Search results

  1. L

    The end of IPv4!

    Unless you're an ISP its really not the imperative
  2. L

    Update Cisco IOS?

    12.0 on the old 2948s doesn't support show int desc :-(
  3. L

    Has anyone tried to monetize their internet connection?

    Besides everything else this probably against the terms of service on your home DSL/cable/whatever account.
  4. L

    Trojan virus detected when viewing hardforum.com

    Sandboxie, Firefox, NoScript yay
  5. L

    Are networking jobs plentiful?

    Cisco certs are worth while and respected not to mention it gives you all the basics.... Networking is growing everything runs off IP networks mobile phones, cable television, every workplace.... If you get into the ISP world you will quickly find out companies use multiple vendors Juniper...
  6. L

    Intrusion Prevention Systems Question

    Are you part of the InfoSec department? A network based IDS can be run off a spanned port and at least give you reporting as to whats going on. I definitely wouldn't use 1 vendor for everything.
  7. L

    How to check encryption?

    You can run it on the same computer... Just connect to a regular http site while running wireshark stop the capture and then there should be an option to follow a TCP stream and reassemble it...you will see everything in plain text. Then try it again with SSL site
  8. L

    Got hacked from someone in Brazil

    Its probably all automated if it was some well known SQL injection
  9. L

    Help me wrap my head around QoS?

    That setup is extremely simple your just limiting bandwidth based on a rule set....
  10. L

    How do I set up 2 WANs on 1 LAN?

    You should probably setup a VPN. pfSense/Vyatta and a number of other products will let you setup a site to site VPN they also have load balancing and other technologies on them however you won't load balancing the VPN traffic.
  11. L

    ? for you IT security types...drive encryption software needed

    For a small deployment just use TrueCrypt If you were larger symantec and other companies make some decent products
  12. L

    Trojan virus detected when viewing hardforum.com

    You realize it would ask you to run an unsigned Java App?
  13. L

    Trojan virus detected when viewing hardforum.com

    LOL You realize I do pentesting/security work/analyze malware for a living... I'm glad you are all so informed
  14. L

    Trojan virus detected when viewing hardforum.com

    lol it's kind of funny this happened to a "security" forum and btw I don't run any AV and didn't have an issue with this
  15. L

    Is this topology "real world"?

    Doubt you will see much frame relay and ISDN in the real world today :-)
  16. L

    10Gb Ethernet over copper users? (CX4 v. SFP+ v. KX4/KR v. T)

    Sorta OT I still haven't seen anyone use copper 10GE Any reasons for using copper over fiber?
  17. L

    Static Ip in Router works with Cable Internet WHY?

    lol ISPs don't run large Layer 2 networks...that would scale horrible and destroy performance not to mention most ISPs Comcast, TWC, etc move video traffic around multicast so they already have nicely built networks. Also network blocks are assigned to the CMTS at least they are with Cisco and...
  18. L

    Making a 1U server quiet

    Do you have the proper drivers installed?
  19. L

    road runner FAIL!

    ISPs route private IPs because they use them for management of gear Cox/Comcast/TW use those IPs for video equipment also. If they really wanted to seperate the traffic the could use a VRF or VPRN for a separate routing instance.
  20. L

    road runner FAIL!

    What? Hopefully they have routing locked down? Please explain lol And BTW all the people who mentioned you can't use that private IP space because your ISP was...If your routing is properly setup you normally use your ISP for a default route however if you used multiple private ranges they...
  21. L

    road runner FAIL!

    ISPs sometimes use a VPRN or VRF to prevent spill over of private IP space into their main routing protocol but nobody is perfect.
  22. L

    road runner FAIL!

    They probably use private address space in their network its not uncommon for ISPs to do so.
  23. L

    How many of you networking/system admin people are into programming?

    I used shell scripts/python all the time writing configuration tools/monitoring tools I also do a lot of security work and often times need to create my own stuff
  24. L

    How many of you networking/system admin people are into programming?

    Python C Some perl shell script Im a network engineer for large ISP
  25. L

    Days that drag on

    Get some meaningless certs
  26. L

    Having difficulty understanding the OSI model.

    1. OSI model was created to allow vendors/programmers whoever to write software or create network devices with out having to rewrite the entire process from high level application down to drivers that control physical hardware. 2. Answer 2 goes back to answer 1 3. Not sure how the OSI model...
  27. L

    Apache vs. Lighttpd...

    If you're not doing any serious hosting and tuning of either just run Apache there are for more resources out there for it. If you are doing something serious and doing proper testing and config lighttpd can be much faster.
  28. L

    Rootkits?

    It's definitely out there... If all your doing is running malwarebytes/combofix maybe you should start spending some time learning about how to analyze malware and actually understand how the box got popped.
  29. L

    How easy/hard hard is it for someone to hack into a laptop on a public network?

    I would worry more about what you were doing on unencrypted wireless.... People could easily MITM and attack your browser, sniff data, run sslstrip. Using open wireless with out some sort of VPN is sketchy
  30. L

    Rootkits?

    Do you fix home PCs or small office PCs? You need to start looking at a malware that steals track 2 data and other cool shit if you want to see some nice rootkits or targeted malware.
  31. L

    Rootkits?

    wtf are you talking about... Theres are tons of rootkits that hide perfectly in memory in windows.
  32. L

    Rootkits?

    lol They're everywhere
  33. L

    Spying On My Own Wireless Network

    I posted semi technical details on page 1... My mistake lol
  34. L

    Internet connection drops from 22/10 to 7/4 through router; why?

    mturoute can help determine an MTU issue... I don't know if the router reports interface errors but if its duplex you will see collisions and input errors usually.
  35. L

    Spying On My Own Wireless Network

    This thread has epic fail all over it lol
  36. L

    Spying On My Own Wireless Network

    If you wanted to do this the way most attackers do you need a wireless card that can be set into monitor mode like the Alfa or other cards with the atheros chip set. You then use airodump or similar products and capture packets for WEP you need a lot of IVs to crack it you can do airreplay and...
  37. L

    I need recomendations for paid anti-virus

    All these people who have seen cases of updated AV and PCs that still get infected are prime examples of my argument. :-) I understand signature based AV worked in the past but the majority of REAL/CURRENT threats to PCs can't be stopped by looking for signatures which is why people still get...
  38. L

    Enable "bridge mode" on my TWC modem

    If its the Ubee and its put in bridge mode each ethernet port will give you a public IP just hang whatever home router you have off one of those.
  39. L

    I need recomendations for paid anti-virus

    lol Goverment and Corporate are usually targeted for more specific malware attacks Yet home users are usually attacked via drive by attacks have you ever looked at statistics? Look at all the new computers that come with Symantec or whatever AV and how many people each day are still getting...
Back
Top