Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
U

User 10929916

@User 10929916
About
Posts
15
Topics
13
Shares
0
Groups
0
Followers
0
Following
0

Posts

Recent Best Controversial

  • nslookup fails on windows 7
    U User 10929916

    well the DNS server address default is my routers address I changed it to my ISP's DNS server's address and everything works well any idea why this happened only on nslookup while the rest of DNS worked fine ? also : it happened only on one router I moved to another house and it is working with any setting

    System Admin csharp database com help question

  • nslookup fails on windows 7
    U User 10929916

    I tried switching off IPV6 but it didnt work it shows "DNS request timed out timeout was 2 seconds" almost every time these is the DNS communication as captured by wireshark when I type 'nslookup' and open the program

    5 4.080346 192.168.1.6 192.168.1.1 DNS 84 Standard query 0x0001 PTR 1.1.168.192.in-addr.arpa
    6 4.336621 192.168.1.1 192.168.1.6 DNS 113 Standard query response 0x0001 PTR 1.1.168.192.in-addr.arpa PTR D-Link.DSL2740B

    and when I type 'facebook.com'

    21 12.931466 192.168.1.6 192.168.1.1 DNS 81 Standard query 0x0002 A facebook.com.DSL2740B
    22 12.965884 192.168.1.1 192.168.1.6 DNS 156 Standard query response 0x0002 No such name A facebook.com.DSL2740B SOA a.root-servers.net
    23 12.966017 192.168.1.6 192.168.1.1 DNS 81 Standard query 0x0003 AAAA facebook.com.DSL2740B
    29 14.976087 192.168.1.6 192.168.1.1 DNS 72 Standard query 0x0004 A facebook.com
    30 14.980174 192.168.1.1 192.168.1.6 DNS 88 Standard query response 0x0004 A facebook.com A 173.252.89.132

    (first field is the packet number,second:time,third:source IP fourth:dest IP fifth:protocol sixth:length seventh:description) why is my gateway's name appended on facebook.com (facebook.com.DSL2740B) when I type set type=mx or set type=all the MX and ANY queries are sent and there is no reply any help ??

    System Admin csharp database com help question

  • C string operations
    U User 10929916

    if I have this code : char * s =(char*)malloc(10); and then I write 's="test"' then s will have a different address right ? why is this happening ?

    C / C++ / MFC question

  • C execl is this a bug ?
    U User 10929916

    inside a C function I have this code

    printf("%s",final);
    //execl(final,final,NULL);

    I do a fork and this is part of the childs code the final string is not printed when the execl line is not commented out,nor are any printf calls before it why is this happening ?

    C / C++ / MFC help question

  • how do websites know my IP?(not a totally noob question)
    U User 10929916

    each side can see the other side's IP in the packet header but if we run for example tracert codeproject.com we see that a packet goes through a number of gateways between the client and the server .Isn't it supossed that each gateway changes the last gateway's IP address with its own so it can get the packet back ? if it is so then how codeproject see my IP and not the IP of the last place the packet went through ? thanks

    The Lounge question com sysadmin tutorial

  • what does WPA/WPA2 really encrypt ??
    U User 10929916

    I have WPA2-personal on my laptop and Im connected wirelessly to my home AP.the traffic I capture from wireshark is all unencrypted some days ago I had my router on WPA-personal and did a MITM attack on my smartphone and the traffic was unencrypted too. Isn't WPA supposed to encrypt the traffic and not just ask a password to enter the network ?

    The Lounge mobile sysadmin question

  • using MITM and packet editing to defeat SSL/TLS : is this a valid method ?
    U User 10929916

    I'm studying security -on my own- and need to clear out a few things ! If I've learned this correctly HTTPS connections do these things: 1)public key from server to client 2)client encrypts a key he generates using public key 3) sends encrypted key to server 4) server decrypts the message with his private key 5) voilà! the two sides are ready to exchange information using symetric ciphers so asymmetric encryptiong is only used for sending a symmetric key over the network suppose I have a certificate and I can decrypt messages encrypted with its public key I perform a MITM attack (say ARP spoof),intercept and change the certificate the server sends with the one I know its private key. browsers pops a little warning most users ignore ("WTF is a trusted certificate anyway ??") most of the times user proceeds the key is encrypted using my public key and sent to the server I intercept the key,decrypt it,and encrypt it again with the public key the server sent then let it go to the server. server decrypts the key and I can see every info the two sides exchange. well...is it that simple ? I don't have time to test it these days so Im asking you I believe/hope I am mistaken and a "do you want to proceed" message is not the only guard

    The Lounge security sysadmin cryptography question

  • using MITM and packet editing to defeat SSL/TLS : is this a valid method ?
    U User 10929916

