On Thu, 2003-02-20 at 01:33, Kenneth Hauklien wrote:
Hi
Is there any way to limit a users / groups processes? I run a shell/web
server and want to limit them down to for example 2-3 processes. Is this
possible in any way?
That depends largely on what operating system the machine is
I pop them over to http://spamcop.net, and let their scripts
sort out what's credible and what isn't.
(Note that the trail sometimes peters out at an anonymizing relay
or gateway)
Dave Gillett
-Original Message-
From: Marty [mailto:[EMAIL PROTECTED]
Could someone explain how
Here you go. Enjoy.
http://www.claws-and-paws.com/spam-l/tracking.html
http://combat.uxn.com/
-Original Message-
From: Marty [mailto:[EMAIL PROTECTED]
Sent: Thursday, February 20, 2003 10:33 AM
To: [EMAIL PROTECTED]
Subject: Email headers
Hi group,
Could someone explain how to
mod_proxy is very powerful , but when it comes to security I wouldn't
use it use it to protect another server as it had some problems in the
past .
In addition to mod_proxy, you can also use mod_rewrite to lock down what
can be requested and what can't. Our developers had content
Hi Gordon,
I have done it with NT4 option pack so that my Ipass could authenticate via
the Radius ( configure as proxy) to
NT username password.
The new version is actually for win2k. Not sure if it works with NT4.
It's available at the microsoft website.
tks.
Rgds,
Simon
On 19-Feb-2003 John Brightwell wrote:
Are there any sites out there with the facts and
figures about internal exploits and cautionary tales
about disgruntled employees or IT savvy nighttime cleaners?
It's hard to find such information, since companies are reluctant
to make it public.
I just read this story which explains how the Swiss Federal Institute of
Technology
exploited a flaw in the SSL protocol to hijack an 8 character password
from a bunch of SSL encrypted email logins.
I was surprised. What does the security community think of this?
try these:
http://www.expita.com/header1.html is a reference sheet for e-mail, smtp, headers
http://www.stopspam.org/email/headers/headers.html is a good tutorial on how to
understand e-mail headers.
http://spamcop.net/fom-serve/cache/16.html has a link to how to get the full header
info for
In-Reply-To: [EMAIL PROTECTED]
Sorry for the weak information.
Im running debian gnu linux. Ive found one silly
perl script that can check after how many processes a user / group can run
but is doesnt work very well. There also found out
that /etc/security/limit.conf works ( pam ). Its the same
From: Jason Hastain [EMAIL PROTECTED]
I have a few clients who are doctors running small practices. They have
small LAN's and DSL connectinos behind a simple NAT router/firewall in one
case and persoanl FW's in the other (unfortunatly not my decision in either
case).
Each has approached me about
I've been wondering about this for a while now...
Everybody knows NFS is insecure. Right. So no-one uses it. Why not simply modify NFS
to use encryption? Why not?
Not tunneling, modify the source to either (a) establish ssl connections, or (b)
manually encrypt all traffic (I would prefer this
One (usually) good way to teach users about the how and why of passwords is to sit
down with them and browse the network, preferably some very important folders, and ask
them how their manager would react if I deleted all the files there.
After all, it's your account that does the deleting, so
I was letting this discussion pass but a glaring error needs to be
corrected.
Good point. The correct use of terminology,
particularly in an area as technical as this
discussion, is important. When other, unusual terms
and phrases, w/o an explanation, begin to be used, the discussion can
Hi there,
continuing on this thread
That's a implementation I was wondering to do, but interacting with SNORT,
to make changes in the destination address (squid or iptables routing). If
an attack were detected, it would redirect the traffick to another server or
some king of honneypot.
ulimit -u , see the bash infopage for more info.
Kenneth Hauklien wrote:
Hi
Is there any way to limit a users / groups processes? I run a shell/web
server and want to limit them down to for example 2-3 processes. Is this
possible in any way?
Thank you all in advance
Kenneth Hauklien
The absence of very specific requirements in the HIPAA regs is a source of a
lot of consternation, but I believe the policies were specifically written
to be vague; the actual 'fit' of security and privacy recommendations will
vary depending on a number of factors that may be unique to each
Is there any way to limit a users / groups processes? I run a
shell/web
server and want to limit them down to for example 2-3 processes. Is this
possible in any way?
You can edit /etc/security/limits.conf
on Linux.It has most of what you want for shell users.
However you will need to find
1. Still a large majority of computer crime (data theft,
damage etc) is caused by people who have access to internal
systems ... is there anywhere that I can get facts and
figures to support this?
Check with the FBI.
2. In an average company it's not so difficult to gain
physical
--On Thursday, February 20, 2003 12:57 PM -0500 Paul Stewart
[EMAIL PROTECTED] wrote:
We have no idea how this person has managed to gain some form of
access to these servers and are obviously quite concerned.
What services are the servers running? Are the machines *fully*
patched?
We've had
Jason,
Try here:
http://www.cms.hhs.gov/regulations/hipaa/cms0003-5/0049f-econ-ofr-2-12-03.pdf
from about page 264, especially the grid on the last 3 pages.
