For XP (pro): If you know what you're doing, look at the executables
into windows/system32. That's where they mostly are (not sure if others
are scattered all around though). I don't know if it's reasonable to
expect that it has everything W2k has (see below) factoring the
modifications they made
-This subject has been of a great interest to me and I have been trying to
push to get a similar feature within my area of infulence.
- Here is what the differentiators are :-
- Is the System itself capable of sending out emails using MAPI or are you
going to trigger an email from your log serve
Has anyone tested / worked with the Win2K server as a VPN gateway ? What
are your opinion on the IPSEC capability of this box.
-Pradeep
>
>
>
>
>
What you are asking is basic.Get a SSL cert, load on your Server, enable
service 443 on your IIS and you should be in business.This could cost you
arounf $200
If you dont have any server side SSL and still want to give users a 443
connect, you could use:-
-a SSL acceleration device ( e.g Alteons
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Look at sftp (part of the ssh suite). It works like ftp.
There is a commercial windows server to take care of it.
(see ssh.com for details)
On Fri, 30 Nov 2001, System's Administrator wrote:
> Hello fellow Subscribers,
>
>
> We have a user who wa
Check WinXP's Help and Support Center for "Command-line reference", it shows
all the console programs and what is new in xp
> That is what I meant. I am sorry for not making myself clearer the
> first time. I am looking for a list of dos apps that are installed
> by default on win xp (win 2k wo
Phil Park wrote:
> -BEGIN PGP SIGNED MESSAGE-
>
> The POP3 (and IMAP) daemon that comes with the Pine distro support SSL.
>
> http://www.washington.edu/pine
>
> Most of the big mail clients (Netscape, Outlook, etc.) support SSL connections.
>
> However, I don't know about secure SMTP su
Harro -
A couple books that I have in my library...
The Design of the Unix Operating System, by Maurice J. Bach. I believe
by running through a book of this detail, one can "piece together" how a
UNIX box is secured, by understanding how it is constructed. I know
that helped me a lot.
Inc
> > > I got about thirty employees outside the office that access our
> > > exchange server through IMAP to get their email. Relaying was left
> > > open so that it is possible for them to send out through our email
> > > server regardless of how they are connected through the internet.
bad idea
Casey Allen Shobe wrote:
>In response to the recent squirrelmail discussion, SquirrelMail, which I once
>used heavily, is only as secure as the protocols over which it's running. I
>would recommend using a HTTPS server, and having the IMAP server on the same
>machine.
>
>IMAP is only an "inse
On Sat, Dec 01, 2001 at 04:08:31PM -0800, Jay D. Dyson wrote:
> -BEGIN PGP SIGNED MESSAGE-
>
> On Fri, 30 Nov 2001, Devon Ryan wrote:
>
> > > I scanned my homeserver for open ports and I found that I have the ports:
> > >
> > > 12345 NetBus
> > > 20034 NetBus Pro
> > > 31337 BackOriffi
Read the squid.conf file especially the ACL part. Then it should be easy.
Shinta H Leagazpi wrote:
>
> Hi there,
>
> I need an urgent help. I have 3 diferent networks namely
> 192.168.0.0/24, then 10.106.6.0/24, and 172.168.11.0/24.
>
> Now, I need to setup squid as a WWW proxy in my
> lin
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
By secured I presume you mean the information rather than physically
strapping the pda in question to the marketer in question..
PGP have a product for PDAs, PGPwireless
(http://www.pgp.com/products/pgpwireless/default.asp), that seems to
offer m
Switches don't mean unsniffable..
-Original Message-
From: Phil Park [mailto:[EMAIL PROTECTED]]
Sent: Saturday, December 01, 2001 1:04 AM
To: [EMAIL PROTECTED]
Subject: Re: Encrypted POP3 Access?
-BEGIN PGP SIGNED MESSAGE-
The POP3 (and IMAP) daemon that comes with the Pine di
...
> state of the PDA art means that these devices cannot be
> properly secured but have been overruled!
>
> Am I right?
Half way. The issue is really that all of the consumer grade PDAs on
the market (at least that I am aware of) are designed to be very
simple and convenient with security
On Friday 30 November 2001 06:25 am, Pavel Lozhkin wrote:
> Hi !
>
> Does anyone know where i can find one strange programm/service...so on
> I need IP -> e-mail translator ;) Paradox ? Then let me explain my
> thought here
> I need to handle my logs in semi-automatic mode to send e-mails to
> som
Give a little more detail?
It would seem that if you NAT'd the inside server to a valid address, and gave access
(to that
address) to the outside agency, via just one source address or an address block, this
would solve
your problem.
The other possibility would be to set up SecuRemote on the
i see many times on this list that people post ip's of their machines, and of
suspect machines. occasionally with lines like "i'm running version (insert
any vulnerable version number) of this service!" or a much less serious but
still iffy "we only allow port 53 through the fireall to the mac
On Fri, 30 Nov 2001, Meritt James wrote:
> A couple of basic steps:
>
> 1. Don't put it on the system - ESPECIALLY in the ROOTDIR tree.
> 2. Make !@#$#$@# sure your spiders.txt is right.
Hmm, don't you mean 'robots.txt'? Do you also know that real nasty spiders
don't care about robots.txt? DO NO
Try this: http://www.as400.ibm.com/tstudio/secure1/advisor/secwiz.htm
-Original Message-
From: Mark Wolcenski [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, November 28, 2001 9:36 AM
To: [EMAIL PROTECTED]
Subject: AS/400 and security assessment
Greetings,
I now have my first security
Simply telnetting to his box on port 25 reveals there is indeed an open port
with a service willing to accept connections from strangers. If the SMTP
service is configured similarly, then yes, this is very much an open mail
relay begging for spammer abuse.
>is that ip a single machine or a nat'
-BEGIN PGP SIGNED MESSAGE-
You can use the SSH server for Windows (www.openssh.com) or install the Cygwin
environment (www.cygwin.com).
Then enable sftp with that. You can modifiy the passwd file so that only he has access
to it.
- --phil
- --
phil park
system administrator
[EMAIL P
> - -Original Message-
> From: R. Toma [mailto:[EMAIL PROTECTED]]
> Sent: Wednesday, November 28, 2001 4:16 PM
> To: [EMAIL PROTECTED]
> Subject: ¡¡I NEED HELP!!
>
> I scanned my homeserver for open ports and I found that I have the
> ports:
>
> 12345 NetBus
> 20034 NetBus Pro
> 31337 Ba
That is a SERIOUS flaw. Not because programs might connect to the internet
before it loads, but because the host isn't protected from remote attacks
until the user is logged on.
At this point, I would recommend to the original poster to drop ZA and go
with Tiny Personal Firewall (www.tinysoftwar
See man bash for full documentation. I always find what i want in that
document.
If you're using bash as shell then you may want to edit ~/.bashrc file. It
runs when you login. And a file named (rc.local) , i think in /etc/, which
runs at system startup.
- Original Message -
From: "Thom
On Fri, 30 Nov 2001, Gary McKinney wrote:
[snip]
> One caveat here - make sure you are running 128-bit encryption as there is
> hardware available now that would allow brute-force decryption of 64-bit DES
> in about 48-hours or so... (Ah - the wonders of technology) and do not cost
> a great de
perhaps he should try using ntrunner to start it as a service (its freeware)
http://www.istare.com/oystersoftware/products/ntrunner/ntrunner.htm
regards
ralf
- Original Message -
From: "Phil Park" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Friday, November 30, 2001 9:09 PM
Subjec
Martin Smith wrote:
>
>
> P.S What are ipchains
a non statefull packet filter.
try : http://www.google.com
hth
andre
On Thursday 29 November 2001 01:27 pm, Martin Smith wrote:
> I'm running Snort 8 and have been seeing ALOT of this type of attack
> aignatures. It looks like a false positive, but I'm not sure.
>
>
> [**] [1:526:3] BAD TRAFFIC data in TCP SYN packet [**]
> [Classification: Misc activity] [Prio
On Fri, Nov 30, 2001 at 02:36:03AM -0600, Devon Ryan wrote:
> R. Toma wrote:
>
> > open. Now, are these the famous trojans? I have linux, aren't they
> > programmed for a MS platform? How can I close these ports
>
> Something tells me that you're running tripwire...or you scanned the
> wron
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi John,
Here are my thoughts in the order that you wrote your questions.
1) Yes I see a lot of problems. Not so much with yahoo specifically
but the idea of sending sensitive information in clear text. This
allows anyone on the same segment
31 matches
Mail list logo