-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
There is a much better way but it involves upgrading your OS.
Generally the win 9x / win me series of m$ os isn't really that
secure for several reasons. You could easily give the same people
laptops with win2k that would crash less and be able to d
In-Reply-To: <[EMAIL PROTECTED]>
>Received: (qmail 20428 invoked from network); 21
Dec 2001 01:00:00 -
>Received: from outgoing2.securityfocus.com (HELO
outgoing.securityfocus.com) (66.38.151.26)
> by mail.securityfocus.com with SMTP; 21 Dec 2001
01:00:00 -
>Received: from list
In my case, the admins are the only ones with the safe combo and vault
access, they are supposed to be trusted, and the vault logs that they opened
the vault, when, and does a digital like an atm of them popping the vault,
sooo...
If someone opens the password envelope because memory no longer se
In-Reply-To: <[EMAIL PROTECTED]>
You might consider editing your /etc/inetd.conf
file, if you haven't done so.
To see what's using those ports, try using the
'lsof' command...others have also mentioned 'fuser'.
I have a Linux box running Red Hat 7.0 as a firewall. I
used a scanner at www.hackerwacker.com to scan the
machine. All TCP ports were closed, as expected, but
many UDP ports were open and listed as "danger
items," ripe for hacker exploits.
I can not seem to find any information on
These are availible from any store or website that sells safety deposit
supplies. The adesive seal will read VOID if opened. They also have areas
to log transactions of the envelope. And they are cheap, less than $1 USD
per envelope.
ID
>From: "Christopher Vittek" <[EMAIL PROTECTED]>
>To:
Hi all,
I am newbie to security.I have found so many groups named with diffrent
numericals and junk symbols with description"Hacking server" mentioned
against all groups.We are using NT 4.0 server and is there any tools help
to find the root cause of this.I would appreciate your attention and he
It seems to me that a lot of folks in the security industry these days are
overlooking some of the basic, basics of computer security. Good, reliable
backups are just about step 1 or 2, next to good physical security. If a
box is ever compromised, how would you ever recover without a backup? If
Deat users,
Is anyone of you using PORTUS firewall(Proxy Application) from
Livermore systems? Please tell me your experience about this Proxy
Application. I am trying to evaluate this application.
Any help in this regard will help me a lot.
Rakesh
==
James,
portsentry opens up lots of *fake* listening ports. To confirm your open
ports you might want to:
kill portsentry
double check your inetd.conf
restart inetd **make sure portsentry doesn't restart
do a netstat -an
scan your box from another box : i.e.
nmap -nsS -O -p 1-65535 -oN -v
nma
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi everyone,
I was wondering if anyone knows of any instances (through things like
distributed computing or supercomputers) that triple des have been
broken?
Thx,
Leon
-BEGIN PGP SIGNATURE-
Version: PGPfreeware 6.5.8 for non-commercial use
Well, that would be a start, but Microsoft has a habit of suggesting the
"whitewash" method of security..."let's pretend there is nothing wrong"!
I would suggest http://www.cert.org/
They have plenty of information on securing your computer. Also a less
biased viewpoint!
Happy New Year!
Doug
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
You can find os finger printing in nmap (open source) strobe (not
sure if it is open source or kept up2date anymore) and a program I
believe is called winfingerprint or something like that. The program
has been mentioned on this list before and can d
www.nsa.gov has some great documentation on securing windows 2000 and iis5.
Hope that helps,
Brian
-Original Message-
From: James Kelty [mailto:[EMAIL PROTECTED]]
Sent: Thursday, December 20, 2001 9:11 AM
To: [EMAIL PROTECTED]
Subject: Locking down IIS
Hello!
I was wondering if someo
We are looking for a replacement ftp server instead of Microsofts own. Does
anyone know of a good and secure server?
/michael
*snip*
> below.Is this normal? All these tcp ports
> listening doesn't seem right or is it? Thanks in
> advance.
*snip*
That's all nice, but netstat output you provided is useless, since it
doesn't contain any useful information at all. All those ports could be
opened by simply anything. Try net
Hi,
> I have edited the /etc/services
> file.Now...when i do netstat -a i get the output
> below.Is this normal?
Why did you edit /etc/services ? It's just used for mapping
a name over a port number (like http --> 80). Its not used
for launching servers.
Edit /etc/inetd.conf instead. This
According to the RFC (ftp://ftp.isi.edu/in-notes/rfc2865.txt), "It is
preferred that the secret be at least 16 octets."
Hal
> -Original Message-
> From: DCSIM Subscriptions (IA) [mailto:[EMAIL PROTECTED]]
> Sent: Monday, December 17, 2001 11:12 AM
> To: '[EMAIL PROTECTED]'
> Subject: Rec
The best book I have seen is Securing Windows NT/2000
servers for the internet from O'Reilly. Also the NSA
has some guides for locking down systems.
http://nsa1.www.conxion.com/
--- James Kelty <[EMAIL PROTECTED]> wrote:
> Hello!
>
> I was wondering if someone could point me in the
> right direct
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Check out http://www.sans.org/ and check out their "Securing Windows 2000
Step-By-Step." It is an excellent resource. The reading room at Sans.org
is also full of good information.
On Thu, 20 Dec 2001, James Kelty wrote:
> I was wondering if som
What programs do you have up and running? Port 6667 is for IRC chat and is
commonly used by IRC chat programs and by trojans that use IRC for
communication. Listening indicates that a program is acting as a server.
Make sure to close down all your internet chat programs and browsers and try
scan
My web loges show a similar increase.
63.149.122.72 - - [20/Dec/2001:01:25:30 -0700] "GET /scripts/root.exe?/c+dir
HTTP/1.0" 404 283
63.149.122.72 - - [20/Dec/2001:01:25:30 -0700] "GET /MSADC/root.exe?/c+dir
HTTP/1.0" 404 281
63.149.122.72 - - [20/Dec/2001:01:25:31 -0700] "GET
/c/winnt/system32
22 matches
Mail list logo