Monday, 28 February 2011
In my last post, i blogged about UTM’s which got a fairly positive response over mail :) . UTMs can be simply expressed as Next generation Firewalls, have evolved specifically from conventional firewalls. The first firewalls were software firewalls which were itself evolved from software routers. ...
Monday, 28 February 2011 by Lucky · 0
Saturday, 26 February 2011
Hi folks, as you know I am currently at Delhi, at Tulip Telecom, I got my hands on exotic network technologies which I would like to share out with you. I am working along Amarjit Singh & the rules of the game are simple, he will create a security scenario while I will try to break it. Considering...
Saturday, 26 February 2011 by Lucky · 0
Thursday, 24 February 2011
Hi friends, I am free this weekend :) & i believe most of you will be too. So, why dont you catch up with me at Maipu Convergence India 2011 ? I have been invited at Maipu Convergence India 2011 this weekend at Delhi, Pragati Maidan on Saturday 25 Feb 2011. If you want to join me, just drop...
Thursday, 24 February 2011 by Lucky · 0
Monday, 21 February 2011
While I was messing with Routers & virtualisation products, I came across FREESCO which is an open alternative to routing products offered by Cisco, 3-Com, Accend, Nortel etc. While all of these companies offer products that are well made, the overhead and overall costs can be expensive.FREESCO...
Monday, 21 February 2011 by Lucky · 0
Saturday, 19 February 2011
Hi folks..I have started my first steps into Cisco, & would be sharing my small experiments in it. Actually , this time I am covering the basics using GNS3 which is a powerful open source network simulator to simulate a simple topology of 2 routers with their basic configuration & commands....
Saturday, 19 February 2011 by Lucky · 0
Friday, 18 February 2011
Hi folks.. I am in a fix nowadays, I m inside a secure network which is protected by squid on port 8080 & blocks all the generic ports by default like ftp one. Since I have created a program which uses ftp (a covert program actually) it wont work on the scenario when you are behind an Intranet protected by squid nat-ted by...
Friday, 18 February 2011 by Lucky · 0
Wednesday, 16 February 2011
6Ever wanted to scan a suspicious looking file using multiple antivirus software ? This happened to me recently, as I stated in my last post that I upgraded my Ubuntu linux to Lucid Lynx and installed Oracle Virtual Box over it. I later installed Windows XP as a virtual operating system and...
Wednesday, 16 February 2011 by Lucky · 0
Tuesday, 15 February 2011
Project64 is a Nintendo 64 emulator which at first seemed to have popped up out of nowhere.Project64 is a Nintendo 64 emulator for the Windows platform that was first released in 2001. It employs a plug-in system to allow other developers to implement their own software.It is a great, free Nintendo...
Tuesday, 15 February 2011 by Lucky · 0
Sunday, 13 February 2011
One of the most popular topics among our readers is installing Windows XP on your new laptop that comes with Windows 7 / vista computer - sometimes for compatibility reasons, but also because a lot of people just don't like 7 very much. The problem that people keep running into left and right is getting...
Sunday, 13 February 2011 by Lucky · 0
It is one of the common mistake that people compare a string with “” or String.Empty in VB.Net or C# to find its empty. Here are few examples.// C# Wrong Waysif ( s == “” )if ( s == string.Empty )if ( s.Equals(”") )if ( s.Equals ( String.Empty)if ( string.Equals(s,”")if ( string.Equals ( s,String.Empty ))So what’s the correct...
by Lucky · 0
Thursday, 3 February 2011
Last time I covered registers in my Reverse Engineering series & I will be continuing with Flags this time.If you are reading this article as a starter / for the first time & have missed the last one, I highly recommend you to read the previous one to get an idea of what is going on....
Thursday, 3 February 2011 by Lucky · 0
Wednesday, 2 February 2011
In an amazing post by Danny Sullivan , which details how Bing watches what people search on Google, copies it & uses the information to improve its own results. Of course Microsoft denies it.. but what was novel was the spy hunt by Google to caught Bing red handed. It all started with “tarosorraphy” ...
Wednesday, 2 February 2011 by Lucky · 0
Subscribe to:
Posts (Atom)