

    who's using my wireless and how to prevent it

    But you should all remember that even if you use locking to given MAC addresses to restrict the access anybody still can be out there and passiv sniffing what you transmit. So I would always turn on encryption. And if this would be my network (ok, I won't use wireless) the first thinks I...
  8. R

    Is it possible to hijack my DSL service...

    The problem with Letterstick is that HenWen (or better the included snort) saves all the alerts under /var/log/snort. Letterstick trys to open the alert file there to watch for changes. Sometimes it's possible that this directory/file is protected to Letterstick (you) haven't the right to...
  9. R

    Is it possible to hijack my DSL service...

    No, you just install darkstat on your Mac under OS X. Darkstat then sniffs all packets this Mac transfers. So if you use multiple computers you have to install it on every of this computers.
  10. R

    Is it possible to hijack my DSL service...

    Ok, I suggest you to download darkstat 2.6 for OS X. This app is a statistic sniffer that analyse your network traffic and can do some usefull thinks like showing you total bandwidth in and out or what ist often very interesting it can show you where your bandwidth has gone. So you can see how...
  11. R

    Looking the ip over in the icq or messenger

    Hmm, I don't know a special software for that free available for MacOS. But I can tell you the following: You want get the IP from every person using ICQ. But actually most clients/user will send this info without knowing it :) You can look up the IP easily using a sniffer like tcpdump (or...
  12. R

    Your password for chocolate? 71 % choose chocolate.

    Yes, would be interesting to know that. Personally I would never give my password away (ok, maybe for $10.000+ ;) ) as one of my interests ist computer and network security. But sadly I know that you in most cases don't need to ask for the password. Just ask for their login name would be...
  13. R

    Encrypting a string and decrypting with password - OpenSSL?

    First if your webserver is running on a *nix box you could easily create simple shell-scripts and call them like any cgi from within you page. You just have to start your file with #!/bin/bash instead of the pearl stuff. Maybe this works for you. And it should be no problem to use a simple...
  14. R

    A use for Bluetooth I'd never have imagined...

    No, I don't think so. SMS is a service i can't disable. But there is no reason why my phone should have bluetooth enabled all day and everywhere. And switching bluetooth on/of just takes me 2 clicks that could be done in 1 second. BTW: Did you know that enabling bluetooth is not allowed in...
  15. R

    A use for Bluetooth I'd never have imagined...

    :D I've used bluetooth a few times to send some unknow colleagues contacts like "Error, Card empty" or thinks like that. It's funny to see them checking their phone for some error. They even didn't recognice the "New contact" at the top of the display ;)
  16. R

    Encrypting a string and decrypting with password - OpenSSL?

    Yes, this is possible with OpenSSL in a very simple way like: openssl des -e -aes128 -k mypass -in Inputfile -out cryptedfile -e means encryption. Try -d to decrypt -k is the key -in and -out the files to handle Hope this helps and is what you are searching. If you don't wanne use...
  17. R

    GPL License question

    I just found a text saying that an application package is considered just a folder under the GPL. And then imservices is just a part in this folder and not included in the application itself. So there seems to be no problem with this if you take the app as a folder. So my question is solved...
  18. R

    GPL License question

    I just searched a bit in the new Proteus4 Beta and recognized that it use imservices under the GPL License. And because I haven't anything better to do I started reading a bit in this license and found: So my english is maybe not the best and all those license's and law's are always a...
  19. R

    Interesting law decision regarding chats...

    Just a note to the farwarding mail think. This is (at least in germany) not allowed. In germany it's also illegal to send mails to multiple receivers if they are all inserted in the To or CC field because than every receiver can read all those other mail addresse's. Here you hate to use the...
  20. R

    Interesting law decision regarding chats...

    I've just found a very interesting artice regarding chat logs... I think you should read this: http://www.securityfocus.com/columnists/233 As far as I understand this means that you are nor allowed to create a log or history from an chat session (AIM, ICQ..) or even screenshots from the...
Back
Top