Comments inline
-Original Message-
From: leon [mailto:[EMAIL PROTECTED]]
Sent: Monday, September 24, 2001 12:42 PM
To: [EMAIL PROTECTED]
Subject: outlook 2002 is a control freak
I have a friend who is sending me attachments that are
executable. Seems M$ decided to make it
I am using IKE. Later tonite I will incorporate portforwarding of the
traffic that needs to be mapped to my internal client. Seems to be logic
so I guess it will work since keyexchange is already workings :)
Thanks for the help.
-J-
---
Whatever hit you - don't look back.
On Fri, 28 Sep 2001,
You get a lot of these C programs under packetstorm securify site.Even you
can do this on your own with random IP addresses.
Bye
DRajesh
- Original Message -
From: Pradeep Kumar [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Monday, October 01, 2001 1:07 AM
Subject: Syn Flood generator
In my point of view, the fact that a firewall do stateful inspection is good in
some points but it leave an open session between the client and the server. I
much prefer an application proxy firewall that break the session. I do agree
with Phil as well, even 1 sec. is noting compare all
Thus spake Pradeep Kumar, on Sun, Sep 30, 2001 at 12:37:56PM -0700:
Folks
Does any know any tool which can generate Syn Floods / DoS attacks.
This is for lab testing purposes.
You should check the libnet homepage:
http://www.packetfactory.net/libnet/
It has some usefull tools and libnet
Hi,
Please help me to do the professional security steps for apache web
server.
Thanks in advance.
Hi to all;
I'm new to Firewall (FW-1).
I'm wondering why I can't download large amount of
files from the net, and why is it that some sites our
being blocked by the FW e.g. hotmail.com.
Thanks,
Aldous
__
Do You Yahoo!?
Listen to your Yahoo! Mail
I need to disable the users being able to see and/or get access to the local
hard drive typing in for Netscape 4.7 file//c:. Is there anyway that I
havent seen in the Netscape properties, reg hack? I ahve seen on old
Netscape 2.1 stuff changing the .exe
Thanks
Jason
Here is three places off hand
http://www.networkice.com/advice/default.htm
http://www.simovits.com/nyheter9902.html
http://www.sans.org/newlook/resources/IDFAQ/oddports.htm - really slow right
now
-Original Message-
From: Staci Marcum [mailto:[EMAIL PROTECTED]]
Sent: Monday, October
Well, depending on your budget and what you want/need, Antara makes a
product called Flamethrower. It's a hardware solution that also tests HTTP
servers and the like.
http://www.antara.net
Or you can try the software based Hailstorm product from:
http://www.hailstorm.net
They are expensive
http://www.simovits.com/nyheter9902.html, it is a little dated, but it is
start..
hope this helps
/m
At 02:28 PM 10/01/2001 -0400, Staci Marcum wrote:
Does anyone know of a site that lists ports and corresponding
vulnerabilities? Any help would be much appreciated,
Staci
With the advent of turbo access-loist the performance is not degraded on a
router, whne compared with a pix. The main reason to use the PIX is the
logs. The pix gernertes much better logs than the routers. It is easier to
track what is going on. Plus the PIX has some IDS code in it and dose match
nmap is a portscanning tool, not a syn flood/dos program.
-Original Message-
From: Shackleford, Dave M. [mailto:[EMAIL PROTECTED]]
Sent: Monday, October 01, 2001 02:54 PM
To: 'Pradeep Kumar'; [EMAIL PROTECTED]
Subject: RE: Syn Flood generator / Dos Attack generator
NMAP.
On Tue, 2 Oct 2001, Don Weber wrote:
Hiya,
this is the only thing i've found so far for windows, if you find anything
else let me know i'd like other options myself. not sure if you can use this
to report to unix tho
I placed a space after the www. below to break the link
http://www.
I agree with your statements below, however to get in a router configured in
the same performance 'league' as a pix with ACLs (and potentially the
firewall feature set to do stateful inspection), you need to get a fully
loaded 7200 VXR series (or equivelent from a vendor other than Cisco) which
I know this is an emotional issue for many, but I was wondering...
1. Does anyone block web-based email?
2. If so, what justifications have you used?
3. If so, how long has this been a practice - and do you feel as though you were
successful?
TIA,
JLP
Would you happen to be using DHCP?
Sometiems a user will register their ip with something like uh, whats it
called, audiogalaxy, then will auto try their ftp, i didnt take the time
to dns these hosts, but thats what might be doing, or just someone tring
to connect to it to download something.
Yep, here it is:
http://xforce.iss.net/static/7126.php
- Original Message -
From: Kutulu [EMAIL PROTECTED]
To: Lorenz Inglin [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Monday, October 01, 2001 1:25 PM
Subject: Re: Increasing amount of ftp 'anonymous' attempts
At 07:57 PM
Hello,
This is a message sent out to discover poorly configured vacation
programs. Please do not respond to this message. If you wish to respond
asking me to remove you from a list, please read the below instructions
first. The example below is for the Security-Basics list; however, in
order to
The official nmap for NT is available @ www.insecure.org and it is
completely different than the one from eEye.
Nice thing, it has a graphical interface for those of you who prefer. But is
has some deficiencies as well, it cant
scan the local box, 127.0.0.1 , and some other tiny problems, but
this is the only thing i've found so far for windows, if you find anything
else let me know i'd like other options myself. not sure if you can use this
to report to unix tho
I placed a space after the www. below to break the link
http://www. winsyslog.com/en/
-Original Message-
From:
Following you Message,
No I am sorry to say how wrong you are, there are 7 viruses contained within
this program, and all the mirrors are exact copies. This program loads the
viruses onto you machine and then allows you to transmit them whilst in IRC.
The virus profiling was checked by McAfee,
22 matches
Mail list logo