10Nov2008 (UTC +8) On 11/10/08, joebert jacaba <[EMAIL PROTECTED]> wrote: > I am interested to learn. Looks like I need to buy a powerful laptop though.
Not really, if we're talking about an attacker's machine here. If you've got 512MB RAM, you'll be comfy with it. It's Nessus which is a memory hog. Get a USB flash drive, check if your laptop with WLAN can boot from a USB drive... if yes, then you can start of with BackTrack on a USB stick: http://www.remote-exploit.org/backtrack_download.html You can build a VMware image for a Solaris x86 or an older Linux box, and load it up with all the stuff you can put in it, using a regular PC. Then. we'll just transfer that to the quad-core CPU we'll make ready. Drexx Laggui -- CISA, CISSP, CFE Associate, ISO27001 LA, CCSI, CSA http://www.laggui.com ( Singapore / Manila / California ) Computer forensics; Penetration testing; QMS & ISMS developers; K-Transfer PGP fingerprint = 6E62 A089 E3EA 1B93 BFB4 8363 FFEC 3976 FF31 8A4E _________________________________________________ Philippine Linux Users' Group (PLUG) Mailing List http://lists.linux.org.ph/mailman/listinfo/plug Searchable Archives: http://archives.free.net.ph

