Jump to content

amdphr3@kXP

Member
  • Posts

    395
  • Joined

  • Last visited

  • Donations

    0.00 USD 
  • Country

    Australia

Everything posted by amdphr3@kXP

  1. umm it is possible but it will require cracking the password, pm me and ill giv u some info
  2. Hi, I wish to incorporate the song i am currently playing in winamp into my sig, how do I do this?
  3. welcome to MSFN, hope u enjoy ur stay!
  4. Mudvayne's vid for world so cold is pretty cool, I liked that
  5. my server got ddosed, its very slow at the moment so it probably wont load it all the time till the firewall clears all the packets
  6. You are a little off. This setting is only an alternate setting. If it is unable to use the primary Windows XP will attempt to use these alternate settings. This does not in any way allow you to set multiple IPs on one NIC. Umm i dont think that is true, I am doing my cert 4 in network management, as I said, I built a win2k server at tafe, which was on a different IP range and subnet range to the rest of the tafe network, so I assigned a secondary IP address to the one nic that was in the pc so it could communicate with the tafe network and the proxy, and I was able to get net access working using this configuration...and also see shares and stuff on the tafe network as well as the network we were building...
  7. U can have 2 ips on different subnet masks, I set up an ftp at tafe with 2 ips with different subnets, so it would connect to the lan we were building, and the other ip so it would be able to access the proxy, however if u are wishing to share a net connection on the lan, you will need to have some kind of routing. You can set up win2k server or win2k3 server to do routing for you, but it will slow down the performance of the server as it has to perform additional tasks. This is the way to go if u cant afford a router and are not that concerned with performance, however there are more advantages with purchasing a router
  8. well heres my new sig, like it?
  9. Securing your Windows NT, 2000 pro/server, XP home/pro, 2003 server based system Written By: linuxphr3@k Today, on the internet, the increased uses for the net have also increased the ability for a hacker or script kiddie to exploit a system. Mostly, they just do it for fun to see what they can get into, but others hack users with servers/regular pc's with broadband connections to use as a dump for warez networks on IRC. This is a concern, because if your system is comprimised by a warez operator, and they upload copyrighted material to your pc, you immediately become liable legally for the material that is made public for free download. Many people may not realise this, and believe me, it is a real threat, and as a normal pc user, they may not know how to secure their systems. This is the main reason why I have created this guide, to educate people on how to secure their pc's. Ok lets get started on securing your pc... Step one: Installing microsoft hotfixes If you have already done this via windows update, skip this step and go to step 2. If you have not, or do not know if you have them installed, continue with this step. Since new holes in microsoft operating systems (mainly NT kernel based Operating systems) are discovered almost weekly, it is necessary to check windows update for the latest hotfixes and install them on your pc. To do this, do the following: If you have not already connected to the internet, do so now... 1. Click Start, and click Windows update. A new browser window will launch and connect you to windows update. 2. The microsoft windows update page will now load 3. Click the scan for update link. Windows update will now scan your pc to see what updates are installed. 4. Once this has completed, you will now see a link that says review and install updates. Click this link. 5. You will now be presented with a list of packages to install. By default, all the packages that need to be installed will be selected. Since we need to install all the latest hotfixes, click the install now button. 6. If you get a message saying that Internet Explorer 6 SP1 will be installed, Click OK. Windows update will now install the latest hotfixes. See, that wasn't so hard, you have now patched any holes in your operating system. Now we have to secure you against viruses and trojans. This is explained in step 2 Step two: Virus/worm/Trojan protection It is very important to protect your pc against malicious programs, such as worms, viruses and Trojans. These destructive programs are often used as a means to exploit holes in OS security, such as the MS-Blast worm. Without a virus scanner installed, it is impossible to prevent infection from viruses and Trojans, and it’s almost as impossible to remove them without this as well. I would recommend installing a virus scanner such as Norton Antivirus, as this virus protection app will scan your system in real time for virus activity, and actively scans open emails. However, a virus scanner is only as good as the virus definitions that are installed with it. New viruses, worms and Trojans are discovered daily, and new virus definitions are usually made available weekly. This is why it is important to update your virus scanner weekly to upgrade your virus scanner’s ability to detect new viruses, and stop them before they infect your system. 