    I'm studying security -on my own- and need to clear out a few things ! If I've learned this correctly HTTPS connections do these things: 1)public key from server to client 2)client encrypts a key he generates using public key 3) sends encrypted key to server 4) server decrypts the message with his private key 5) voilà! the two sides are ready to exchange information using symetric ciphers so asymmetric encryptiong is only used for sending a symmetric key over the network suppose I have a certificate and I can decrypt messages encrypted with its public key I perform a MITM attack (say ARP spoof),intercept and change the certificate the server sends with the one I know its private key. browsers pops a little warning most users ignore ("WTF is a trusted certificate anyway ??") most of the times user proceeds the key is encrypted using my public key and sent to the server I intercept the key,decrypt it,and encrypt it again with the public key the server sent then let it go to the server. server decrypts the key and I can see every info the two sides exchange. well...is it that simple ? I don't have time to test it these days so Im asking you I believe/hope I am mistaken and a "do you want to proceed" message is not the only guard

    Hardware & Devices security sysadmin cryptography question

  • do routers contain switches ?
    U User 10929916

    no I'm not talking about lan communication suppose you send a packet to codeproject from your pc. its trip will be (with all address change of course) 192.168.1.4->192.168.1.1(def.gate.)->10 more machines->codeproject say your external ip is 100.100.100.100 when its reply gets at 100.100.100.100 your router is in charge of sending it to x.x.x.4...I'm talking about this bit

    Hardware & Devices question tutorial

  • do routers contain switches ?
    U User 10929916

    it's probably a stupid question but when packets are sent to a router that is for example at 192.168.1.1 on the LAN with a destination 192.168.1.4 the router searches a lookup table for the MAC associated with 192.168.1.4 and sends the frame just there and doesnt forward it to all connected devices so does that count as a switch ?

    Hardware & Devices question tutorial

  • machine code : disabling interupts ?
    U User 10929916

    Ok so I've read that there are some instructions that do things that enable/disable interupts,etc are these the so-called priviledged instructions ?? do you know if there is a list with all those "strange" instructions ?

    System Admin question

  • Is 11110000 processed faster than 10101010?
    U User 10929916

    somewhere on the Internet I read that the high-low voltage change is not immediate but happens slowly instead. for example a voltage graph of 010 would be: ___________ / \ / \ _______/ \_________ and not ____________ __________ ___________ I've also read that the "/" and "\" parts are a factor that slows processors' speed why does this happen,( can you recomend me a book or something to understand this better ? ) and does it mean that 11110000 is processed faster than 10101010 for example ? thanks a lot !! edit: I tried putting my pretty 'graph' on inside 'code' so it would look ok... it didn't work :(

    The Lounge question data-structures performance tutorial learning

  • I think I got a virus on my galaxy S3...but I suck at analysing APKs and mobile phone security generally...
    U User 10929916

    So I was browsing a page and something seemed to go wrong ! after some time I saw there were two APKs files downloaded -from that page-. their names are Xzone-1409140423366-.apk and Xzone-1409227281662-.apk whether or not they are malicious is obvious :if they weren't why were they downloaded 'secretly'. I found a report here[^] and it says something about key logging.well that's scary...and there are not keyscramblers available for android ! after opening the APK with winrar I found -except of the bunch of HTMLs and a few XMLs- some pictures like playbuttons etc- that were not noticed by me while using the phone. no other strange activity was noticed either ! so in my view the file was not 'executed'. but I wan't to know for sure ! Is it possible for someone to run an APK file ,bypassing the phone's security measures ? also,if this thing enabled a stealth program how can I find it ? (I mean something hidden from taskmanager etc ) any advanced tips ? oh...I scanned the phone with AVG free and it found no threat ! thanks a lot !!!

    Hardware & Devices android question security

  • Think I got a virus...but I suck at analysing APKs -don't know anything about mobiles in general-
    U User 10929916

    So I was browsing a page and something seemed to go wrong ! after some time I saw there were two APKs files downloaded -from that page-. their names are Xzone-1409140423366-.apk and Xzone-1409227281662-.apk whether or not they are malicious is obvious :if they weren't why were they downloaded 'secretly'. I found a report here[^] and it says something about key logging.well that's scary...and there are not keyscramblers available for android ! after opening the APK with winrar I found -except of the bunch of HTMLs and a few XMLs- some pictures like playbuttons etc- that were not noticed by me while using the phone. no other strange activity was noticed either ! so in my view the file was not 'executed'. but I wan't to know for sure ! Is it possible for someone to run an APK file ,bypassing the phone's security measures ? also,if this thing enabled a stealth program how can I find it ? (I mean something hidden from taskmanager etc ) any advanced tips ? oh...I scanned the phone with AVG free and it found no threat ! thanks a lot !!!

    Android android question com security lounge

  • Computer Architecture : is 0 really 0 ?
    U User 10929916

    in computers' circuits is the bit 0 really represented by no currency or it is a small signal that the computer is made to treat as 0 ? thank a lot !

    The Lounge architecture question
  • Login

  • Don't have an account? Register

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups