Xorum - Yet another proxy message board
Latest Xorum Posts

HTTP Anonymous Proxy Lists :: What do you use for web proxy?
Author: mandarpatil, Subject: What do you use for web proxy?
Topic Replies: 0, Posted: Sat May 30, 2020 6:52 am (GMT 0)

Socks Proxy Lists :: Best Responsive Website Design Company in Delhi NCR, India
Author: jeewangarg, Subject: Best Responsive Website Design Company in Delhi NCR, India
Topic Replies: 0, Posted: Fri May 29, 2020 9:59 am (GMT 0)

Other Proxy Type Lists :: Failure to get my money back from Cash App due to payment
Author: oliviajames123, Subject: Failure to get my money back from Cash App due to payment
Topic Replies: 0, Posted: Thu May 28, 2020 1:14 pm (GMT 0)

  prev 02.09.2008 next
Subscribe now! Get ELITE status.
Current Proxylist
[full proxylist]
Source: Xroxy.Com. Updated: Sun, 31 May 2020 15:40:26 GMT. Total: 3360 proxies available.

Proxy websitesProxyLists.Net
Proxz lists
Free Proxy Lists
Checked Proxy Lists
[full list of websites]
Quick poll
Would you like to know whether HTTP proxy supports SSL connection or not?
Yes, I visit some sites that support SSL!
No, I don't need this feature.
I don't actually know what SSL is and what it's used for.

View results

Wider Implications of the Red Hat Breach

 ( 4288 days 13 hours ago)
LinuxSecurity.com: Reports of data losses and system breaches are almost becoming passe but from time to time events happen that take on a life of their own and have effects far beyond what the initial breach would normally represent. Late last week there was an announcement that key servers belonging to both the Fedora and Red Hat Linux distributions were compromised. With this breach they join the ranks of Ubuntu, Debian and Gentoo as Linux distributions that have suffered severe server breaches. What is the wider significance of the breach to the Fedora and Red Hat Linux distributions that occurred last week? What kind of questions should those responsible for system security be asking themselves in light of this breach? Find out in this informative article.
[read more] [permanent link]

Linux Password Policies

 ( 4288 days 20 hours ago)
LinuxSecurity.com: Lets start with some basics.... Our Linux system stores its usernames and passwords in a special file : '/etc/password'. The passwords in this file are one way encrypted (hash-ed) through a password encryption function called 'crypt' using DES as the encryption algorithm. The good thing about 'hashing' is that you can not 'decrypt' the hashed passwords because the function used for hashing cannot be reversed (one-way traffic). DES generally uses keys (symmetric key cryptography) in which case things can be either encrypted or decrypted, but for encrypting passwords in Linux, only the 'hashing' implementation of DES is used. How much do you know about Linux passwords? This article goes into detail about how user's passwords are controlled and handled in Linux.
[read more] [permanent link]

  prev 02.09.2008 next