what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2000-03-11 to 2000-03-12

languard.exe
Posted Mar 11, 2000
Site languard.com

LANguard Internet Access Control monitors all Internet traffic to prevent unproductive use of the Internet. Its rules engine allows you to specify which sites are allowed, and what type of content your users can search for or read. LANguard has extensive internet usage reporting tools. Because LANguard uses a sniffer engine, it is easy to install and does not affect Internet performance or require you to reconfigure your network clients. It also protects against; External threats (hackers), Internal threats (users accessing shares they are not authorized).

SHA-256 | ac07c973f2754c5e221c64aec6dd1a0e88c5a2d65bae674cd01b5e0a0ca638df
unpassworded.dsl.routers.txt
Posted Mar 11, 2000
Authored by Andrew R. Siverly

In the deployment of the Cayman-DSL router and many others, technitions are failing to reset the default password which in many cases default to no password at all. A malicious user could scan for such devices and on a DSL providers network. Worst case scenerio, the static routing tables can be altered to permit remote sniffing.

tags | exploit, remote
SHA-256 | d832de63ac31ac9655f2f4b29833981f513ac46b8147d8182cb019544f660fb0
tcpdecode.pl
Posted Mar 11, 2000
Authored by S

TCPDecode accomplishes about the same thing the tcpdump2ascii, but it does so with much less code and provides an easier to read output.

tags | tool, sniffer
SHA-256 | a6eac96120866390646660bdabb8ef5e5b3f8a31249293e25ef780be0b0411f9
compvuln_draft.pdf
Posted Mar 11, 2000
Authored by Eric Knight | Site securityparadigm.com

Online copy of the book "Computer Vulnerabilities" covers a complete description of how vulnerabilities can be catagoried, adding great detail to previous works on vulnerability taxonomies. This book is a draft, but because of the dynamic nature of network publications, can be revised at any time.

tags | paper, vulnerability
SHA-256 | b017addf7ec81401e5026b13d3fc00546528550c6a103037ac50b5b1932788c8
IRCrack09.zip
Posted Mar 11, 2000
Authored by Cerebus Artifact

IRC Crack is a Win98/2000 brute force password cracker for IRC channel keys. Connects directly to an IRC server and uses a wordlist.

systems | windows
SHA-256 | b9ee453bc5cf51530499458994d62e93cc4b842b698c0c81a2def82d2437b83e
oftpd-0.1.1.tar.gz
Posted Mar 11, 2000
Authored by Shane Kerr | Site time-travellers.org

oftpd is designed to be as secure as an anonymous FTP server can possibly be. It runs as non-root for most of the time, and uses the Unix chroot() command to hide most of the systems directories from external users--they cannot change into them even if the server is totally compromised. It also contains its own directory-change and directory-listing code (most FTP servers execute the system "ls" command to list files).

tags | root
systems | unix
SHA-256 | 42151cf3c02b3b9b12ce513387ad50f2b4e084cf1856d66c69338d8275300196
sharesecret-0.1.0.tar.gz
Posted Mar 11, 2000
Authored by Stefan Karrmann | Site mathematik.uni-ulm.de

Sharesecret splits a secret into parts, such that at least all of the parts are needed to reconstruct the secret. If you have fewer parts you know only the length of the secret.

tags | encryption
SHA-256 | 348b2798ad28ffdc6723ebe4ce071b9c1688d2a61c8d2123eb7f84349e365e39
phantom_security-1.00.tar.gz
Posted Mar 11, 2000
Authored by Joe Thielen | Site joethielen.com

GNU Phantom.Security is a computer-controlled security system. Using the software and a simple circuit board (schematics included) that you build, you can create a good basic security system that is computer controlled. The system can use off-the-shelf security devices like motion sensors, door magnets, and fire/smoke detectors with little to moderate modification. And if the machine the system is running on is connected to a LAN/WAN or the Internet, you can have it send e-mail. If you have a pager or cell phone capable of receiving e-mail, then you will have around the clock intrusion/fire detection for your home or office.

systems | linux
SHA-256 | 9eaa387121633d4df3b14893d5c1e298e89be86a5ea069c88fae80bbf8692429
regraper.zip
Posted Mar 11, 2000
Authored by Mr.Mojo | Site dis.org

Extracts .reg files from user and system.dat.

SHA-256 | ff7990bd77886a80a829103c402fce23ff547a8d02633cbe18cbb39d10f9f454
crypto.zip
Posted Mar 11, 2000
Authored by Mr.Mojo | Site dis.org

This text file which will explain to you how to decrypt win9X paswords stored in the registry. In doc,ascii,and palmpilot formats.

tags | registry
systems | windows
SHA-256 | 98dcc9f40341685cfecb9b4edcef3ab58328645c74317fb40c86a31b172e6f07
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close