cyclic redundency check (I think). Are you trying to load from CD-ROM or
floppy? Either the hardware you are loading from is bad, the media is bad
(unlikely since it seems you've tried many) or you've got a memory
problem in the system. Could be bad memory, bad cache etcit's probably
wor
I have been trying to install linux on my pent 100 for days...i have
many machines and this machine is giving me the following message for any
linux dist i have tried whether redhat , slackware , debian , etc
crc error
--system halt
when the kernel boots up vmlinuz is when i get this
Quoting "Mansur, Warren" <[EMAIL PROTECTED]>:
> > nmap scans hosts and reports if they are up, and what ports are open.
>
> Just a quick question. Does nmap rely on being able to connect to a
> particular website to download the TCP fingerprints, or are they
> included with the program when in
On Mon, 18 Feb 2002, Jim McGlaughlin wrote:
> I guess any question on this forum is sure to promote discussion.
Likely so. This can generally be considered a Good Thing. :-)
--
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do not |
| ne
Thanks for the answers to my question.
I guess any question on this forum is sure to promote discussion.
It will take a while to research all the information given.
Thanks again
Jim McGlaughlin
*
To unsubscribe from this list, s
On Sun, 17 Feb 2002, Mansur, Warren wrote:
> Just a quick question. Does nmap rely on being able to connect to a
> particular website to download the TCP fingerprints, or are they included
> with the program when installed?
AFAIK, nmap is completely self-contained, although I haven't looked at
In a message dated: Sun, 17 Feb 2002 20:33:54 EST
"Kenneth E. Lussier" said:
>Nessus can do nasty things to a system, and to a network as a whole if
>it isn't used correctly, wisely, and carefully.
Oh, didn't know that.
>> Can you explain a little more about the differences
>
>Nessus, on the o
On Sun, 2002-02-17 at 21:51, Mansur, Warren wrote:
> > nmap scans hosts and reports if they are up, and what ports are open.
>
> Just a quick question. Does nmap rely on being able to connect to a
> particular website to download the TCP fingerprints, or are they
> included with the program whe
> nmap scans hosts and reports if they are up, and what ports are open.
Just a quick question. Does nmap rely on being able to connect to a
particular website to download the TCP fingerprints, or are they
included with the program when installed? For some reason I can't seem
to use nmap when I
[EMAIL PROTECTED] wrote:
> >> 2. use nessus or something like that to then scan the live
> >>IP addresses for open ports.
> >
> >DON'Y USE NESSUS!!
>
> So what exactly are you trying to say here?
I'm trying to say that there is a correct tool for every job, and that
just isn't it
On Sun, 17 Feb 2002 [EMAIL PROTECTED] wrote:
> Can you explain a little more about the differences between nessus and
> nmap.
nmap scans hosts and reports if they are up, and what ports are open.
Nessus scans for vulnerabilities. For example, "Does this system crash
when sent an over-size I
You may want to check out 'scotty' - TCL based network discovery tool
kit. I believe you'll want the 'tkined' program in that package.
Jim McGlaughlin wrote:
> GNHLUGers
>
> I am looking for an information resource that discusses command line utilities and
>how to use them to figure out netwo
In a message dated: Sun, 17 Feb 2002 13:15:29 EST
"Kenneth E. Lussier" said:
>> 2. use nessus or something like that to then scan the live
>>IP addresses for open ports.
>
>DON'Y USE NESSUS!!
So what exactly are you trying to say here?
> Nessus is for security auditing and vulne
[EMAIL PROTECTED] wrote:
[SNIP...]
> The automated tool sets do little to organize the diagram of the
> network it "auto-discovers" other than just show you what's connected
> to a specific ethernet "segment". They won't show you what's a
> server of what, what's a client of what, etc. Usually,
In a message dated: Sun, 17 Feb 2002 12:40:09 EST
Jim McGlaughlin said:
> I am looking for an information resource that discusses command
> line utilities and how to use them to figure out network
> hierarchy, in the form of parent/child IP addresses.
[...snip...]
>I have found tools that do the
15 matches
Mail list logo