You didn't specify if you are hosting your own mail server for inbound mail,
or if your POP3 users are hitting this box or another one. If you are
hosting all of your mail here then you need to run something. If this is
your firewall then setup another box running a mail server and forward SMTP
lc isn't free.
but it DOES work very well...
i insisted that we purchase it for my it dept. - we
use it on a monthly basis.
--- Robert Clark [EMAIL PROTECTED] wrote:
Lophtcrack
Robert Clark
MCSE, MCP+I, MCP, A+
MIS - Texas Cellular
-Original Message-
From: Javier Palomares
www.labmice.net
u can find all about w2k.
From: Michael Bartosh [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: W2K where to start??
Date: Sun, 21 Oct 2001 01:37:02 -0600
Hi-
I'm a unix / Mac guy. I agreed to set up a test installation of W2K
Advanced Server because the M$ rep has always
[humor]
First login either by administrator or tricking the administrator into
running a program that executes a script to give you admin access (very
simple ...). Then, format C:\ and all other drives. Go to a computer
store and buy FreeBSD or Linux. Install. You should be pretty safe now.
It could've been spoofed by telnetting to port 25 of
the email server. It works both in UNIX and Windows!
--- Fab Siciliano [EMAIL PROTECTED] wrote:
Hi All.
I just got a pretty weird email. No sender, No
subject, dated Wed, Dec 31
18:59:59 1969.
Someone found a relay i take it? Can
Hi all
How can I sniff only the packets destined from and to a single IP using
tcpdump or ethereal?
Thank you
Aman
thats just it... it wasnt any of my IP's :)
but apparently one the little MCSE's here incorrectly configured a 2nd
NIC...hence the spoof. And hence me not getting why it was spoofing a NAT
addy which I never had on my network :)
-Original Message-
From: TD - Sales International
Is there a SonicWall user's forum (unofficial)? The Mfg does not support a
official group.
Chris
On Sun, Oct 21, 2001 at 09:27:42PM -0400, Fab Siciliano wrote:
Hi All.
I just got a pretty weird email. No sender, No subject, dated Wed, Dec 31
18:59:59 1969.
Someone found a relay i take it? Can you change the date field when sending
through a mail relay?
The date header is
As I said earlier, F-Secure's commercial offering encrypts the entire
session including the data through the tunnel and is available for Windows.
This probably is not the case with openssh.
Phil
- Original Message -
From: Christian Mengler [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent:
How about starting with installing service pack 2, then getting all
necessary hot fixes? M$ makes a program called Hfnetchk that should be
able to check the system to make sure it is up to patch par.
Cheers,
Leon
-Original Message-
From: Michael Bartosh [mailto:[EMAIL PROTECTED]]
Why not just turn on auditing in windows
I know that is maybe simpler then you were thinking but you can audit
successful logons which is what you were asking for help with in your
post.
Cheers,
Leon
-Original Message-
From: George, Jason [mailto:[EMAIL PROTECTED]]
Sent:
Why does the worm stop after it cant get past the first contact? Wont
it just continue
That is my question to the question.
Regards,
Leon
-Original Message-
From: Aaron Laudi [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, October 17, 2001 1:40 PM
To: security-basics
Subject: Good
The Open Source Security Testing Methodology Manual might be a start.
http://uk.osstmm.org/osstmm.htm
-tuanis
On Mon, 22 Oct 2001, Security wrote:
To all,
I am trying to develop a document outlining penetration testing for a whole
year, which would also need to be broken down into each
Hi guys,
I need your help. I have some CD-writer with Nero-Burning ROM as software.
My OS is Windows 2000. For security reasons I the users to be in the
Users/PowerUsers groups. I get a message that they don't have enough
permissions. I cannot give them administrative privileges. The software
Can't the old freeware version of l0pht do this? If not John the Ripper
definitely can. Not sure if this has been answered as I am a little
behind on my reading.
Cheers,
Leon
-Original Message-
From: Javier Palomares Lopez [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, October 17, 2001
I know there is an exploit for certain versions of SSH. I am sure if
you look around SF you can find out if you are vulnerable or not.
Methinks that is probably how the 1 exploit having monkey got in. 1
exploit in the sense that he nailed your friend with his one l33t sploit
and then began to
Just try to put yourself in an outsiders shoes. Pretend like you know *nothing* about
your network.
Tools like nmap, nessus, saint, sara, fping and the like work great together in
security auditing.
-matt
On Mon, 22 Oct 2001 08:17:53 -0700 (PDT)
Security [EMAIL PROTECTED] wrote:
To
For security should the VPN ISDN and Internet tunneling be located
on the DMZ between two firewalls Different vendors , located behind
firewall or on the DMZ in front of the firewall.
Thank you for your help
Marty
Hi all,
Just tonight I was surfing the web looking for stuff when I noticed that
when
I opened a new browser window (I'm using IE 5), the homepage was not the
one I usually have.
I set my homepage to be http://directory.google.com/ in my internet
properties,
and then I found that it starts on
Here are a few articles on CISSP that were online when I last checked:
1. Testing Your Mettle: The Six-Hour, 250-Question CISSP Exam at
http://certcities.com/editorial/exams/story.asp?EditorialsID=25
2. Secure With Your Security Pros' at
Hi,
I am trying to figure out how to use certificates to validate users and
set up specific security associations and policies using IPSEC and ISAKMP
under OpenBSD. Specifically, I am trying to figure out what options need to
be set in the certificates that I issue to the users and how I set
I suppose in a purely technical sense that's true. However that will only
work for a login script or manually setting the time. I was referring to
things that use Network Time Protocol and synchronize the time
*automatically* at given intervals.
Merv
-Original Message-
From: Frank
23 matches
Mail list logo