create a service that runs the nero executable - run the service with
the local admin (localsystem might work, too). Then grant the users
Start/Stop/Pause permissions for the service.
sean
-Original Message-
From: SF_Mailinglist [mailto:[EMAIL PROTECTED]]
Sent: Monday, October 22, 2001
I want to deploy the Linux "free" version of Tripwire to 10-20 servers,
but I want to have it done in a way I could just as easily do it for 100.
Any tips how to automate this using a combination of shell scripts,
rsync, ssh, and other standard tools would be appreciated. My guess is
if I copy
Xander Soldaat wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Hello,
>
> I ran an nmap scan on my newly installed Windows XP box and it showed an
> open port a 5000/tcp. Does anyone know what this port does? I can telnet to
> it and type whatever I like, nothing happens. Nmap think
http://www.nsa.gov has several "books" that help to harden W2K. That =
might
also be a good starting point.
Samuel Harris
-Original Message-
From: MURAT G=DCLC=DD [mailto:[EMAIL PROTECTED]]
Sent: Monday, October 22, 2001 1:50 PM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: Re: W2
May have happened when you opened another webpage...maybe they asked you
if you wanted to set bessybug.com as your homepage? Or...it could be
someone using you as a guinea pig for an exploit? Something along these
lines I think...or just somebody messing with you...:)
> -Original Message-
MS Technet is also quite nice...
www.microsoft.com/technet/
On Mon, 22 Oct 2001, Ash wrote:
>[humor]
>
>First login either by administrator or tricking the administrator into
>running a program that executes a script to give you admin access (very
>simple ...). Then, format C:\ and all other dr
This is an old hoax (see
http://vil.mcafee.com/dispVirus.asp?virus_k=99213characteristics). The
worm will not stop after the first contact. However, you will get a
bounce-back message from the bogus address so you will know you've been
infected.
LMcQ
Laurie McQuillan, CISSP
Program Manager,
Jay D. Dyson's e-mail of 21 October 2001 18:33 stated:
>-BEGIN PGP SIGNED MESSAGE-
>
>On Fri, 19 Oct 2001, R.H. Cotterell wrote:
>
>> Short answer. yes, it will work. You can also commence with a . or two
>> (period or dot sign). BTW, this is old hat. :-)
>
> What proof do you
I have been in a similar situation, and have been using Webtrends with mixed
results. Webtrends offers very good graphing, reporting, etc. But I have
found two problems with this setup.
First, since the firewall logs IP addresses rather than user names of the
clients, you cannot be sure who the u
Hmm nifty date, PC clocks start at 1 january 0:00 1970
On Monday 22 October 2001 03:27, Fab Siciliano stuffed this into my mailbox:
> Hi All.
>
> I just got a pretty weird email. No sender, No subject, dated Wed, Dec 31
> 18:59:59 1969.
>
> Someone found a relay i take it? Can you change
Try http://www.techrepublic.com
They usually have a bunch of stuff like that, and most of it is free.
You just need to subscribe to their e-mail newsletters (not all, just
the ones you want).
Robert Clark
MCSE, MCP+I, MCP, A+
MIS - Texas Cellular
> -Original Message-
> From: Security [
fyi-
from pen-test:
Date: Mon, 22 Oct 2001 11:30:06 -0600 (MDT)
From: Alfred Huger <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Article on Full Disclosure
Hey folks,
As most of you know recently MS released a paper about Full Disclosure and
responsible disclosure. Both of these issues u
net time can still accomplish that goal easily. Simply use the "at" command
and schedule it, which fits outside the realm of a login script and manual
use as well.
-Original Message-
From: Mervin, Chris [mailto:[EMAIL PROTECTED]]
Sent: Monday, October 22, 2001 6:06 PM
To: '[EMAIL PROTECT
tcpdump host
On Mon, 22 Oct 2001, aman wrote:
> Hi all
> How can I sniff only the packets destined from and to a single IP using
> tcpdump or ethereal?
