Search results

  1. S

    Vista has speech recognition hole

    ya...heard of it a little back.. It seems microsoft is running out of terror...hole..flaws...
  2. S

    Packet generators

    I want a packet generator to generate TCP, UDP, ICMP etc. packets, so is there any automated tool for it or some sort of programming package like Jiffer and JPcap in JAVA. I had used them but they can monitor , but cannot send. I want to generate network traffic for which I need generator
  3. S

    Assistance for IDS

    GFI's products are exploit combating tools and not genarating tools which I want.Specifically SSPing, smurf, winnuke, jolt2 etc.
  4. S

    Assistance for IDS

    Metasploit engine requires some programming on its framework. It also does not includes network exploits such as DDos attacks , but application based signature vulnerabilities which I am not targeting in building my system. Actually I had derived a baseline from Newriders network intrusion...
  5. S

    Help: Can NTFS & Fat32 Co-exist ?

    You can Convert a fat32 partition to NTFS using convert command without formating, and definitely NTFS and FAT partitions coexists.But be sure to convert because its irreversible , converting ntfs to fat will require formatting.Also MS-DOS cannot read NTFS drives , so it will be better to keep...
  6. S

    Assistance for IDS

    I had derived some algorithms for combating some DoS attacks such as SYN flooding, smurf etc. attacks as part of my IDS.What I want is to test them.Can anyone suggest me the tools or exploit packages by which I can test my implementation? Moreover my focus is on detecting Anomalies in...
  7. S

    Need assistance for IDS

    I am buiding an IDS system and I want your feedbacks related to the exploits and vulnerabilities encountered on Windows platform. If anyone can provide me with some database of exploits and information updating my existing blueprint of my project it will be a great help to me. I had posted...
  8. S

    Text to Speech

    Can we make text to speech utility using JAVA API's and third party packages? If yes can anyone give me the references to the sources where I can find the required material and the idea of implementing it. If no, than in which language it is possible to make?
  9. S

    Packet sniffer in C

    I am trying to implement Packet sniffer in C language, can anyone provide me some references to the sources which can aid me in implementing it. Implementation is on Windows platform, so which libraries and what sort of programming is needed as a prerequisite for it?
  10. S

    Want to publish Paper

    Can anyone suggest me the names of the sites on which I can submit papers related to security and I.T.? Does Techenclave has this facility?
  11. S

    Monitor interception

    Is there any way to intercept the output given to the monitor so that I can redirect it to other recepting device? Actually I am trying to make remote accessing software using a covert channel ,so that user on the computer which is being accessed remotely will not notice any activity on his...
  12. S

    NAT addressing query

    I am using internet from my college which has a private IP address provided by the ISP of the range starting from 10.0.0.0 with a subnet mask of 255.0.0.0. When I open the website DNS Stuff: DNS tools, DNS hosting tests, WHOIS, traceroute, ping, and other network and domain name tools. it shows...
  13. S

    Paper publishing

    Can anyone suggest me the names of the sites on which I can submit papers related to security and I.T.? Does Techenclave has this facility?
  14. S

    Remote Access Systems Covertly

    Yes I am talking about Windows xp specifically in which there are terminal services enabled
  15. S

    Remote Access Systems Covertly

    I had made a "Desktop monitoring and Remote acess" utility in JAVA via socket programming.It is a simulation of Remote assistance utility provided by Microsoft Windows, in which a user can fully access the remote system using mouse and keyboard. But it is a real-time acess; i.e. when user clicks...
  16. S

    Packet sniffer

    Are packet sniffers meant for packet stealing from the network? If yes than how can we steal a packet from the source which is destined for different host or server in a network with a hub?
  17. S

    Packet sniffer

    I had seen most packet sniffers coded in C language, but I am not comfortable with socket programming in C and more comfortable with the same in JAVA. Can we code these sniffers in JAVA?Does JAVA provides API's to listen to NIC card's port and to capture frame?
  18. S

    Motion sensors for Mobiles

    Hello, I require a program that will run on most video camera phones, such as nokia 6230 , sony erricson. This will probably be in JAva. the program should have the following features:- Act as a security camera, so it should only record video when a motion or sound is detected, this should...
  19. S

    Help on Project (j2me/j2ee/networking)

    Can anyone suggest me projects based on j2me,j2ee, networking or network security for my final year project . I am doing B.E. in I.T. 4th year. Hope to receive replies soon.
  20. S

    Intrusion Detection

    I want to develop an "Intrusion Detection system" specifically for Windows Systems as my final year project in my Bachelor's degree. Currently my skill set includes Programming in C , JAVA , Basics of OS, DBMS Computer Networks, Server side programming(JSP & Servlets) I am seeking guidance...
Back
Top