Search results

  1. scruffy

    How people stores the password in database?

    You don't really want to be able to retrieve the password - if you can, then an attacker might be able to. It's a very standard security practice (everywhere except in Windows...). For somewhat better security, you could use what's known as a 'salted' hash - you store a random number or a...
  2. scruffy

    Verisign random password dongles OS X?

    Hmm, looks interesting - I was only familiar with the RSA product. They use an open standard, something (which I hadn't heard of before) called the OATH one-time password algorithm. There are a few other vendors who use the same standard, so if you can't find an OS X implementation from...
  3. scruffy

    Renepo.b / Opener Malware

    Sorry, I misread the original post - I got the impression you had confirmed you had been hit with Opener. It looks more like your disk just went bad (hardware or file system error, doesn't matter much which). The original suggestion of firewire target disk mode to recover your files is still...
  4. scruffy

    IBM claims that Apple's statement about Intel being more powerful isn't true.

    There's a rather credible article on ars technica http://arstechnica.com/columns/mac/mac-20050710.ars That puts forth a possibility that no one here seems to consider - IBM told Apple they weren't interested in their business. Lots of people here would likely get offended at the mere...
  5. scruffy

    Renepo.b / Opener Malware

    Opener is some nasty stuff. Not very sneaky, but nasty. Do you have a spare Mac, or access to one at a friend's place? Preferably not a friend who's liable to have the same malware you got, i.e. not someone who'd be in your first friend's buddy list... You might try booting into firewire...
  6. scruffy

    adding permanent static routes?

    You just need to put the commands in a script that runs on startup. In 10.3, /System/Library/StartupItems/Network/Network seems to be where the system checks for the IPFORWARDING variable and such. It may not be advisable to muck with stuff from /System though, so you may want to put...
  7. scruffy

    Locking the Desktop for user?

    Just a quick question - why? I mean, they all have their own accounts right? And if not, why not? That said, you could prevent users from writing to their own desktops, for what it's worth. The users could of course undo the change just as easily: chmod a-w ~someuser/Desktop
  8. scruffy

    the AHA! moment...

    If you open the drive in list view, sort by size, and then go into "view options" and click on "calculate all sizes", then you can quickly see where most of the disk space is used up.
  9. scruffy

    Can You Explain This Bizarre Hotspot Experience?

    More likely you've got a neighbour you don't know, and her wifi connection just happened to show up... What other information could you get on this connection?
  10. scruffy

    Port forwarding with a Linksys router

    Does your ISP block inbound ports 20 & 21? Wouldn't be that surprising if they did. When you scan the router for open ports, where are you scanning from - are you actually behind the router? Because you don't care what it looks like from the inside, you care what it looks like from outside...
  11. scruffy

    Firewall & Site Admin Issues - Time-outs

    A firewall is really a second-best thing to not running network services at all. If you're not running network services, the firewall doesn't do much... Go to system preferences, check the sharing tab - if you're not running file sharing, printer sharing, etc., then the firewall isn're...
  12. scruffy

    Keylogger

    There are plenty of keyloggers for OS X - just search versiontracker for them. It would be fairly easy to make a program that installed a keylogger if you open it. No OS can protect you from malware if you open attachments indiscriminately. As Gia said, I've not heard of anyone doing this...
  13. scruffy

    Firewall and Security

    Well, the firewall you're using is the ipfw firewall in the kernel - no matter what configurator you use for it. It's a perfectly good firewall, to be sure. Depending on your level of geekiness and desire to dig into what's going on on your computer, the best configuration method would be...
  14. scruffy

    Real CPU Speeds

    It depends entirely what you're doing, really. And of course, it depends what OS you're running - a given PC with pick-yer-distro-of-Linux will feel a lot more responsive than the exact same PC running Windows XP... G5s are also rather nice in terms of bus speed and bandwidth. If you're...
  15. scruffy

    Security

    Some port sweep just hit your firewall. Nothing to be worried about.
  16. scruffy

    Unix Newbie can anyone help?

    I assume you mean getting other Unix based OSes to load on the G4, not on some other computer. Solaris works only on Sparc and x86, so that's out I'm afraid. Your best bet would likely be a Linux distro (apparently Ubuntu is a nice one, but I've not tried it), or NetBSD (the latter has a...
  17. scruffy

    Can a computer be over-worked?

    As you're running Tiger, there's temperature monitor docklets you might want to look into. Of course, that depends on there being recognized temperature sensors in useful locations... I have a rather loud blue & white g3, and I've found that just taking a piece of corrugated cardboard and...
Back
Top