• Twitter
  • FaceBook

Security Forums

Log in

FAQ | Usergroups | Profile | Register | RSS | Posting Guidelines | Recent Posts

Disallowed and unacceptable posts.

Users browsing this topic:0 Security Fans, 0 Stealth Security Fans
Registered Security Fans: None
Post new topic   This topic is locked: you cannot edit posts or make replies.   Printer-friendly version    Networking/Security Forums Index -> Beginners // Misc. Computer Questions

View previous topic :: View next topic  
Author Message
Tom Bair
SF Boss
SF Boss

Joined: 10 Aug 2002
Posts: 16776955
Location: Portland, Oregon USA


PostPosted: Thu Feb 12, 2004 2:14 pm    Post subject: Disallowed and unacceptable posts. Reply with quote

This thread is intended to give Security Forum users clear examples of types of
posts that are disallowed at all times:

Brute-force Request
A moderator removed this thread due to unacceptable
content, we are not a Hacker/Cracker Site.

(Poster's identity removed to protect the innocent...)

Hello , I need a brute force to crack http forms , its for somesite.com, I
cant find my login password and I pooped up on my birthdate please help

Last edited by Tom Bair on Sat Nov 04, 2006 7:43 pm; edited 2 times in total
Back to top
View user's profile Send private message Visit poster's website
SF Mod
SF Mod

Joined: 30 May 2002
Posts: 8


PostPosted: Wed Feb 18, 2004 4:33 pm    Post subject: Reply with quote

Malicious code - this post was an obvious example of someone
presenting code that would damage another's computer. Note the blatant
statement at the bottom - there was no mention of an attack that was
being investigated.
If you need to present an attack of this nature it must be part of a formal
investigation and even then it is not acceptable to post the malicious code

/* This program will completely kill windows
so DO NOT run it */

removed malicious code

Ok, I wrote this in Dev C++. I mean if this is so simple why don't people
just use this stragedy for a virus?"

This post also falls in the category of Lame.
Seeking help in doing damage or otherwise disrupting security
measures in place.

"BACKGROUND ON THE SITUATION: you know those sites that tell
you what ure IP addy is? well i was chatting with a friend of mine (who
was on her mom's work computer at some company that we will call
BLAH) and i told her to goto the site and tell me what the number was.
She did. So i have this IP and i start messing around in DOS. I type
telnet, out of curiosity and it asks for another command and i type the
help command (?/help) and it bring up this directory and i saw the
command <-o> and the description was "connect to hostname" so i hit "o"
and it asked for the IP and i entered it...It asks for a password... I
thought if i was lucky they would stick with the default (1234) and they
did! It brings up this netgear screen with bunches of options...

PROBLEM: I have gotten this far by guessing and pure luck and I want
some advice because I want to get better. ALSO...under system
maintenance (24) and then call control (9) It has an option for
a "blacklist" (2) and has places to enter phone numbers...whats a black

Vague question and lack of effort

This could have been a good subject had the poster taken the time and
effort to search out a couple examples on their own. Our goal here is to
stimulate intelligent discussion. We all know how to use SFDC Search and
google. There would be literally hundreds of examples found. The poster
could have spent the time to search, give a brief discussion of what they
learned and then ask for opinions as well as leads on other material.

"Firewall and IDS Books

Can anyone recommend a good book(s) for firewalls and ids. I am new to
the security field somewhat, well going into my third quarter at my school
for security. Thanks for the help"

Illegal request "Hack my computer"

This request could be innocent and genuine. Problem is the post
contains a public IP address and a request to attack. By any laws in any
country this would be illegal without written permission.
If you want to run a test against a server you must contact SFDC
administration, provide justification, proof of the project, and written
permission on official letterhead signed by a verifiable official.
As a rule we simply do not allow such activity due to the potential legal
implications. There are plenty of widely known "hack attack" sites out
there to test your skills.


Hello i,m a teacher for a class who is working with security on Linux and
Windows servers. This week they have a linux box running and some
traffic is needed.

If any want to hack this box they are welcome to do that. The IP is

Be nice and post a note if you get inside. "


It is obvious that the poster simply wanted to bypass security
measures in place

"I have a problem, my parents installed Norton Internet Security
on my computer. To use a program for online use they have to login as
admin and ok it. My stepmom who has the account is on a business trip
and she would normally ok it. I just want to play an online game of Return
To Castle Wolfenstein how do I make this happen. Is there a way to
bypass security? "

Lame, Lack of effort, Poorly formed question

We understand that many of our members may not use English as
their primary language. In this case it may be difficult to present ideas
clearly. If that is the case please make that fact known lest we assume
the poster is simply asking a question without looking things up for
themselves. As mentionned above - take the time to properly describe
your situation and ask a question that makes sense. This question could
easily have been worded to bring up a valid question such as:

"Where do my critical updates go after they are installed. Do I need to
delete them?"