> Thank you
> Aman
The better way to access the Internal Resources are using the VPN-1
(Securemote)
Them created you will act as a part of your internal Network.
-Mensagem original-
De: Michael R. White [mailto:[EMAIL PROTECTED]]
Enviada em: segunda-feira, 22 de outubro de 2001 11:24
Para: Security-Basics
I believe that you have to be an administrator or equivalent to be able
to use this software.
> -Original Message-
> From: SF_Mailinglist [mailto:[EMAIL PROTECTED]]
> Sent: Monday, October 22, 2001 3:28 PM
> To: [EMAIL PROTECTED]
> Subject: permission for nero
>
>
> Hi guys,
> I need
Tony,
For Firewall log reporting Webtrends is pretty comprehensive in this
department. For health checks on the firewall daemon, you will need another
product. I have looked at BMC Patrol for Checkpoint FW which seems to have
the features we may require for system managment / performance / healt
1) I concure with Mr. Woody, I suggest that you learn how to improve
"reference skills". Don't feel to bad. Most people don't have them and
because of that have major problem using libraries, the internet and other
store houses of knowledge. It is a
learned art and is a skill that helps shortens t
usrstat from the Win2K resource kit will tell you last login...
|-Original Message-
|From: Dustin Puryear [mailto:[EMAIL PROTECTED]]
|Sent: Monday, October 22, 2001 12:36 PM
|To: George, Jason; [EMAIL PROTECTED]
|Subject: RE: SAM Auditing Tool
|Sensitivity: Private
|
|
|Jason, turn on au
Im a linux user on a desktop system, but I will soon be getting the questions from
friends and family concerning winXP. How does it compare from a security prospective
compared to win2k?
On Mon, 22 Oct 2001 10:49:32 -0500
"Dustin Puryear" <[EMAIL PROTECTED]> wrote:
> Well, Windows is no more
On 22 Oct 01, at 18:06, Mervin, Chris wrote:
> I suppose in a purely technical sense that's true. However that will only
> work for a login script or manually setting the time. I was referring to
> things that use Network Time Protocol and synchronize the time
> *automatically* at given interva
On Mon, Oct 22, 2001 at 11:28:41AM +1100, Christian Mengler wrote:
> Hey,
> I've been looking into FTP encryption for the last few dayz, I found that
> SSH only encrypts the authentication process, but not the transfering of
> data.
Huh? Then why is it when I use SCP to copy files between two ma
hi ..
i have one win98 and 1 win2k professional setup
(without IIS) which are trying to continuously access
the windows update site for a file 'ident.cab'. the
connection is trying to use a http_head .
i have searches for it on the net but havnt been able
to locate anything useful as to how to d
On Mon, Oct 22, 2001 at 08:47:38AM +0200, Andreas Heinlein wrote:
> Hello,
>
> I would be interested in setting up a HTTP-Proxy (Squid on Linux) that uses https
>(SSL-
> encryption) between client and proxy, no matter whether the server uses https or
>plain http.
>
> Is this possible? Is ther
> Start at the vendor's site http://www.microsoft.com/security.
just remember where the info is coming from. MS is not open about
security issues.
> >I'm a unix / Mac guy. I agreed to set up a test installation of W2K
> >Advanced Server because the M$ rep has always been nice.
I would advise r
What do you need a SMTP server for if you aren't gonna be able to reach it?
Anyways, I believe sendmail can be started from inetd but arrghh that's a
daemon :-) you can also use it from the comandline I don't see the use tho'
you'll have to be logging in each and every time if you want to use it
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Thanks to everyone who replied to me, both on the list and off-line.
It seems that the port in question is opened by the UPnP service. It does
not seem to be vulnerable to the same thing as the WindowsME one, thank
God.
Stopping the SSDP service doe
Hi,
I am trying to ind out some comparison on CyberGuard Firewall/s and
Sidewinder (from Secure Computing).
Any links, information from you will be appreciated.
Cheers,
Sameer
28 matches
Mail list logo