Jump to content

epic

Member
  • Posts

    414
  • Joined

  • Last visited

  • Donations

    0.00 USD 
  • Country

    United States

Everything posted by epic

  1. I suppose your son is connecting to your PC to access the internt? Your PC is setup to be the gateway machine? To enable the connection status of your network adapters go to your network adapters control panel and select a network adapter and go to "properties" and make sure "Display Connection Status at all times" is checked, it may state differently. I assume that you are able to connect to the net fine. Soo, check your network connections and verify that the network card your son's PC is connected to is enabled and has an IP. To do this go to Start -> Run -> type "cmd", now type in "ipconfig /all" and a list of address' will come up. (Type these without the quotes) again decipher your connections. Or since you may be in the Network connections control panel you can select your network card and in the bottom left portion of the screen it will give the status and address when a particular network adapter is selected. If you both have valid IP's. Now since you stated you ran the ICW several times I would suggest deleting everything from within network connections and start out fresh on both machines, also delete your network adapters from within "Device Manager" afterwards reboot your machine. If that does not work let us know.
  2. Log there connection attempts and attain info on the subnet. Contact the owner of that particular subnet and let them know what is going on. I would not suggest contacting them unless you have an abundent amount of logs on this connection attempt. *STATIC-IP*:135, you can assume it is a business account, unless this person is smart and using it as a mask. *DHCP-IP*:135, just as long as you have the port address listed and IP's, ISP's can look up logs of users whom had a specified IP assigned to them at a given time frame. All this info on the IP and company is easily obtained in the ARIN DB. If these attacks happen frequently at the same time and same amount of times I would consider it would be some sort of worm on the net. If attacks seem to be random it's some pathetic kid playing on the net and can get into trouble. Both cases you can get there services suspended, if they are infected with a virus or worm that is infecting the net in some way the ISP reserves every right to suspend there services until appropriate measures are taken. But if some hyjinked kid is playing with port scanners or attempting to connect to an unauthorized remote machine repeatedly, they can get there services suspended and much worse.
  3. What other devices are you running in your home or near? 1. Portable phones (NOT cell phones) at what signal level (Mhz). 2. Satellite 3. Telephone poles 4. Electrical boxes 5. Water / Iron (like bashrat stated) 6. Coax oulets
  4. Hmm, I think I already made one comment in here, but since it's still in the air. Both of these applications are exceptional tools, however one of them is specifically designed to work with Windows. IE & OE, I say express because Outlook relies upon OE contacts to function, are the best tools to use "If you set POLICIES CORRECTLY!" The downside of these two, IE/Outlook, is that your policies need to be changed on a daily basis (in corporate life). It just sooo happens that Microsoft products are inundated with people who want to exploit there software, interim disabling innocent individuals. Microsoft tends to wait on distributing patches, explicitly for the General Public, but a list of well supported companies recieve updates constantly. At this present moment Microsoft has to adhere to distributing beta patches, to the US government, postmortem. Expect patches to be delayed. Firefox / TB, you can not set policies under windows, but can make restrictions and lock down the application since the source code is widely available to the public. Both firefox / thunderbird are very light, fast, reliable and easy to use for the beginning PC user. However, the Mozilla community is not as burdened with exploiters trying to access source, source is available to EVERYONE. If a bug or exploit is discovered it is promptly resolved (depending on the scale). Patches are distributed when released.
  5. Hmm, maybe they caught on to what you were doing and changed there password.
  6. Yes, with Administrative rights. Your better off creating a new group with less control over the system.
  7. Add these lines respectively. [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters] "AutoShareServer"=dword:00000000 "AutoShareWks"=dword:00000000 or just delete your drive share under compmgmt.msc if you do not want to disable your default admin shares.
  8. You'd be better off using a parallel port for that, unless you feel like setting up a microcontroller to receive the serial data and translate it to a digital on/off for a light. <{POST_SNAPBACK}> Sure, if you have a free EPP. I do not remember PC's coming with more then one. Moslty used for 'Printing'. RS232 is most uncommonly used and converting to UART is simple, also making your own controller to accomplish this is trivial. But if you rather forfeit your EPP for this go ahead.
  9. hmm, this is kinda old, but I assume you have this resolved?
  10. ISDN still works the same as it has back in the day. But if your looking for an CPE, KAndle pointed you in the right direction. Cisco products are the most trusting equipment available, not to mention the A+ support if something breaks
  11. You could script a plugin to use your serial port and attach it to a red strobe on top of your monitor.
  12. Highly recommended. Another would be O&O DiskRecovery. Both are worth the $$$
  13. epic

    Xplode

    Wish it was that easy... like I noted before I read the EULA and waited 5min.
  14. epic

    Xplode

    Wish I can say I am able to test XPlode, but for some odd reason I am unable to pass the EULA. (I even read the EULA, and waited 5min ) Scrolled to the bottom to activate? Exit is activated here and closed out. :/ Continue 'should' be activated (unless I missed something, obvious) cursor is placed above, yet the submit button is still inactive.
  15. That is where most of us started To start, since you have no home network is to download VMware. Install another copy of an OS; either linux or Windows and you have your own home network
  16. Use your friend "Search!" also boot logos can not exceed 640x480x16
  17. Hah! I have Itanium 2 in my samsung
  18. most secure and trusting p2p is physically borrowing from your friends. Thats 'True' networking
  19. XP has the same feature. Scan disk on the fly.
  20. If you have not attempted this do so. I would also create another profile just to verify. If, by chance, everything works fine create a new profile and migrate your settings from your old profile to the new.
  21. http://img.photobucket.com/albums/v284/epi...ny/087d067f.jpg
  22. What system resources... A 'REAL' router will do the job (i.e. Cisco). Linksys, netgear all those retail products are a scam's. AND yes you can get a corporate usable router for the same price as a retail product! Cisco2500 series can be purchased USED for <$200 USD. Only thing is you will need to learn how to configure it OR if your real techy.. you can setup a nix box My specs for a nix box: 133mhz proc 64mb ram 2gb hard disk drive Cisco 2600 series, bunch of $$$ pulled from the wallet but does more for the job
×
×
  • Create New...