Skip to content
Question Defense
Technical answers for technical questions
Question Defense
  • Backtrack Linux
    • Backtrack Article Request
  • HTTP ERROR
  • Kali Linux
    • Kali Linux Article Request
  • Privacy Policy
  • Tools
    • Class Of Device – Bluetooth CoD List In Binary And Hex
    • phpMyAdmin Blowfish Secret Generator
  • Documentation
    • check_postgres.pl
    • Linux Man Pages
      • insmod
      • kill
      • Logrotate
      • ls
      • lsmod
      • mail
      • modprobe
      • more
      • mysqldump
      • ntfsprogs
      • ntfsresize
      • pg_dump
      • psql
      • rmmod
      • screen
    • Monarch
      • Monarch Commands
      • Monarch Control
      • Monarch Escalations
      • Monarch Groups
      • Monarch Management of Nagios Hosts
      • Monarch Managing Nagios Contacts
      • Monarch Managing Nagios Hosts
      • Monarch Profiles
      • Monarch Services Template
      • Monarch Time Periods
      • Monarch Tools
  • Tags
  • Contact
Linkedin page opens in new windowTwitter page opens in new window
Search:
Search
  • Backtrack Linux
    • Backtrack Article Request
  • HTTP ERROR
  • Kali Linux
    • Kali Linux Article Request
  • Privacy Policy
  • Tools
    • Class Of Device – Bluetooth CoD List In Binary And Hex
    • phpMyAdmin Blowfish Secret Generator
  • Documentation
    • check_postgres.pl
    • Linux Man Pages
      • insmod
      • kill
      • Logrotate
      • ls
      • lsmod
      • mail
      • modprobe
      • more
      • mysqldump
      • ntfsprogs
      • ntfsresize
      • pg_dump
      • psql
      • rmmod
      • screen
    • Monarch
      • Monarch Commands
      • Monarch Control
      • Monarch Escalations
      • Monarch Groups
      • Monarch Management of Nagios Hosts
      • Monarch Managing Nagios Contacts
      • Monarch Managing Nagios Hosts
      • Monarch Profiles
      • Monarch Services Template
      • Monarch Time Periods
      • Monarch Tools
  • Tags
  • Contact

Tag Archives: scan

You are here:
  1. Home
  2. Entries tagged with "scan"

Technology Insights

Get Dell Wireless 350 Bluetooth Module Working With Backtrack, Dell Bluetooth 350 With Ubuntu

InsightsBy alexFebruary 20, 2011Leave a comment

Getting this module working is not very much fun if you are on a single boot system with Backtrack or Ubuntu installed however it is much easier if you are on a dual boot system that happens to also boot into Windows XP. I personally ran into the issue of the Dell Wireless 350 Bluetooth…

Information Security

How To Count The Number Of Hosts In NMAP Network Scan Results With Zenmap

SecurityBy alexJanuary 30, 2011Leave a comment

Earlier today while working with a friend at our offices we were playing around with a large NMAP scan of the anoNet network. His computer would not open the network topology in Zenmap because of a lack of RAM so we were looking at it on another laptop with much more RAM. After discussing it…

Technology Errors

TW-Brother MFC-5890CN LAN Scanner Error TW006, Cannot Scan From Brother Printer

ErrorsBy alexDecember 13, 201040 Comments

For some reason today I could not scan an item on our Brother MFC-5890CN printer to my Windows 7 laptop today at the computer shop. It has been a couple weeks since I needed to scan something to my computer however it has never had a problem in the past. Today though when I attempted…

Technology Insights

Modify MFC-5890CN Scan Import To Open Adobe Photoshop Instead Of Microsoft Paint

InsightsBy alexJune 26, 20102 Comments

Earlier today I needed to scan in a receipt at the computer shop so I needed to configure the Brother MFC-5980CN all in one printer on my laptop. One of the things that always gets on my nerves about scanning in documents on most scanners is that by default it opens Microsoft Paint which is…

Information Security

Backtrack 4: Information Gathering: Dradis – Effective Information Sharing

SecurityBy purehateJune 9, 20102 Comments

One of the biggest problems when conducting penetration tests and vulnerability assessments is the organization of all the information obtained on the test. I used to use a program called Leo to organize my information because it had a tree like interface and you well able to create a well mapped out report of all…

Information Security

Backtrack 4: Information Gathering: Route: Protos – IP protocol scanner

SecurityBy purehateJune 2, 20102 Comments

The next tool I will be reviewing is from the same suite of tools as netenum and netmask. Protos is a IP protocol scanner. It goes through all possible IP protocols and uses a negative scan to sort out unsupported protocols which should be reported by the target using ICMP protocol unreachable messages.

Information Security

Backtrack 4: Information Gathering: DNS: Fierce – locate non-contiguous IP space and hostnames against specified domains

SecurityBy purehateMay 26, 20103 Comments

The final tool in the DNS Section is called fierce. It is a perl script written by rsnake. Fierce tries multiple techniques to find all the IP addresses and hostnames used by a target. These include – trying to dump the SOA records, do a zone transfer, searching for commonly used domain names with a…

Technology Insights

Windows 7: Schedule A chkdsk On Reboot

InsightsBy alexApril 19, 20101 Comment

My Dell laptop has been claiming there is a hard drive issue for some time however when I reboot and let Windows 7 scan the drive it either doesn’t scan the drive or it scans the drive and still claims there is an issue. I believe the drive doesn’t have any major issues and that…

Question Defense
© 2019 question-defense.com

>>> Brave Browser Tipping: Support us by downloading, installing and then tipping us with Brave! <<<
Amazon Associate Disclaimer: As an Amazon Associate we earn from qualifying purchases.

Go to Top