The regs don't take effect until april, so no one knows what to look for, and if
you are dealing with small providers it is after that
What I know about this, is that 'they' use a bug in IIS to get access on the
server. Most of the time they will install a serv-u ftp server. And make
hidden dirs that cannot be accessed directly by browsing through the
directories (dirs like com1, lpt1 a.o.)
The file msudb32.exe doesn't ring a
You might want to try Famtech's RAdmin...I've been using it for a while with no
problems. It can integrate with Windows authentication or plain password as well as
IP filtering. better yet, it's fast and all traffic is encrypted.
http://www.famatech.com/default.html
Regards,
Michael
Dear Sir,
You could use ulimits (get and set user limitations). I use group defined
limits in the /etc/profile script. For example: (group users)
if [ `id -g` = 100 ]; then
ulimit -S -H -c 10 -f 5 -l 5 -d 5 -v 5 -m 5 -s 1000 -u
30 -t 1800 -n 1024
fi
They have this
Paul,
The filename of the software that is responsible we
believe to be msudb32.exe
how did you come to this conclusion? Did you run
fport to determine that this is the file/process using
port 24?
What other services do you have running? HTTP? FTP?
How about your EventLogs? Do they
Is there any way to change the settings of a domain controller's event
logging system, so that the system stores the client's ip-adress whenever
a client tries to logon to the server. Basic logging is already possible,
but if the client machine is not part of the domain (for example a
The answer is that until it gets to court no one knows. HIPAA represents
1000's of pages of requirements that are ambiguous at best and contradictory
at worst. HIPAA's useful function is the standardization of procedure codes
saving the health care industry and in turn consumers untold sums.
To enable user quotas on a partition in redhat ( dont know about other
linuxes), add usrquota after defaults or whatever you have in its
place in the fstab to edit a quota, type edquota -u username;
might wanna read the man page on it first before you go editing away.
Also you might wanna
Check out http://www.spamcop.net
-Lucas
-Original Message-
From: Marty [mailto:[EMAIL PROTECTED]
Sent: Thursday, February 20, 2003 12:33 PM
To: [EMAIL PROTECTED]
Subject: Email headers
Hi group,
Could someone explain how to decipher Email header? How can we know the
real sender of
You didn't mention the OS. On HPUX there are things called resource limits.
The kernel has a soft and hard limits, these limits are compiled into the
kernel. Programs get an error, for example trying to create a new process
or open a file. The initial error is the soft limit. The program can
Can anyone shed some light onto this subject or point me to a document
with
only the IT requirements prefereably boiled down to something simple?
The final documents have just come out finally in the last few weeks, so
digested documents are going to be hard to find right now.
I understand it
If they are just thinking about it now they're in some serious trouble.
You've got until April 16th to basically comply or chance being fined
heavily at a minimum and $20K is just for starters. If they comply with ISO
17799 then they should be relatively OK EXCEPT where they are dealing with
PHI
Could someone explain how to decipher Email header? How can we know the
real sender of spam or virus email?
Go a googling for Sam Spade.
You paste the header in there and it helps explain.
John Tolmachoff MCSE, CSSA
IT Manager, Network Engineer
RelianceSoft, Inc.
Fullerton, CA 92835
Hi Marty
one nice tool, which explains the headers and checks them is Spam
Spade:
http://www.samspade.org/
There is an Online and a windows version. I prefer the later.
Matti
Hi group,
Could someone explain how to decipher Email header? How can we know the
real sender of spam or virus
On Wednesday 19 February 2003 11:58, John Brightwell wrote:
It's ok we're behind a firewall
I have been hearing this from customers or prospective customers since the
press (many years ago) and Hollywood begun to address the sexy side of
computer crime--the bunch of black hats out there.
From: Orlando J. Cano [mailto:[EMAIL PROTECTED]
I have recently been assigned to join efforts with our Network group in
coming up with a secure remote access solution for our Network. This
will involve accessing servers in our DMZ. I was wondering if this
securityfocus community could elaborate
Check out the limits.conf file, its under /etc/security on my RH box.
The nproc parameter is the one you want.
Cheers,
Nick
Brad Arlt wrote:
On Thu, Feb 20, 2003 at 09:33:36AM -, Kenneth Hauklien wrote:
Hi
Is there any way to limit a users / groups processes? I run a shell/web
server and
The ulimit command would be the proper choice here. If you want in on a
permanent basis then use the limit.conf file. I'm not sure why you
would want/need a separate script to do the same thing? Do you have a
specific reason for this?
Kenneth Hauklien wrote:
In-Reply-To: [EMAIL PROTECTED]
While I haven't studied the security of the protocol itself, RDP is supposed
to be somewhat secure. I use administrative terminal services to manage
Win2k systems in the DMZ. The firewall restricts access to the RDP port only
from specific admin workstations (IP addresses) on the internal network.
As a side to calling in Law Enforcement, normally you have to already have
your case and prove a loss (felony loss) so document all of your costs
(human, resource, downtime, etc.). I believe in calling in LE's when
required and I think that more companies should prosecute offenders instead
of
Hi,
I hope you accept another request from a newbie home user (by the way, thank
again for the suggestions about basic software for security [Suggestions
for basic software for security]).
Here it is my situation: computer with WinXP Pro. and a cable modem; I have
4 account (+1 for Guest but it
40 matches
Mail list logo