The Microsoft Network (The MSN) is an example of a large cookie. After you select the options you want for your Web page, the server writes that...
MS denies it publicly but has taken steps to investigate the alleged flaws. I am for responsible disclosure as well, but I think the key operative...
Oh I could always tell a joke from the truth. I do that everyday at work! 10 years now.... I go to 10Forward to lighten up...
If this were a serious alternative, I wouldn't even be at Wilders. Why bother if at the end of a discretionary period, I could just simply...
Thanks guys! I finally settled for Tune Up 2004... Nothing spectacular but keeps my PC in tip top condition... No warnings or errors in my Event...
ENOUGH! Please...
You don't have to know me to google the things I've written about for verification. The frustration stems from the fact that most of the regular...
For chrissake Notok! This is a forum where there can be as many points of view as there are participants! There were no attacks on...
And what do you think I've been trying to do? I've been reading between the lines. Have you? SP2 does not broadcast file and printer...
Best advice thus far! Windows XP is a very complex system developed to be everything to everybody. Who knows what the smallest bug in its code...
Imagine your home network. Imagine the file/printer/resources sharing enabled in your trusted home network environment. This is the environment...
Yeah sure! I worked on a Criterion 8500 (NCR Mainframe) when I was 20, (too old by today's standards) so I am starting my daughter young... she's...
Visited this link http://www.pcwelt.de/know-how/extras/103039/ and read about so much crap and half truths: The default for Windows is the...
Use a screen shot!
Most internet applications try to act as servers if allowed to! ZA, Naviscope, etc. Aww... Shucks! close to 10 years of computer security...
Slowly, the picture is clearing up... The common denominator here appears to be SP2. There appears to be too many horror stories encountered AFTER...
;D ;D ;D I can just read the headlines! Super Hacker breaks into civil activist lawyer's computer to retrieve MP3 files that were deleted...
I should have looked this up too, but i thought it was already pointless after the first few hits that turned up common window processes. My...
Most of the names mentioned by Marja are debugging tools/modules used in developing NT! Some things don't change and the most basic...
Yeah.... Look at the posting time.... all of about 30 minutes....
You can use the checked version of the Kerberos.dll (client) or Kdsvc.dll (domain controller) file and a registry modification to output Kerberos...
At the risk of being off, allow me to give the following as an example of potential chaos: WinLogon.exe vs. WinLogon.exe.... Which one is the...
I never doubted that there were problems... just the reasons presented... When causes are demystified, they somehow become less interesting.Is...
In the mad scramble to come up with the perfect system, we have all been guilty of installing apps that have become more and more beyond our...
;D Better than the HOUDINI, ASMODEUS/666 theory I'd say! Though not as mystifying LOL! ;D
Separate names with a comma.