1. Install virus scanning software, I recommend Norton Antivirus 2. Download latest virus definitions Step Three: Installing and configuring a firewall Installation and configuration procedures for firewalls will vary between the different software that firewall developers offer, so it is not possible to tell you how to configure your firewall, however the ports that you need to block to stop hackers remain the same. The common choice of exploits for hackers are usually NETBIOS, Remote procedure call (RPC – this vulnerability was exploited by the MS-Blast worm) and Internet Information Services (IIS). A good firewall program will actually “stealth” all ports, disallowing an attacker access to use exploits on any port, but will still let you use programs such as IRC and MSN messenger. A well secured system will only have the ports open that are necessary, such as port 80 for web browsing, port 1080 for MSN messenger, and port 6667 for IRC. For the firewall, I would recommend Kerio Winroute, or Kerio Personal Firewall. I use Kerio Winroute, and had my mate test it with all the exploits he had, none of them were able to gain access to my pc. To determine which ports are open to attack, I would recommend a network vulnerability scanner, such as GFI LanGuard, available from www.gfi.com, or X-Scan, available from www.xfocus.org. Both of these programs will scan your system for security holes, and provide you with advice on how to secure them. While both kerio products will stealth all ports, some will not. See the table below for a list of tcp/udp, and what protocol/application uses these ports. A port number with a blank space next to them identifies a port that has not had an application or protocol allocated to them. 0 1 tcpmux 3 4 5 rje 7 echo 9 discard 11 systat 13 daytime 15 netstat 17 qotd 18 send/rwp 19 chargen 20 ftp-data 21 ftp 22 ssh, pcAnywhere 23 Telnet 25 SMTP 27 ETRN 29 msg-icp 31 msg-auth 33 dsp 37 time 38 RAP 39 rlp 40 41 42 nameserv, WINS 43 whois, nickname 49 TACACS, Login Host Protocol 50 RMCP, re-mail-ck 53 DNS 57 MTP 59 NFILE 63 whois++ 66 sql*net 67 bootps 68 bootpd/dhcp 69 Trivial File Transfer Protocol (tftp) 70 Gopher 79 finger 80 www-http 87 88 Kerberos, WWW 95 supdup 96 DIXIE 98 linuxconf 101 HOSTNAME 102 ISO, X.400, ITOT 105 cso 106 poppassd 109 POP2 110 POP3 111 Sun RPC Portmapper 113 identd/auth 115 sftp 116 117 uucp 118 119 NNTP 120 CFDP 123 NTP 124 SecureID 129 PWDGEN 133 statsrv 135 loc-srv/epmap 137 netbios-ns 138 netbios-dgm (UDP) 139 NetBIOS 143 IMAP 144 NewS 150 152 BFTP 153 SGMP 156 161 SNMP 175 vmnet 177 XDMCP 178 NextStep Window Server 179 BGP 180 SLmail admin 199 smux 210 Z39.50 213 218 MPP 220 IMAP3 256 257 258 259 ESRO 264 FW1_topo 311 Apple WebAdmin 350 MATIP type A 351 MATIP type B 360 363 RSVP tunnel 366 ODMR (On-Demand Mail Relay) 371 387 AURP (AppleTalk Update-Based Routing Protocol) 389 LDAP 407 Timbuktu 427 434 Mobile IP 443 ssl 444 snpp, Simple Network Paging Protocol 445 SMB 458 QuickTime TV/Conferencing 468 Photuris 475 500 ISAKMP, pluto 511 512 biff, rexec 513 who, rlogin 514 syslog, rsh 515 lp, lpr, line printer 517 talk 520 RIP (Routing Information Protocol) 521 RIPng 522 ULS 531 IRC 543 KLogin, AppleShare over IP 545 QuickTime 548 AFP 554 Real Time Streaming Protocol 555 phAse Zero 563 NNTP over SSL 575 VEMMI 581 Bundle Discovery Protocol 593 MS-RPC 608 SIFT/UFT 626 Apple ASIA 631 IPP (Internet Printing Protocol) 635 mountd 636 sldap 642 EMSD 648 RRP (NSI Registry Registrar Protocol) 655 tinc 660 Apple MacOS Server Admin 666 Doom 674 ACAP 687 AppleShare IP Registry 700 buddyphone 705 AgentX for SNMP 901 swat, realsecure 993 s-imap 995 s-pop 999 1024 1025 1050 1062 Veracity 1080 SOCKS 1085 WebObjects 1100 1105 1114 1227 DNS2Go 1234 1243 SubSeven 1338 Millennium Worm 1352 Lotus Notes 1381 Apple Network License Manager 1417 Timbuktu 1418 Timbuktu 1419 Timbuktu 1420 1433 Microsoft SQL Server 1434 Microsoft SQL Monitor 1477 1478 1490 1494 Citrix ICA Protocol 1498 1500 1503 T.120 1521 Oracle SQL 1522 1524 1525 prospero 1526 prospero 1527 tlisrv 1529 1547 1604 Citrix ICA, MS Terminal Server 1645 RADIUS Authentication 1646 RADIUS Accounting 1680 Carbon Copy 1701 L2TP/LSF 1717 Convoy 1720 H.323/Q.931 1723 PPTP control port 1731 1755 Windows Media .asf 1758 TFTP multicast 1761 1762 1808 1812 RADIUS server 1813 RADIUS accounting 1818 ETFTP 1968 1973 DLSw DCAP/DRAP 1975 1978 1979 1985 HSRP 1999 Cisco AUTH 2000 2001 glimpse 2005 2010 2023 2048 2049 NFS 2064 distributed.net 2065 DLSw 2066 DLSw 2080 2106 MZAP 2140 DeepThroat 2301 Compaq Insight