Monday, April 21st, 2008
If you are having problems getting certain updates installed on Vista, there are two places you can look to troubleshoot:
%windir%\windowsupdate.log, a log file for Windows Update events
%windir%\Logs\CBS\CBS.log, a log file that tracks events to the servicing stack
These log files include the following fields: Time/Date Stamp, Message Severity, Message Source, Operation ...
Posted in Internet, Security, Windows | No Comments
Monday, April 21st, 2008
You can use the EFSINFO tool to find all encrypted files on a volume. This tool is found in the Windows Server 2003 Support Tools on your product CD. To use this tool to find encrypted files, run the following from a command prompt:
efsinfo /s:c: | find ": Encrypted"
Why would ...
Posted in Privacy, Security, Windows | No Comments
Monday, April 21st, 2008
You can disable the—sometimes annoying—User Account Control (UAC) prompts for members of the Administrators group, while leaving them active for limited user accounts. This is great if you don’t want others accessing or changing system settings. Disabling the alerts, however, requires editing the Windows Registry:
Hive: HKEY_LOCAL_MACHINE
Key: SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Name: ConsentPromptBehaviorAdmin
Type: REG_DWORD
Value: 0 ...
Posted in Security, Windows | No Comments
Monday, April 21st, 2008
The Captcha used in the current version 8.1 of PHP Nuke can be deciphered with 100% accuracy. more information can be found here:
http://www.rooksecurity.com/blog/?p=6
Exploit Code: http://www.rooksecurity.com/exploits/php_nuke_captcha.zip
What is so interesting about this captcha is that it is incredibly wide spread. Variants of this captcha are being used by big names like Paypal. ...
Posted in Coding, Internet, Security, Software | No Comments
Monday, April 21st, 2008
Almost everyone knows what CSRF or better unauthorized requests are. I never really embraced CSRF as the correct term for unauthorized request issues, because the term is outdated and inadequate to contemporary hacking. For me, an unauthorized request is the layer or automation of a hacking procedure without direct interference ...
Posted in Internet, Privacy, Security | No Comments