Ahh, the joy of having standards
-
Seen the latest RFC? Finaly an approach that will bring hackers, crackers and admins on the same side of the table :) ftp://ftp.rfc-editor.org/in-notes/rfc3514.txt[^]
Off to in ~70 days
-
Seen the latest RFC? Finaly an approach that will bring hackers, crackers and admins on the same side of the table :) ftp://ftp.rfc-editor.org/in-notes/rfc3514.txt[^]
Off to in ~70 days
Finally! It's such a relief to know that the standards community is addressing this issue. Who would have imagined, though, that the solution would be so straightforward and simple to implement? "Please don't put cigarette butts in the urinal. It makes them soggy and hard to light" - Sign in a Bullhead City, AZ Restroom
-
Seen the latest RFC? Finaly an approach that will bring hackers, crackers and admins on the same side of the table :) ftp://ftp.rfc-editor.org/in-notes/rfc3514.txt[^]
Off to in ~70 days
Doh... Got me :( :D :D :D Philip Patrick Web-site: www.stpworks.com "Two beer or not two beer?" Shakesbeer
-
Seen the latest RFC? Finaly an approach that will bring hackers, crackers and admins on the same side of the table :) ftp://ftp.rfc-editor.org/in-notes/rfc3514.txt[^]
Off to in ~70 days
-
Its a RFC, it has to be real. No? But maybe this helps to decide: ftp://ftp.rfc-editor.org/in-notes/rfc2100.txt[^] ftp://ftp.rfc-editor.org/in-notes/rfc2321.txt[^] ftp://ftp.rfc-editor.org/in-notes/rfc2322.txt[^] ftp://ftp.rfc-editor.org/in-notes/rfc2323.txt[^] ftp://ftp.rfc-editor.org/in-notes/rfc2324.txt[^] ftp://ftp.rfc-editor.org/in-notes/rfc2325.txt[^] ftp://ftp.rfc-editor.org/in-notes/rfc3251.txt[^] ftp://ftp.rfc-editor.org/in-notes/rfc3252.txt[^] ftp://ftp.rfc-editor.org/in-notes/rfc2795.txt[^] ftp://ftp.rfc-editor.org/in-notes/rfc2549.txt[^] ftp://ftp.rfc-editor.org/in-notes/rfc3091.txt[^] ftp://ftp.rfc-editor.org/in-notes/rfc2551.txt[^] and a bunch of others.
Off to
-
Seen the latest RFC? Finaly an approach that will bring hackers, crackers and admins on the same side of the table :) ftp://ftp.rfc-editor.org/in-notes/rfc3514.txt[^]
Off to in ~70 days
Quote from the RFC: There are a number of ways in which the evil bit may be set. Attack applications may use a suitable API to request that it be set. Systems that do not have other mechanisms MUST provide such an API; attack programs MUST use it. if the systems are not supposed to defend themselves from packets with the evil bit set, then wouldnt a cunning cracker just not set the evil bit in thier attacking applications? I have not read the whole thing so i could be way off on this one.
| Website: http://www.onyeyiri.co.uk | Sonork: 100.21142 : TheEclypse | "If a dolar was a chicken would the chicken be evil?"
-
Quote from the RFC: There are a number of ways in which the evil bit may be set. Attack applications may use a suitable API to request that it be set. Systems that do not have other mechanisms MUST provide such an API; attack programs MUST use it. if the systems are not supposed to defend themselves from packets with the evil bit set, then wouldnt a cunning cracker just not set the evil bit in thier attacking applications? I have not read the whole thing so i could be way off on this one.
| Website: http://www.onyeyiri.co.uk | Sonork: 100.21142 : TheEclypse | "If a dolar was a chicken would the chicken be evil?"
:confused: May I refer to more information? http://www.codeproject.com/lounge.php?select=462240&df=100&forumid=1159#xx462240xx[^]
Off to in ~70 days