but if you understand what a cryptographic looping file system is, why do you keep asking the same questions :blink: as i've tried to explain,...
no point in reporting since the chance of somebody being stupid enough to try and bruteforce from their own adress is minimal. portscan him...
yes, you cant use your own pc to build it, because it's infected. you need to get help from a friend (who has a clean pc of course)
well, running your disks in a crypto loop isn't supposed to help against recovering data if they have the correct key. so now, you'd have to...
why isn't it running under bartpe? i'd like to know, because i'm currently writing a plugin to do just that, and i'd be very intersted to know...
you dont have to pay anything at all. in laymans terms, what i said was that you could create a special cd and run your whole windows from that...
admt is a advertisment network. akamai provides backbone bandwidth. so, admt had a ssl certificate for one ad banner, but since the actuall...
i'll wouch for komplett, it's a norwegian company from the beginning, but i've had dealings with them both in norway, ireland and sweden. never...
consider this: its easy to dig up several revisions of previously deleted files, hence encrypting your drive without wiping it first is useless...
start from a boot cd that has antivirus, that way you can remove everything wihtout problems since the virus is not active :) for open source...
i haven tried Blink, but eEyes other corporate products are impressive, like Iris and Retina. well, they used to be anyway, haven't been in...
it would be because ESS doesn't white list, and comodo (even though legitimate) is in all honesty doing suspicious things to your computer, like...
shop could be anyone, but i would recomend two things: 1. buy a computer from a retailer with good international warranty, make sure you can get...
BSOD always have small reference numbers available on microsoft website, it will tell you if the application referenced illegal memory space, or...
try downloading o&o defrag, do a "full/name" defrag. any help?
i can reach it fine from here. telnet 82.127.35.133 9091
i have no idea due to not being behind the scenes at ESET, but an educated guess is that only messages from the folder 'INBOX' folder get scanned....
bittorrent has (so far) been somewhat safe from hi-jacking. older versions of uTorrent are vulnerable, but only to DOS attacks, not actualy...
Frederic: Blocking specific adresses feels like a backward way of doing things, i'd prefer explicitly allow certain traffic :lurking:
http://god.nihplod.com/~ethernal/nod_imon.JPG
the special thing about deep freeze is that it utilizes a hidden volume on your hard drive, thus it can "auto-reimage" when rebooting. other...
yep, sorry guys, never even heard of it before. i don't deal with end-users in my line of work, and the professional community around me has never...
because those products are built on freely available tools, then i can just as well roll my own and make it *just* the way i want it.
You fail to understand SPI firewalls, they use a miniport wan interface to filter traffic before it reaching your normal lan interface. during...
all of those adresses are non-routable. it's not that theyre not 'supposed' to be routed, it's downright *impossible* i fail to see the point in...
Separate names with a comma.