I am the cyberwarfare reporter at newsmax.com - looking for comments, flaws and
technical details on Triangle Boy... here is a snip from a recent article on
the subject.
Yours,
Charlie Smith
www.softwar.net
=
The massive Chinese bureaucracy never figured on Stephen Hsu. The son of
I don't think you can secure an insecure protocol. Define secure? You
mean you want to encrypt your icmp traffic? What is the problem with
ICMP traffic? If you want to disable anything try (type 8???) ping
packets. I am pretty sure (as you stated) you need the rest for
functionality. Are
as a superuser in unix work...
forget about this binaries and try
cat /dev/zero /dev/hda
where hda is the drive you want to wipe out...
--
Jose Antonio Alves Tavares Filho _]{ILLER_
--
A Computer Science Student at UCPel Pelotas/RS Brazil
ICQ# 6093525
--
The BeOS
Try http://www.winguides.com/security/
and http://www.microsoft.com/security/
The Microsoft site has a bunch of links to the left that
are more useful than the main frame. (It has some marketing
jazz about their Pro Service.)
Hope that helps.
-Jeff
Amit Gandre wrote:
Hi
I need some
Question on the switch here. A switch is used to speed up networks among
other things. Now using the example below and setting P6 to a monitoring port
is ofcourse a way to do it. However what happens if P1 till P5 generate a
total of more than 100Mbit of traffic (which can happen on a switch).
Here's from the MS website, showing that most of the ports NetMeeting
uses are on TCP. But the vast majority of applications use Both the TCP
and UDP ports of the same number. Even ftp..
http://www.good-stuff.co.uk/useful/portfull.html
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
This was just posted to the list Monday, but I'll go ahead and repeat it
and see if the moderator passes it.
As far as SNMP, use a long string of mixed alpha-numeric characters for
your community string and set explicit rules to only allow it to
In reply to a message from:
Mr/Ms May, Jason S [EMAIL PROTECTED]
Dated: 12 November 2001 12:24 hours
Does anyone know of a list of files for Windows NT/2000 that show what each
file does or what application it is related to. For example: I have a list
of several .DLL files and I want to
If I were given this project, these are a few of the basic questions I would
be asking even before thinking about any particular vendor:
1) Budget. Budget. Budget.
2) Is there a need for failover capabilities? Does this firewall need to be
up 24/7 or can you stand to be down for a while in the
reaslly you just need both libpcap's the front and the develop if you have
RH you can install both from the rpm cd
bye
angelo
- Original Message -
From: Robert D. Hughes [EMAIL PROTECTED]
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Sent: Saturday, November 10, 2001 10:20 PM
Subject: RE:
If your reading or writing to and from network objects using SNMP (ie cisco
routers), make sure you upgrade to the latest version of SNMP (version 3) which
has addon enhanced security features eg MD5 and DES encryption. This also needs
to manually configured into the routers ACL (username is
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I think I can sum up PPtP's biggest weakness by telling you that the
control connection, including the key exchange, is done in the clear.
Only the data channel is encrypted. Therefore, anyone who can sniff the
connection can grab the keys and
Outlook is best run over PPTP or VPN.
POP3S, port 995, POP3 over TLS/SSL would also work.
More than just a password should be encrypted.
John
-Original Message-
From: Matt Hemingway [mailto:[EMAIL PROTECTED]]
Sent: Monday, November 12, 2001 8:56
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Make sure you look at Cyberguard. They support GigE adapters, as well as
the RedCreek VPN card. www.cyberguard.com
Rob
- -Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Monday, November 12, 2001 3:42 PM
To:
Mailer: SecurityFocus
What is required to capture packets over a dialup
PPP connection?
I expect a wiretap would be needed first. Who can
actually do this? What is required to do this?
How would you capture packets? Are there special
tools or software to do this over an analog
What you could actually do is create a mirrored port on your switch and
sniff all the traffic that way
-Original Message-
From: GomoR [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, November 13, 2001 4:50 AM
To: Marc Mc Guinness
Cc: [EMAIL PROTECTED]
Subject: Re: Packet Sniffing in a Switched
Howdy fellow basic readers. A while back (few weeks maybe?) someone
asked how to stay anon on the net.
Today the register wrote such an article so I figured why not share it
with the group and hope the original poster catches it.
Hope you enjoy it as much as I did (it is pretty informative)
I used the Cisco Pix firewall and Checkpoint. There are both very secure
devices. Checkpoint is Software or Hardware and easier to use because you can
install it on a Wintel machine. Pix is faster but more difficult to configure.
Jean R. Sigue, OM Technology Inc.
140 Broadway 26th Fl
New York
You also may want to look into wrapping SSL around your SNMP traffic with
something like stunnel. stunnel can go a long way toward adding security to
services which are generally insecure. Just make sure that the boxes you
are running SNMP on are in a very secure environment as well (i.e. no
Partition Magic only support Linux ext2 partitions. If freebsd uses
ext2 they would be supported, otherwise not. Partition magic supports
pretty much all the MS formats. I'm looking at version 6. (this is
based on looking at the box and using version 5 with ext2).
Try Partition Magic, or
Does anyone know of any lists published online or elsewhere that record IP
addresses of computers doing (or that have done) port scans on other
(remote) systems? I have a list I'd like to compare to some others, if
they're out there. Thanks in advance!
J
Hey All,
I had a question regarding what ports on my firewall should be opened to
make a VPN connection? I am using the Cisco VPN client 3.02 on a Win2K
Server box into an Altega 3000 VPN concentrator. I have tried google,
the cisco site and online help. Any help would be appreciated.
It would be a shame to see this wonderful resource disappear.
It would. But rather than pay money for it (and likely have to keep
paying), there are probably a lot of people that have some spare bandwidth
(that they're already paying for, just not using), and could provide a
mirror. All he
PM does recognize un*x style partitions. If you have your system set up on
ext2 partitions, it should work.Caveat emptor though, I have used PM
alot, and if it doesn't like something it will usually gracefully tell you
and exit, but NOT always, so make sure you are well backed up.
Fred
24 matches
Mail list logo