This command will give you help on what programs are running that:
lsof |grep -i UDP
try it, and if you don't have lsof (why linux distributions don't install it by
default??) try on www.rpmfind.net
thanks
Ivan Hernandez
-Original Message-
From: Martin Radvany [mailto:[EMAIL PROT
I am a newie on linux OS and I very concerned about security. (and sorry
about my english!)
How I could do a backup remotelly via internet using redhat linux on bouth
sides with the most secure options, rsync, stunnel, or whatever are
disponible out there.
Guides, how to`s and advises are wellco
In-Reply-To: <[EMAIL PROTECTED]>
You may want to attempt some confirmation of your
own...for example, what does the output of
'netstat -a' look like, w/ regards to this scan
you got (I still can't believe that folks are
using these free online scans)?
Did you hook up a sniffer in front
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
My apache server is getting hit with similar IIS-targeted requests.
Below are the most recent requests (from 10am today) for anyone
that's interested.
[12-26-01 10:19] 209.16.230.176 (-166,0) 404 "GET /scripts/root.exe?/c+dir
HTTP/1.0"
[12-26-01 10
God, no!
Thus spake leon, on Sun, Dec 23, 2001 at 02:35:00AM -0500:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Hi everyone,
>
> I was wondering if anyone knows of any instances (through things like
> distributed computing or supercomputers) that triple des have been
> broken?
>
> Th
Hi
A comment on the NSA guide is available on :
http://www.securityfocus.com/cgi-bin/archive.pl?id=88&mid=191992
grtz
jox
At 11:57 AM 12/21/2001 -0800, Mitch Bell wrote:
>The best book I have seen is Securing Windows NT/2000
>servers for the internet from O'Reilly. Also the NSA
>has some gui
Hello,
Has anyone seen this in more detail? I would like to take care of this ahead of time
if it is indeed a possible threat. My location got hit with Nidma, and Code RED to
many times to mention. I want to know more about this new Nimda highbred. If anyone
has more data on this please send a
Thanks to all who responded.
I'll summarize the responses:
The Contivity is a pretty good VPN, and the firewall is OK. But it doesn't
match a "real" firewall (very few people offered specifics as to
why). Besides, it's always best to keep separate functions on separate
hosts. Nortel's suppo
Beg pardon? No way to do that? What planet are you living on?
> -Original Message-
> From: Srecko Jovancevic [mailto:[EMAIL PROTECTED]]
> Sent: Friday, December 21, 2001 2:39 AM
> To: James Kelty; [EMAIL PROTECTED]
> Subject: Re: Locking down IIS
>
>
> there is no way to do that and t
Remember that the system has 65536 virtual ports available, so I would
recommend running portsentry on ALL of the ports.
Robert Clark
MCSE, MCP+I, MCP, A+
MIS - Texas Cellular
> -Original Message-
> From: James Nobles [mailto:[EMAIL PROTECTED]]
> