Based in my securityfocus topic responce, and also in some information security audits that i’ve done, i think in the idea to statistical prove the attack risk level at some organization.
|Number of accounts
||Having almost one weak key probability
||0.401 – 40.1%
||0.722 – 72.2%
||0.923 – 92.3%
||0.994 – 99.4%
Continue reading Corporate LDAP Servers Weakness Statistics
Maybe you are trying to move to KDE4 and you were get used to use single click to select and double click to open…
However, the original configuration of KDE4, uses the single click to open some file, that could be nasty to people who don’t like it.
Continue reading Configuring single click on KDE4 icons
Some network administrators dont know how to handle and correctly install network monitoring applications, IDS and other products who requires network traffic inspection, there is no knowledgment about how span port where designed and it limitations for full-duplex networks.
When the network are in full-duplex mode, the span port have a natural loss of packets that not vary across the hardware.
Continue reading SPAN Port / Mirroring Monitoring
C is a good and complex language, and enables you the well the memory managment, however, the original question is: can we transform C language into Object Oriented Language without modify the compiler? And the answer is: YES, we can.
We wont have all the C++ power doing this, cannot specify private/public/protected methods, hierarchy and other stuff available on C++, only will have the power to create some interface classes and fillit with functions in runtime.
Continue reading Is C an Object Oriented Language?