rekenaar

Binrev Financier
  • Content count

    136
  • Joined

  • Last visited

Everything posted by rekenaar

  1. has not set their status

  2. I believe the maximum in Windows XP that you can assign a drive letter to is 26. Minus the ones assigned to local drives, it still should be more than 10.
  3. There are exploits for Cisco routers, but what IOS are they running? You also should make sure you have some kind of terms of engagement. Even if they verbally told you it is OK, they would deny that later without having anything in writing.
  4. The security field is as vast as the IT field is. There are positions such as ID administration, patch management, and firewall monitoring, but that is just the surface. The best recommendation is to find out what you enjoy the most within IT and focus on it while being aware of the other disciplines. A security administrator will have a well-rounded knowledgebase but should also have a specialty such as programming, network, risk management, etc, but also needs to have the ability to communicate with the management. I have seen a lot of people who think they know a lot and have a elitist attitude. While this may gain respect on forums, management will ignore you and your proposals. The more you can get them to side with you based off of the risks of the company, the more successful you will be. Like others have stated, ask around. Practice your social engineering skills and go research what companies want (since you are a student you can pretend it is for a paper for school), but understand security has changed over the years and will continue to do so.
  5. Simply put, if you are infected with malware you will want to reinstall as most will have hooks into the operating system that are nearly impossible to remove or better yet like Vector said go get a Linux distro and install that instead.
  6. Do you have the same ISP provider? If so and depending on the technology used (i.e. Cable modem) you may already be sharing the data pipe coming into the neighborhood or apartment complex where teaming the connections together might not be beneficial. It could be worth the try, but most likely you will not be able to pull the full 20Mbps. Load balancing would work if you are hosting your own servers, but does not work if you are on the client side.
  7. What are the error messages?
  8. The XP SP2 firewall causes issues with NET SEND and you need to make sure the Server service is turned on.
  9. I don't believe the BEFSR41 is supported by the DD-WRT, OpenWRT, or any of the aftermarket firmware projects. That is the advantage of using the WRT54G.
  10. A simple one is the Linksys WRT54G since you can change the firmware to use DD-WRT and improve the functionality.
  11. If you only have the Norton software firewall and not a hardware firewall, then you could be getting some automated script probing you.
  12. I would agree with this. Take the hard drive out of the computer and set it as a slave in another computer. If you let Windows write to the drive, it has the potential to overwrite the data. Personally I like GetDataBack from www.runtime.org and WinHex at www.x-ways.net/winhex. Unfortunately neither of these are free, but GetDataBack allows you to see if you can recover the files prior to purchasing their software and I thought WinHex has a demo version.
  13. A monitor should not use a serial port, but the 15-pin VGA port. I haven't seen one yet that uses the serial. Some higher quality monitors use the RCA Plugs for composite video or the S-Video.
  14. http://torrent.ubuntu.com/releases/gutsy/release/dvd/
  15. I am downloading the DVD version now but since not many are seeding it, it will take a while. I will let you know what I think when I get it installed.
  16. If you are browsing the Internet from either school or work, it could be that the gateway server is overloaded. A hardware upgrade could fix this from happening but most entities don't want to upgrade just so people can play online.
  17. The server service is a single service that Microsoft uses for other computer to connect to the box. You need to make sure this is enabled. You do not need to have the Telnet service enabled on the computer unless you want others to connect to you using port 23. You can still use the telnet command to connect to a remote computer using a port other than 23 (such as 21, 53, 80, etc.)
  18. Service Pack 2 shut down a lot of access to the boxes. You will make sure the firewall is turned off as well as make sure the workstation and server services are enabled.
  19. If you don't mind mapping a drive, use the 'net use' command then access the drive through the mapping. To search for a user within a domain, try the 'net user [username] /domain' command.
  20. My suggestion on this is that you do not get this certification unless you plan to be in desktop support for quite some time. However, a cert is a cert and any certification will help to take your resume to the top of the stack... Once there, it is up to you to get the job based off of your own knowledge. If you want to get into Microsoft server administration, I would recommend going for the MCSA or MCSE, but it depends on your future plans.
  21. The areas of network security/pen testing that the audit would be based on depends on each audit. The rules of engagement dictate what is allowed and what is not. There is not a general rule for this in my experience. If you are looking for a framework on a pen test audit, I would recommend the Penetration Testing Framework at http://www.vulnerabilityassessment.co.uk/P...ion%20Test.html. It covers the high-level points of what to test as well as a final report template, but it is not a substitution for knowing and understanding what you are testing. Hope that helps.
  22. You can. You would need to run Samba if you want the three to talk together. http://en.wikipedia.org/wiki/Samba_(software)
  23. If it is a network you own, then it is your network. If you own the router and the three PCs, it is yours. If you connect your computer to a school network, it is not your network.
  24. You can definitely hack your own network as long as it is truly yours and not your school's or your ISP's network. Most of us have our own test networks just for that reason.
  25. Downloading or installing? If installing, do it on a spare box or a virtual machine. If you mess it up, you can wipe the box clean or delete the virtual drive.