Skip to main content

Intel

Review of DIVA LAN ISDN Router

posted onJuly 15, 2000
by hitbsecnews

This article first appeared on CNet Malaysia. You can get it here

Quick Facts : Operating
system independent, 4-port 10BaseT network hub, expandable to 50
users, Console port for administrative purposes, DHCP server and DNS
relay, Full ISDN BRI compatibility, On-board STAC compression and
transparent PPTP support, Interoperable with all major switch types,
Telnet and TFTP Support, IP filtering and spoofing.

A look into VPNs and setting one up

posted onJuly 15, 2000
by hitbsecnews

This month, I was thinking perhaps I would take you
through an interesting little application called PoPToP - which
offers a free and secure VPN solution for almost any sized business.
But before we get into the application itself, perhaps its a good
idea to talk a bit about VPNs and the technology behind them.

VPN

Having fun with system.ini

posted onJuly 15, 2000
by hitbsecnews

Just can't get enough of win.ini eh? well, micro$oft, being so good as to forget two vulnerabilities exposed by accessing the win.ini via dos before windows boots up, left a nice gap for hackers to explore and have fun...heh, heh. Now on to some mischief with its counterpart: the system.ini file.

Well, by now I'm sure you know how to edit win.ini, same thing with system.ini. Like so at dos:

C:>edit c:windowssystem.ini

Basics of Internet Investigations

posted onJuly 15, 2000
by hitbsecnews

Most people assume that while online they remain relatively anonymous. While this is a pleasant myth, it is just that, a myth. Whenever you connect to the internet you leave traces behind. Unless you take active measures to erase your electronic footprints, you can be tracked down, and not just to your IP address, but to your street address.

Network Stacks & TCP/IP

posted onJuly 15, 2000
by hitbsecnews

Some _basic_ information on things related to the Internet and networks.
This article is basically a collection of useful information gathered from
varied
sources. This article is in no way what so ever meant to be any kind of
tutorial, it's only meant to show a few basic things that (IMOHO) everyone
should
know.

The Art of IRC

posted onJuly 15, 2000
by hitbsecnews

The art of IRC
by: JesterS

What is "IRC"? (Internet Relay Chat) A highly evolved form of communication between the people of the Internet community. Hackers have used this medium to pass ideas, thoughts and software for over 15 years.
How can I get into this deal? (www.mirc.com)

Daemon Processes

posted onJuly 15, 2000
by hitbsecnews

Introduction.

The most secretive, yet most productive, application or
service on a Unix system is the daemon process. A daemon,
pronounced 'demon,' process is secretive because it runs
in the background, and often does not indicate its presence
in any significant way. Without it, most Unix systems
would cease to function. Programmers write daemons to carry
out a function with little or no intervention by users
or system administrators. In fact, many daemons require
no intervention at all!

Issue #7

posted onJuly 15, 2000
by hitbsecnews

Well - we've finally come out of hiding from the dark side of the moon to bring you guys Issue #7. I know a lot of people complained that Issue #6 was a total let down in the sense that it didn't have as many articles as previews issues and all that jazz. Well you need to understand that there's a prefectly good reason for that - we were working on redoing the site interface (the one you see now) and incorporating all the following new features (which you guys asked for actually).


searchable database of news and articles
user message threads
user forums