-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Am Donnerstag, 8. November 2001 18:51 schrieben Sie:
> I am running IPChains with portsentry on mandrake 8.1 and I was trying
> to find the logs for IPChains? Where would these be stored? I have
> looked in /var/log but I am not seeing much. Thanks
No, CheckPoint NG is still on Solaris. I havent heard of any plans on
moving away.
On Thu, 2001-11-08 at 17:45, Staci Marcum wrote:
>
> Hi All,
> Could anyone tell me if they have heard that Checkpoint is going to stop
> supporting solaris?
>
>
> Thanks,
> Staci
--
Nick
Network Security
Create a file and encrypt it using 3DES with a 10char+ passphrase.
-Original Message-
From: Nick Lehman [mailto:[EMAIL PROTECTED]]
Sent: Thursday, November 08, 2001 5:31 PM
To: [EMAIL PROTECTED]
Subject: Secure password storage?
Hi there,
Curious what others are using for secure passwo
Should be in your /psionic/portsentry folder in the logs there
Tech Resolution
The complete IT solution for your small business
[EMAIL PROTECTED]
-Original Message-
From: Tommy F. [mailto:[EMAIL PROTECTED]]
Sent: Thursday, November 08, 2001 12:52 PM
To: [EMAIL PROTECTED]
Subject: IPCha
Hi Mark,
Mark Medici wrote:
*snip*
> My questions are:
>
> a.) Is there anyway to use AOL without opening a tunnel for unknown
> and unmonitored external traffic? I.e., are all the features of
> AOL (e-mail, AOL-only content, etc...) available using only a
> web browser?
In
You couldn't use posix because you would have removed all reference to POSIX
when locking down IIS
-Original Message-
From: Rj Subramanian [mailto:[EMAIL PROTECTED]]
Sent: Thursday, November 08, 2001 7:50 PM
To: [EMAIL PROTECTED]
Subject: RE: Location of web root
Hey all,
Directory tr
On Monday 05 Nov 2001 5:54 pm, [EMAIL PROTECTED] wrote:
> Hello All,
> My question is does anyone have any recommendations on an IDS that is
> easy to manage and not to pricey. What I am looking for in the IDS
> features is to have it e-mail or if possible send a Text Page to a cell
> phone or p
At 08:46 PM 11/08/2001 -0500, Mark Medici wrote:
> >From what I've found so far, it seems that the AOL client program, when
>installed, also installs something called the AOL Network Adapter. I've
>seen this on some client machines, and always wondered what it was
>doing. Now I realize that it i
How? Is this with the use of snmp, or a partner product that hooks in with
it?
/Shawn
"Chris Chandler" <[EMAIL PROTECTED]> on 11/03/2001 10:42:31 PM
To: "'Curme, Elizabeth'" <[EMAIL PROTECTED]>; "'leon'" <[EMAIL PROTECTED]>;
<[EMAIL PROTECTED]>; "'tony toni'" <[EMAIL PROTECTED]>
cc:
Lotus Sametime.. But you incur the expense of a Domino license. I've
also had good success with Netmeeting with both parties being behind
firewalls.
Cavell McDermott
Domino Admin
APW Ltd. - Texas Campus
214-343-1400 - Main
214-355-2039 - Helpdesk
214-341-9950 - Fax
http://www.apw.com
For event viewer messages use technet. www.microsoft.com/technet
I use the IIS Exception monitor to determine reasons for IIS hangs and
crashes. This util can be downloaded from Microsoft or also comes with the
Technet CD's.
Dave
>From: "Kristofer Mcconnell" <[EMAIL PROTECTED]>
>To: [EMAIL
Hello,
I have a similar problem with a used kiosk system my company bought form
a dot-bomber. It's called an iBrow. To complicate things, this system
also has a security chip in it like many notebooks now use. Any idea's
on how to get this password reset? I have searched the net, however it
se
If your (NT) server has had the posix and os/2 subsystems removed, they'd
have problems. I believe Microsoft released an update on this as it was a
major security loophole.
