RE: Computing physical security entire family of locks compromised AT RISK when you stay in a hotel

2012-07-26 Thread Ken Schaefer
10 years ago, when these things came onto the market, $50 bought you nothing. Most laptops were in the $2000-3000 range. I think it would be almost impossible to build a commodity appliance device today, that is designed to resist an examination by a skilled and determined hacker in 10 years'

RE: [semi-OT] LinkSys router UI mockups

2012-07-26 Thread Michael B. Smith
Routersim and Boson's Netsim. -Original Message- From: Art DeKneef [mailto:art.dekn...@cox.net] Sent: Thursday, July 26, 2012 8:04 PM To: NT System Admin Issues Subject: RE: [semi-OT] LinkSys router UI mockups It's been a while but we had something like that when I was teaching CCNA cla

RE: [semi-OT] LinkSys router UI mockups

2012-07-26 Thread Art DeKneef
It's been a while but we had something like that when I was teaching CCNA classes for the Cisco Networking Academy. Students were able to enter commands into the "device" as they tried to configure the router or switch. It was a way for them to practice if they were not in the class, or the lab

Re: [semi-OT] LinkSys router UI mockups

2012-07-26 Thread Kurt Buff
Here's an interesting resource: https://learningnetwork.cisco.com/thread/15662 On Thu, Jul 26, 2012 at 1:33 PM, Daniel Chenault wrote: > While on the subject... > > I seem to recall reading about virtual Cisco devices that could be used to > simulate the real thing for educational purposes. Does

RE: [semi-OT] LinkSys router UI mockups

2012-07-26 Thread Daniel Chenault
While on the subject... I seem to recall reading about virtual Cisco devices that could be used to simulate the real thing for educational purposes. Does that ring a bell with anyone? Daniel Chenault dchena...@lgnetworksinc.com -Original Message- From: Kurt Buff [mailto:kurt.b...@gma

Re: [semi-OT] LinkSys router UI mockups

2012-07-26 Thread Kurt Buff
On Thu, Jul 26, 2012 at 12:06 PM, Ben Scott wrote: > I figure this might come in handy for many: Cisco has published > mockups of all their SOHO router configuration web user interfaces. > > http://ui.linksys.com/ > > So when you boss/coworker/friend/family/etc. calls asking for help >

Re: Computing physical security entire family of locks compromised AT RISK when you stay in a hotel

2012-07-26 Thread Ben Scott
On Thu, Jul 26, 2012 at 12:36 PM, Andrew S. Baker wrote: > If I make a "secure door", and add a stupid convenience feature of > a big hole next to the doorknob so that you can reach in an easily > personalize the door -- but which hole also lets you circumvent the > security -- then that is just a

RE: My BriForum Presentation

2012-07-26 Thread Michael B. Smith
For all the North Americans out there: http://en.wiktionary.org/wiki/blagger From: Rankin, James R [mailto:kz2...@googlemail.com] Sent: Thursday, July 26, 2012 1:08 PM To: NT System Admin Issues Subject: Re: My BriForum Presentation I just worry I'll get exposed as a blagger :-) ---Blackberried _

Re: My BriForum Presentation

2012-07-26 Thread Rankin, James R
I just worry I'll get exposed as a blagger :-) ---Blackberried -Original Message- From: Daniel Chenault Date: Thu, 26 Jul 2012 17:00:47 To: NT System Admin Issues Reply-To: "NT System Admin Issues" Subject: RE: My BriForum Presentation After my first talk at the EDC in Austin I loved

Re: My BriForum Presentation

2012-07-26 Thread Andrew S. Baker
:) * * *ASB* *http://XeeMe.com/AndrewBaker* *Harnessing the Advantages of Technology for the SMB market… * On Wed, Jul 25, 2012 at 4:01 PM, Daniel Chenault < dchena...@lgnetworksinc.com> wrote: > Yer alright for sharing this. I don't care what ASB says. > > Daniel Chenault > dchena...@lgnetw

RE: Active Directory and Group Policy inheritance

2012-07-26 Thread Brian Desmond
Just make sure you don't write an inefficient filter that takes forever to process... Thanks, Brian Desmond br...@briandesmond.com w - 312.625.1438 | c   - 312.731.3132 -Original Message- From: Michael B. Smith [mailto:mich...@smithcons.com] Sent: Thursday, July 26, 2012 10:50 AM To: N

Re: Active Directory and Group Policy inheritance

2012-07-26 Thread Christopher Bodnar
Inheritance is an attribute of the OU, not of the GPO itself. what you need to do its to filter by WMI or security. One of those or a combination of both should give you what you are looking for. Christopher Bodnar Enterprise Achitect I, Corporate Office of Technology:Enterprise Architecture

