• Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
  • Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!
Collapse

You are not logged in or you do not have permission to access this page. This could be due to one of several reasons:

  • You are not logged in. If you are already registered, fill in the form below to log in, or follow the "Sign Up" link to register a new account.
  • You may not have sufficient privileges to access this page. Are you trying to edit someone else's post, access administrative features or some other privileged system?
  • If you are trying to post, the administrator may have disabled your account, or it may be awaiting activation.

Previously on "Any NMAP experts out there?"

Collapse

  • Sysman
    replied
    Originally posted by vetran View Post
    Sysman is our treasure hunt winner.

    27 minutes!
    As it happens I had already downloaded the PDF earlier in the day, to save it for posterity.

    :

    Leave a comment:


  • doodab
    replied
    Originally posted by OwlHoot View Post
    What's more, if "they" could update Microcode remotely, it would only be a matter of time before hackers figured out how to do the same.
    That paper is BS, but microcode updates do exist, and they are processor specific. The code that applies such an update has to check the processor type and version and so on.

    https://wiki.archlinux.org/index.php...crocode_update

    Hackers are more likely to target BIOS and boot ROMs on network cards than CPU microcode IMO.

    Leave a comment:


  • suityou01
    replied
    On a serious note, anyone read "Certified Ethical Hacker"? Cracking reading. My plan B involves writing something along the lines of a firewall/packet sniffing tool so am a bit of a TCP nerd. Absolutely cracking reading.

    And there's exercises to learn on, and servers on the web to allow you to practise on

    Sometimes these tricks come in handy.

    PM : Suity, so an so is on holiday and we have a business critical situation.

    Suity : We don't have the passwords.

    PM : Is there no way in?

    Suity : Maybe

    Leave a comment:


  • OwlHoot
    replied
    Originally posted by Sysman View Post

    <cough>

    El Reg

    </cough>


    Leave a comment:


  • vetran
    replied
    Originally posted by DodgyAgent View Post
    FTFY
    only for the right Client

    Leave a comment:


  • DodgyAgent
    replied
    Originally posted by vetran View Post
    Typical agent doesn't read the document sent to him.

    Agent - 'So John you have expertise in SQL sever 2050'

    Applicant - 'No on my CV its says I'm a masseuse - haven't you read it?'

    Agent - are you a masseuse as in "Happy ending"?

    see Sysman's link.
    FTFY

    Leave a comment:


  • vetran
    replied
    Originally posted by DodgyAgent View Post
    No it does'nt
    Typical agent doesn't read the document sent to him.

    Agent - 'So John you have expertise in SQL sever 2050'

    Applicant - 'No on my CV its says I'm a masseuse - haven't you read it?'

    Agent - 'No'

    see Sysman's link.

    Leave a comment:


  • DodgyAgent
    replied
    Originally posted by vetran View Post

    No it does'nt

    Leave a comment:


  • vetran
    replied
    Sysman is our treasure hunt winner.

    27 minutes!

    Leave a comment:


  • Sysman
    replied
    Originally posted by OwlHoot View Post
    I smell BS.
    <cough>

    El Reg

    </cough>

    Leave a comment:


  • Sysman
    replied

    Leave a comment:


  • OwlHoot
    replied
    I smell BS. At a cursory glance, large parts of the paper read like that spoof sociology (?) paper on hermaneutics or whatever it was called, all meaningless academic mumbo-jumbo.

    Also, wouldn't Microcode be processor specific? Intel v AMD v etc etc? Unless Windows demands a common core, for example for DRM (Digital Rights Management) and all the other bells and whistles doubtless needed these days.

    What's more, if "they" could update Microcode remotely, it would only be a matter of time before hackers figured out how to do the same.

    Leave a comment:


  • vetran
    started a topic Any NMAP experts out there?

    Any NMAP experts out there?

    this looks interesting


    http://nmap.org/misc/hakin9-nmap-ebook-ch1.pdf
    Last edited by vetran; 5 October 2012, 16:06.

Working...
X