become if more than 80% are plain junk even without looking at
the content.
Bye
Volker
--
Volker Tangerhttp://www.wyae.de/volker.tanger/
--
[EMAIL PROTECTED]PGP Fingerprint
378A 7DA7 4F20 C2F3 5BCC 8340 7424 6122
encrypted call-back
modem. This can be easily achieved via standard mgetty and inittab. This
way you have a (serial) console working if the network has gone sour -
something that can quite easily happen if managing remote firewalls...
;-)
Bye
Volker Tanger
ITK Security
...
Ghost won't work (IIRC) on unknown OS types as it ony copies used data
blocks. Netcat does a binary copy and does not care what OS or data...
see http://wyae.de/docs/img_dd.php
Bye
Volker Tanger
ITK Security
___
Full-Disclosure - We believe in it.
Charter
On Thu, 13 May 2004 12:31:12 +0200 Werner Gillmer
[EMAIL PROTECTED] wrote:
Anyone know of any project's involving biometric authentication for
website's?
commercial: http://www.voicetrust.de/
Bye
Volker Tanger
ITK Security
___
Full-Disclosure - We
. blind forwarding of IP types 50+51 to a
specific IP to be configured in the router). Data sheets don't always
tell the truth here, so you really should verify before rollout...
Qapla'
Volker Tanger
ITK Security
___
Full-Disclosure - We believe
is supplying an
encapsulation solution, too. They're using udp/4500 and/or udp/1 -
and you have to explicitly enable encapsulated mode (IPSec through NAT
UDP Port / IPSec over NAT-T).
Bye
Volker Tanger
ITK Security
___
Full-Disclosure - We believe
://www.bonelabs.com/). Utimaco has a crypto-gateway, too.
Usually you'll want a single company-wide key when using a gateway to
ensure confidential mail across the internet. This way you'll have
plaintext emails via LAN though - if not using TLS.
Bye
Volker Tanger
ITK Security
(x)5 and NS4.7x
Okay, might have been the Outlook problem describe there.
Sometimes you'd be astonished upon the acienticity of the stuff that
still is used in production in the wild - thus keep that fact in mind.
Thanks for the good pointer!
Bye
Volker Tanger
ITK Security
?
There is no technical solution to a social problem - well, except in
this case maybe reformatting the disks and reinstalling from scratch
and clean media.
Sorry
Volker Tanger
ITK-Security
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full
requirement.
/^Content-(Type|Disposition):.*
(file)?name=?.*\.(bat|asd|chm|com|dll|exe|hlp|hta|js|jse|lnk|ocx|pif|scr|shb|shs|vb|vbe|vbs|vxd|wsf|wsh)?/
DISCARD Found executable attachment - probably virus. Re-send packed in ZIP archive
if valid requirement.
Bye
Volker Tanger
ITK-Security
it works as proxy, too
- similar to http://www.securityfocus.com/bid/4131/
Bye
Volker Tanger
ITK-Security
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
. but
then, ideally the IIS server should be running as an unpriviledged
user too
Well, running a kernel task is a bit difficult to do unprivileged...
*SCNR*
Volker Tanger
ITK-Security
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full
On Thu, 13 Nov 2003 10:08:13 -0600 Frank Knobbe [EMAIL PROTECTED] wrote:
On Thu, 2003-11-13 at 08:41, Volker Tanger wrote:
Ideally the Apache exe should be running as an unpriviledged user.
but then, ideally the IIS server should be running as an
unpriviledged user too
Well
...
Bye
Volker Tanger
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
14 matches
Mail list logo