Forum Replies Created
June 13, 2009 at 11:28 pm #20068
February 8, 2009 at 2:36 am #21579
Reinstall is never a good option.You can go to whatthetech.com and post your problem in the Hijackthis log and malware removal section along with a Hijackthis log of the infected computer. They are great bunch of people and will surely help you out with your malware issues.
It may not be the most desirable method but with the stage he was at with redoing his system I wouldn’t have though twice except on my own curiosity of how to fix it. Doing a secure format and reinstalling won’t guarantee it can’t somehow come back because his home network may be infected for all he knows…but at the beginning of any install I wouldn’t think twice….just for future reference for any I found a nice solution if you boot to your favorite live linux distro and install Clam and run the scan on the partition…
I may try it out on a vm to see what it picks up in my lab for kicks some time but it’s a good way to get a clean scan.
January 25, 2009 at 11:57 pm #21573
Honestly I’d just reformat thats the only way to be sure you have removed the virus for good. When going through the reinstall i would have the anti virus on sooner and be cautious of what you download. Do you have any ideas where you got the virus?
January 22, 2009 at 9:26 pm #19991
Careful don, giving dynamik the go ahead to feel at home could result in too many posts. It takes a special guy to rack up that many posts in less than 2 years!! We can’t prove it but any down time over there is suspect to him overloading the server 😉
January 20, 2009 at 9:36 pm #21415
Feel your pain, I sat for the CEH today and I got a 69%! I have to agree with what you have said in regards to the exam. But all I can do now is really jump into the material and try again!
Sorry to hear that grinch…was it not at all how you expected it? how much did your degree end up helping you?
January 15, 2009 at 7:54 pm #21408
From what I’ve been told the exam really wants you to be able to not only know how to use the tools but to be able to decipher what the output is saying to you…
January 15, 2009 at 6:38 pm #19986
The problem with this approach is that you must become equally proficient with multiple products. For example, using two different firewalls would prevent an exploit in one from working on the other, but at the same time, you may increase the likelihood of configuration errors. I’m not outright disagreeing with you, since that approach does have benefits as well. I’m just offering an alternate perspective because I think some people develop a false sense of security by taking the multi-vendor approach.
To get around that for example in my company’s environment we have a team of individuals whom work on certain aspects of the infrastructure. Each one has their own specialty and have a working proficiency in the rest. So in all everyone can work with everything, but we have an expert for each technology. So for major changes the SME would either complete or review all configuration changes to ensure there are no issues. Nice to see you over here dynamik ;D
January 8, 2009 at 1:31 am #21199
January 5, 2009 at 3:40 am #21159
If i’m understanding you right why are you configuring a client with 2 different ip addresses? If the local subnet for the client is 188.8.131.52 and the remote is 172.16.0.0, you don’t need an IP in both subnets. Just a route to get there…if you need to hit a different router then your default gateway to reach that subnet adding a static route may be what you need to do.
January 5, 2009 at 1:56 am #21177
I was only pointing it out for the reasons of what can happen to someone who has used something like testking. I was in no way trying to elude to the fact you only passed because of test king, from what I’ve seen I’m sure you didn’t need the resource. I just wanted to point it out to you because I had done the some thing similar. Unknowingly when studying for my Network+ some one had suggested them as a resource. So I hope you didn’t take that the wrong way!
January 4, 2009 at 4:06 pm #21173
Suggested reading by one of our members:
And if you’re interested:
Nice write up on your study path for the v5 CEH exam, it gave me a few good ideas to use for my studies. One thing I wanted to point out though is one of your resources you used, I don’t know the exact policy for EC-Council but I know with other vendors they usually revoke certifications for one of the products you used ‘TestKing’ if you look at this link:
I just wanted you to know if you didn’t already.
I don’t have a lab guide or anything which one are you using? I planned on just practicing and exploring different tools and methodologies I read about in books.
Here’s the book I am currently reading:
My lab set up is vmware server running on centos…with various linux vms/windows vms.
January 4, 2009 at 4:06 am #21119
you’ll have to rephrase the question
+1…I’m not totally following you as well
Are you able to verify the tftp service is running? no firewall on the server/client is blocking the connection?
January 4, 2009 at 4:04 am #21169
Best of luck to you I’m working on setting up my vmware server at the moment for the CEH as well, let us know if you have any questions!
January 4, 2009 at 3:56 am #21156
If I’m understanding you correctly it sounds like you’re trying to have a mail client(ie.. outlook) communicate with either mail server. Have you set up a cluster of some sort for the messaging environment?? Is this exchange/domino/etc?? I’m still not clear what your exact issue is by your description.
January 2, 2009 at 1:49 pm #9564
Always a great list to keep checking ;D