Mike
-Original Message-
From: Rj Subramanian [mailto:[EMAIL PROTECTED]]
Sent: Friday, November 09, 2001 12:50 AM
To
on 11/8/01 2:37 PM, Karel Jennings at [EMAIL PROTECTED] wrote:
> Hello, I was recently working on a remote server, playing with mysql.
> Anyway. I wanted to see what ports were open, and nmaped the box.:) They
> machine had portsentry running, and it dropped my connection *AND* put my ip
> in the
Well, PortSentry will alert you via syslog of it's action, so you can view
the operation as the software immediately reacting and then letting you take
appropriate steps for a long-term solution. You can turn this feature off if
desired, and in fact, I usually do.
One big issue is that it would b
Thank you all for the Quick responses,
I have been doing a lot of reading and even more research. I have
also contacted a few resellers of IDS products. Has anyone out there
heard of iSensor by Secure Works. I have hard a little about it and was
wondering a few things. I hear that all traffi
Hello!
I've got to build a Linux Bridge for my Packetsniffer, because my
Switch has got no Monitoring Port...
Now I'd like to know where I could get some problems and where the
disadvantage is compared to the Monitoring Port.
Best regards,
Marc
Hi all :))
I've started the audit of the active directory win 2k server of our
company, but I will need some recommandation or guidelines to check that
I haven't forgot anything.
Thanks a lot for your answers.
francois
_
Do You Yahoo
Kristofer,
If you are looking for something to parse event logs i know there is
a perl module for that and iv seen quite a few free utilities when searching
on google. Im not much of an NT administrator but i would start by looking
in the event logs and make sure you are completely up to
Hi. I was reading about the advantage to use Snort whit other soft (like
mysql) to build a real IDS. I did download the latest stable Snort version,
whit all the libraries that require. I did make the whole process of
installation but something is wrong whit the libpcap***. I know I am doing
s
You may wish to use Cyber Safe Log Analyst (CLA) at cybersafe.com. This
may also be obtained from the resource kit CD rom
John Bivins MCSE,mct,A+ qrstuvmickeymouse
Systems Analyst
Integic Corporation
Try to use Transcend(3Com), Sniffer(NAI) or CiscoWorks.
Rgs
Kleber Oliveira
Milk <[EMAIL PROTECTED]> wrote:
>Try using Ethereal
>
>--- Jacques Chicourel Nunes Vaz - BA
><[EMAIL PROTECTED]> wrote:
>> Hi folks,
>>
>> I have a Lan with 200 desktops and I´d like to sniff
>> it. What tool can
Dear all,
I'm a little bit embaressed to ask this trivial
question but I scanned vainly the Internet to find an
answer and I have to solve it quickly.
I'm the administator of Linux RedHat system (only one
computer) and I have to allow a user (I have recently
created his account on the this Linux
Hello,
Is there anyone can telling me how to make SNMP and ICMP traffic secure?
because I
thought if I disallowed all snmp and icmp traffic in my network I will get
headache
if I have to checking connection when the network problem occur, thank's.
Do I wrong if I configure every device with policy
I was interested if anyone knew of any "specific" case examples where low level
encryption (ie 40bit or lower) has been insufficient to accommodate in the safe
passage of financial data to and from clients.
Are there any bonafied/well known corporate examples where someone externally
has '
Hi all,
Is there a way to encrypt passwords for Outlook & FTP? I ran a sniffing
tool & it was able to detect the passwords for POP3 clients,FTP & HTTP
requests.!! Can someone tel me how to encrypt passwords for these tools?
Thanx in advance.
Ali
Hello,
I looking for software for Single Sign On and One Time Password solution for
my company, does anyone know which software that I need to used or the best
one ?
Because I will implemented that requirement in many platform ( Win9x, W2K,
AS/400, OS/390, ) and each platform have limited features
27 matches
Mail list logo