RE: SMTP alternative

2001-10-23 Thread Dustin Puryear
You didn't specify if you are hosting your own mail server for inbound mail, or if your POP3 users are hitting this box or another one. If you are hosting all of your mail here then you need to run something. If this is your firewall then setup another box running a mail server and forward SMTP

RE: Detecting weak passwords free tool

2001-10-23 Thread dumbwabbit
lc isn't free. but it DOES work very well... i insisted that we purchase it for my it dept. - we use it on a monthly basis. --- Robert Clark [EMAIL PROTECTED] wrote: Lophtcrack Robert Clark MCSE, MCP+I, MCP, A+ MIS - Texas Cellular -Original Message- From: Javier Palomares

Re: W2K where to start??

2001-10-23 Thread MURAT GÜLCÝ
www.labmice.net u can find all about w2k. From: Michael Bartosh [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: W2K where to start?? Date: Sun, 21 Oct 2001 01:37:02 -0600 Hi- I'm a unix / Mac guy. I agreed to set up a test installation of W2K Advanced Server because the M$ rep has always

Re: W2k where to start??

2001-10-23 Thread Ash
[humor] First login either by administrator or tricking the administrator into running a program that executes a script to give you admin access (very simple ...). Then, format C:\ and all other drives. Go to a computer store and buy FreeBSD or Linux. Install. You should be pretty safe now.

Re: Strange email...

2001-10-23 Thread Tony Abedini
It could've been spoofed by telnetting to port 25 of the email server. It works both in UNIX and Windows! --- Fab Siciliano [EMAIL PROTECTED] wrote: Hi All. I just got a pretty weird email. No sender, No subject, dated Wed, Dec 31 18:59:59 1969. Someone found a relay i take it? Can

Re: How can I catch IP packet content ?

2001-10-23 Thread aman
Hi all How can I sniff only the packets destined from and to a single IP using tcpdump or ethereal? Thank you Aman

RE: IPspoof in firewall logs

2001-10-23 Thread Deon Grobler
thats just it... it wasnt any of my IP's :) but apparently one the little MCSE's here incorrectly configured a 2nd NIC...hence the spoof. And hence me not getting why it was spoofing a NAT addy which I never had on my network :) -Original Message- From: TD - Sales International

SonicWall??

2001-10-23 Thread Chris Hunt
Is there a SonicWall user's forum (unofficial)? The Mfg does not support a official group. Chris

Re: Strange email...

2001-10-23 Thread Jason Kohles
On Sun, Oct 21, 2001 at 09:27:42PM -0400, Fab Siciliano wrote: Hi All. I just got a pretty weird email. No sender, No subject, dated Wed, Dec 31 18:59:59 1969. Someone found a relay i take it? Can you change the date field when sending through a mail relay? The date header is

Re: Encryption for FTP/MAil/Web

2001-10-23 Thread virtualphil
As I said earlier, F-Secure's commercial offering encrypts the entire session including the data through the tunnel and is available for Windows. This probably is not the case with openssh. Phil - Original Message - From: Christian Mengler [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent:

RE: W2K where to start??

2001-10-23 Thread leon
How about starting with installing service pack 2, then getting all necessary hot fixes? M$ makes a program called Hfnetchk that should be able to check the system to make sure it is up to patch par. Cheers, Leon -Original Message- From: Michael Bartosh [mailto:[EMAIL PROTECTED]]

RE: SAM Auditing Tool

2001-10-23 Thread leon
Why not just turn on auditing in windows I know that is maybe simpler then you were thinking but you can audit successful logons which is what you were asking for help with in your post. Cheers, Leon -Original Message- From: George, Jason [mailto:[EMAIL PROTECTED]] Sent:

RE: Good Idea?

2001-10-23 Thread leon
Why does the worm stop after it cant get past the first contact? Wont it just continue That is my question to the question. Regards, Leon -Original Message- From: Aaron Laudi [mailto:[EMAIL PROTECTED]] Sent: Wednesday, October 17, 2001 1:40 PM To: security-basics Subject: Good

Re: Penetration testing

2001-10-23 Thread limon
The Open Source Security Testing Methodology Manual might be a start. http://uk.osstmm.org/osstmm.htm -tuanis On Mon, 22 Oct 2001, Security wrote: To all, I am trying to develop a document outlining penetration testing for a whole year, which would also need to be broken down into each

permission for nero

2001-10-23 Thread SF_Mailinglist
Hi guys, I need your help. I have some CD-writer with Nero-Burning ROM as software. My OS is Windows 2000. For security reasons I the users to be in the Users/PowerUsers groups. I get a message that they don't have enough permissions. I cannot give them administrative privileges. The software

RE: Detecting weak passwords free tool

2001-10-23 Thread leon
Can't the old freeware version of l0pht do this? If not John the Ripper definitely can. Not sure if this has been answered as I am a little behind on my reading. Cheers, Leon -Original Message- From: Javier Palomares Lopez [mailto:[EMAIL PROTECTED]] Sent: Wednesday, October 17, 2001

RE: t0rn help and questions...?

2001-10-23 Thread leon
I know there is an exploit for certain versions of SSH. I am sure if you look around SF you can find out if you are vulnerable or not. Methinks that is probably how the 1 exploit having monkey got in. 1 exploit in the sense that he nailed your friend with his one l33t sploit and then began to

Re: Penetration testing

2001-10-23 Thread Matt Hemingway
Just try to put yourself in an outsiders shoes. Pretend like you know *nothing* about your network. Tools like nmap, nessus, saint, sara, fping and the like work great together in security auditing. -matt On Mon, 22 Oct 2001 08:17:53 -0700 (PDT) Security [EMAIL PROTECTED] wrote: To

Win2k VPN IN the DMZ or NOT

2001-10-23 Thread Martin Smith
For security should the VPN ISDN and Internet tunneling be located on the DMZ between two firewalls Different vendors , located behind firewall or on the DMZ in front of the firewall. Thank you for your help Marty

weird IE behaviour..

2001-10-23 Thread Lord Soth
Hi all, Just tonight I was surfing the web looking for stuff when I noticed that when I opened a new browser window (I'm using IE 5), the homepage was not the one I usually have. I set my homepage to be http://directory.google.com/ in my internet properties, and then I found that it starts on

CISSP (was: Re: Respected Security Certifications

2001-10-23 Thread Meritt James
Here are a few articles on CISSP that were online when I last checked: 1. Testing Your Mettle: The Six-Hour, 250-Question CISSP Exam at http://certcities.com/editorial/exams/story.asp?EditorialsID=25 2. Secure With Your Security Pros' at

VPN Question

2001-10-23 Thread Pieter Paulson
Hi, I am trying to figure out how to use certificates to validate users and set up specific security associations and policies using IPSEC and ISAKMP under OpenBSD. Specifically, I am trying to figure out what options need to be set in the certificates that I issue to the users and how I set

RE: Sharing Folders

2001-10-23 Thread Mervin, Chris
I suppose in a purely technical sense that's true. However that will only work for a login script or manually setting the time. I was referring to things that use Network Time Protocol and synchronize the time *automatically* at given intervals. Merv -Original Message- From: Frank