Management Web Agents 2327 Netscape Conference 2336 Apple UG Control 2345 2427 MGCP gateway 2504 WLBS 2535 MADCAP 2543 sip 2565 2592 netrek 2727 MGCP call agent 2766 2628 DICT 2998 ISS Real Secure Console Service Port 3000 Firstclass 3001 3031 Apple AgentVU 3052 3128 squid 3130 ICP 3150 DeepThroat 3264 ccmail 3283 Apple NetAssitant 3288 COPS 3305 ODETTE 3306 mySQL 3352 3389 RDP Protocol (Terminal Server) 3520 3521 netrek 3879 4000 icq, command-n-conquer 4045 4144 4242 4321 rwhois 4333 mSQL 4444 47017 4827 HTCP 5000 5001 5002 5004 RTP 5005 RTP 5010 Yahoo! Messenger 5050 5060 SIP 5135 5150 5190 AIM 5222 5353 5400 5500 securid 5501 securidprop 5300 5423 Apple VirtualUser 5555 5556 5631 PCAnywhere data 5632 PCAnywhere 5678 5800 VNC 5801 VNC 5900 VNC 5901 VNC 5843 6000 X Windows 6112 BattleNet 6050 6499 6500 6502 Netscape Conference 6547 6548 6549 6666 6667 IRC 6670 VocalTec Internet Phone, DeepThroat 6699 napster 6776 Sub7 6968 6969 6970 RTP 6971 7000 7007 MSBD, Windows Media encoder 7070 RealServer/QuickTime 7161 7323 7777 7778 Unreal 7640 7648 CU-SeeMe 7649 CU-SeeMe 7654 8000 8002 8010 WinGate 2.1 8080 HTTP 8100 8181 HTTP 8383 IMail WWW 8765 8875 napster 8888 napster 8890 9000 9090 9200 9704 9669 9876 9989 10008 cheese worm 10752 12345 11371 PGP 5 Keyserver 12346 13000 13223 PowWow 13224 PowWow 14000 14237 Palm 14238 Palm 14690 16969 18888 LiquidAudio 21157 Activision 22555 22703 22793 23213 PowWow 23214 PowWow 23456 EvilFTP 26000 Quake 27000 27001 QuakeWorld 27010 Half-Life 27015 Half-Life 27374 27444 27665 27910 27960 QuakeIII 28000 28001 28002 28003 28004 28005 28006 28007 28008 30029 AOL Admin 30100 30101 30102 30103 30303 30464 31335 31337 Back Orifice 32000 32771 32777 rpc.walld 34555 40193 Novell 41524 arcserve discovery 45000 Cisco NetRanger postofficed 50505 52901 54321 61000 65301 Multicast hidden ICMP Type hidden 9998 32773 rpc.ttdbserverd 32776 rpc.spray 32779 rpc.cmsd 38036 timestep Well that’s it, it wasn’t that hard, was it? You have basically secured your pc against an attack, and also protected your pc against viruses. If you have any questions, post your question in the networks forum on Nextl3vel.net, or email me at: admin@techportal.lfhost.com
  10. This is not a warez site! Links/Requests to warez and/or illegal material (porn, cracks, serials, etc..) will not be tolerated. Discussion of circumventing activation/timebombs will also not be tolerated. If you ignore any of the aforementioned you will receive a final warning. If you choose to continue, you will be banned without notice. At this link activation was call a bug. Activation is not a bug. Information was given on how to over come the activation bug. See the red text...... The activation itself is not a bug, but there were bugs in the activation system that would not allow it to be activated...and also, it requires activation on first boot, as if activation was meant to be required on first boot?!?! So wouldnt you think, that if this was the case, wouldn't this issue be classed as a bug? This was merely a fix for the bug...and should i add that "TweakNT" was used to fix the bug...i think theres a bit of a contradiction here...oh well never mind
  11. tinker, this is the download link from MSFN... http://www.MSFN.org/modules.php?modid=2&ac...tion=show&id=76 Click the download here link to get tweakNT for the purposes u stated
  12. My appologies, I see why you said that now, In future i will look more carefully at things like that, I didnt actually notice the part you are referring to...but i do have some questions, being an alpha, that wouldn't be classed as any breech of laws or classed as "Warez" as such would it? And also, I notice that MSFN has tweakNT available here to download as well, wouldn't that be providing a means to circumvent timebombs/activation, cuz thats one of the features of that tool...
  13. It certainly is not fake, follow the link in my topic, longhorn superguide and see for yourself
  14. Thanks to removed and their staff/members for making this available Removed has made a superguide to longhorn build 4029 with tips on optimising it and fixing bugs that exist in it. Link removed by Tinker Longhorn Forum Rules This is not a warez site! Links/Requests to warez and/or illegal material (porn, cracks, serials, etc..) will not be tolerated. Discussion of circumventing activation/timebombs will also not be tolerated. If you ignore any of the aforementioned you will receive a final warning. If you choose to continue, you will be banned without notice.
  15. Welcome to MSFN, enjoy your stay!!
  16. With high quality hardware and proper air cooling I have seen people OC the p4 3.0 to 3.8. But thats the highest on air I have seen. Watercooling (which is the next item on my list within a 2 week period) I have seen 4.5 THG o/clocked a 3.06Ghz processor to 5Ghz by running a refrigeration unit on it, I think they tried going higher but eventually ended up frying it
×
×
  • Create New...