Re: Wired entries in DHCP Servers

2012-07-26 Thread Stefan Jafs
ADC and DC1 are physical servers with 2 NIC's teamed, DC2 is a VM Stefan On Thu, Jul 26, 2012 at 10:38 AM, Stephen Holtz wrote: > Could be that the DC’s have second NIC’s and they are not statically > configured? > > ** ** > > *Stephen L. Holtz, MCSE, MCT* > Director of Information Technolog

RE: Active Directory and Group Policy inheritance

2012-07-26 Thread Michael B. Smith
I would use WMI filtering. -Original Message- From: Matthew W. Ross [mailto:mr...@ephrataschools.org] Sent: Thursday, July 26, 2012 11:36 AM To: NT System Admin Issues Subject: Active Directory and Group Policy inheritance Greetings. Is it possible to block a single group policy from be

RE: Active Directory and Group Policy inheritance

2012-07-26 Thread Jimmy Tran
I don't think you can block itbut you can maybe modify the security filtering so it only applies to the users you want it to? -Original Message- From: Matthew W. Ross [mailto:mr...@ephrataschools.org] Sent: Thursday, July 26, 2012 8:36 AM To: NT System Admin Issues Subject: Active Dir

Active Directory and Group Policy inheritance

2012-07-26 Thread Matthew W. Ross
Greetings. Is it possible to block a single group policy from being inheritance, or is my only choice to block all inheritance at the OU level? I want one policy blocked (A software installation policy, so I don't think I can override it somehow) in a Sub-OU, but I want everything else through.

Re: Computing physical security entire family of locks compromised AT RISK when you stay in a hotel

2012-07-26 Thread Ben Scott
On Thu, Jul 26, 2012 at 10:11 AM, Andrew S. Baker wrote: >> But assuming it's just a mechanism designed to bypass all the other >> security features -- e.g., for service by the manufacturer -- it very >> much is a case of security-through-obscurity. STO is information >> which, if disclosed, co

RE: Wired entries in DHCP Servers

2012-07-26 Thread Stephen Holtz
Could be that the DC's have second NIC's and they are not statically configured? Stephen L. Holtz, MCSE, MCT Director of Information Technology Addison Reserve Country Club 7201 Addison Reserve Blvd. Delray Beach, Fl. 33446 Ph: 561-455-1220 Cell: 561-441-0646 w

Re: Computing physical security entire family of locks compromised AT RISK when you stay in a hotel

2012-07-26 Thread Ben Scott
On Thu, Jul 26, 2012 at 9:07 AM, Ken Schaefer wrote: > Hmm - this isn't "security through obscurity" per se ... > This seems to be a code path that bypasses (or is designed to bypass) > the rest of the security options. The article does note that it doesn't > work on all locks - so maybe it's a bu

Re: Wired entries in DHCP Servers

2012-07-26 Thread Stefan Jafs
Static - Yes. On Thu, Jul 26, 2012 at 9:29 AM, Daniel Chenault < dchena...@lgnetworksinc.com> wrote: > Since they are servers the entries in DHCP are manually-entered static > entries and can be changed at will. > > ** ** > > They ARE static entries, right? Those servers are using assigned I

RE: Computing physical security entire family of locks compromised AT RISK when you stay in a hotel

2012-07-26 Thread Ziots, Edward
Yep, Hotel Wireless networks have been a hotbed of hacker community focus for a while. Also some high end hotels using Zigbee technology on door locks and codes which can be bypassed also. Josh Wright has published a lot on this subject: http://inguardians.com/pubs/toorcon11-wright.pdf Z Edwar

RE: Computing physical security entire family of locks compromised AT RISK when you stay in a hotel

2012-07-26 Thread Ken Schaefer
Hmm - this isn't "security through obscurity" per se - a hotel guest can't get access to a room by randomly trying to guess the value that gives them access for the next 24 hours (i.e. the value that would be encoded onto your card if you actually have a valid reservation). This seems to be a c

Re: Computing physical security entire family of locks compromised AT RISK when you stay in a hotel

2012-07-26 Thread Ben Scott
P.S.: On Thu, Jul 26, 2012 at 8:33 AM, Ben Scott wrote: > I long ago gave up any hope that companies will learn from the > mistakes of others. Or their own, for that matter. While we're on the subject of card locks, the 125 kHz proximity cards used by a huge number of places for their lo

Re: Computing physical security entire family of locks compromised AT RISK when you stay in a hotel

2012-07-26 Thread Ben Scott
On Thu, Jul 26, 2012 at 1:34 AM, Kurt Buff wrote: > http://www.extremetech.com/computing/133448-black-hat-hacker-gains-access-to-4-million-hotel-rooms-with-arduino-microcontroller > > A hacker publicly demonstrated how criminals can easily break into any > of four million hotel rooms in the USA. F