Our system is similar, except we block port 25 completely via RADIUS
after we detect an outgoing virus or spam,
Detect how?
We don't sniff traffic for suspicious signatures at this point.Viruses
are eventually caught by the assumption that send to everyone in the
address book
Blocking just hides it. I used to believe in port blocking as the solution
to many user problems but now I have 3 and 4 page ACL's
on my border routers. This does not scale. Yes, I could push this out via
radius to the NAS but again this does not solve the problem.
The solution I am
If we are all network operators, exactly what is the benefit of having a
1GB mailbox operated by another network?
Offsite backup. Just encrypt and point your backup device to your E-mail
box :-)
- Original Message -
We have since purchased some polyphaser surge protectors.
I'll second the polyphaser as a good product. We put it in a POP in the
base of a 460 foot tower and the equipment and it survived unscathed for at
least 5 direct tower lightning hits that we know of
It seems to be another stupid Microsoft Exploit that just
causes annoyance for Unix Boxes.
The only side effect is they fill my dmesg logs with
signal 11's from apache crashing.
Am I the only one that sees the irony that Apache seg faults from an
attack aimed at Msoft?!
I just received 2 copies of Bagle.F, embedded inside a password-protected
zip file. Comes right through a full virus scan undetected.
---
Sent: Sunday, February 29, 2004 7:04 PM
Subject: Bad girl
I am from Taiwan but I study in Camden, New Jersey now. I
We created a set of RAS filters that we can call up in the user's RADIUS
record - Block ICMP request, Block SMTP outgoing, etc. When the user has a
virus we just set the filter. They can still get on without doing any
damage, yet still download fixes, etc. They might call if they need to
While they may have VPN's at many of their branches which offer significant
savings over leased lines everywhere, their web site access to personal
banking information was also offline. It would be worth grepping logs to
see if there was indeed a SQL server from the inside that was infected.
Just like the insider TCI theft ring at
http://zdnet.com.com/2100-1106-971196.html , the easy way out is to just to
skip all that and get access to a leased line from the inside - I'll bet
many financial transactions over a private line aren't even encrypted.
- Original Message -
Yes,
I've scanned the web for the latest information on working with IP
Multicasting. There's a bunch of old (obsolete?) information dealing with
MBONE, and pointers to http://www.ipmulticast.com which doesn't respond.
1.) Are there any pointers to URLs that deal with issues to set up for
both
10 matches
Mail list logo