power password prank

2001-11-05 Thread sari sari
Ok, so then when your home pc firewall gives you a report of a portscan from an address from within those ranges despite your not having an intranet how do you find its real source? The proxy server for this cable modem is on the 10.x.x.x range but I have had 192.168.x.x attempts on my pc. I am

Location of web root

2001-11-05 Thread Daymon McCartney
Greetz, I have a spyware program sending something to some http server somewhere on some machine here. I would like to find out what it's posting to that server. Is there a util somewhere that I can use for this. Something that will sort of work like this: 1. I will put in my hosts file an ip

RE: Windows NTFS Authentication Caching

2001-11-05 Thread Mark L. Jackson
Can anyone recommend a good product that will monitor users traffic and activity on the servers? I have too many users logging onto the servers and I need a tool that will allow me to monitor more closely. Thank you. _ Get your

Email Encryption Software

2001-11-05 Thread Vincent Goh
The first major points about placing the wwwroot in a non-standard location is for the Directory Traversal exploit as you've brought up already. Many exploits will either rely on, or look for default settings like placing your websites in the c:\inetpub\wwwroot directory. The way that I

RE: IDS White Papers/Documents

2001-11-05 Thread tommy . d . gast
Actually you hit it right on the button and i'll tell you why. Having your webroot folder in a seperate location from where the default installation protects you from a world of silly exploits and rediculous script kiddie wanna be hacker attacks. This would be the primary reason because if u