"Windows critical updates

I have been downloading critical updates and I was wondering what
should I do with those updates once after they have been installed? "

Trolling defined
"It is a mixture of juvenilia, sarcasm, deliberately bad jokes, tasteless
nonsense and highly developed and artistic attempts to provoke outraged
responses from other forum users, or amuse them. It is a subset and a
microcosm of Internet trolling in general."

In short Trolling is picking an online fight or argument that adds no value
to the discussion.

Hacking/cracking and Abusive
Obviously this person was looking for help in doing damage to
another's computer.
Expressly Verboten.

"Counter attack

Some muthaf*cker is trying to hack me. I use Sygate Firewall personal
Ed. and everyday I get some warning, and see an IP always in the same
range. How can I screw the bastard? I got broadband.

Thanks in advance."

If you want to share something that you received in an email, take the
time to remove any garbage characters and make it look decent.

"> > > Eighty percent of Kindergartners solved this
> > > riddle, but only 5% of Stanford graduates figured it out!
> > >
> > > Can you answer the following question?
> > >
> > > 1 The word has seven letters...
> > > 2. Preceded God... "

Hacking/cracking, lame, offering illegal services.

This one is so obvious I won't even present the body of the post. You
can see what the user is up to by reading the title alone.


Spamming - especially in efforts to sell something.

The user wrote a new wingding application and wanted to advertise it.
SFDC is not in the business of advertising. The user also had the site for
his commercial application in his signature. Unquestionably disallowed.

SFDC will support members efforts and will sometimes allow publicity.
This is on a case by case basis. Contact ShaolinTiger if you wish to
publicize your site or product. We will, from time to time, partner with
select companies who are active in the SFDC community.


I just finish the development of my My New Commercial Application

(More screenshots: http://mysite.com/mycommercialprogram/screenshots.html)

If you have any suggestions, please let me know! Here is a short

My New Commercial Application provides advanced information about all
running processes (applications, DLL's, BHO's and services). For each
My New Commercial Application recognizes also virtual driver software,
services, BHO and other processes which hide from the Windows task
Back to top
View user's profile Send private message
Trusted SF Member
Trusted SF Member

Joined: 26 May 2002
Posts: 16777206
Location: Bi Mon Sci Fi Con


PostPosted: Fri Feb 20, 2004 4:16 pm    Post subject: Reply with quote


Well it's difficult to describe this as anything other than lame.

Lets go to a public forum, register, and then ask if anyone can help you
download Microsofts source code? Shocked

"hey, You all probly heard about the ms leak that happend earlier
this week and last.... but after all the searching i can bare for a day, ive
given up on trying to find a place to grab the archive.... anyone know
where i can get my hands on it? any p2p networks or something?"

Seeking exploits

We do not provide links to or examples of working exploit code. There are
circumstances were proof of concept code may be acceptable. If in doubt
please contact a member of the mod/admin team.

"Where can find SP 3 of SQL SERVER the code of

and another

"Forget the patch, does anybody have the exploit? "

Complaining about removed articles

Every so often a moderator or admin will remove a post based on much of
the above criterea. If you feel a post has been removed unfairly a polite
PM to any of the mod/admin team will usually get a response. Public or
private whining or abuse is not tolerated.

"sh*t!where has my article gone?"
Back to top
View user's profile Send private message Send e-mail
SF Senior Mod
SF Senior Mod

Joined: 21 Sep 2003
Posts: 16777097
Location: Portugal


PostPosted: Thu May 12, 2005 2:14 pm    Post subject: Reply with quote


Trying to bypass a program's copy protection, with no context whatsoever or
reasonable explanation added. Expressely forbidden, SFDC is not a cracking
or warez site.

Hi i got a exe that i need to use but its has a Hardware fingerprint is there a way of bypassing this?????
Back to top
View user's profile Send private message
Display posts from previous:   

Post new topic   This topic is locked: you cannot edit posts or make replies.   Printer-friendly version    Networking/Security Forums Index -> Beginners // Misc. Computer Questions All times are GMT + 2 Hours
Page 1 of 1

Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum

Looking for more Windows Networking info?

Sign up to the WindowsNetworking.com Monthly Newsletter, written by Enterprise Security MVP Deb Shinder, containing news, the hottest tips, Networking links of the month and much more. Subscribe today and don't miss a thing!
View a sample newsletter.

Become a WindowsNetworking.com member!

Discuss your Windows Networking issues with thousands of other Windows Newtorking experts. Click here to join!

Community Area

Log in | Register

Readers' Choice

Which is your preferred data recovery solution?

Follow TechGenix on Twitter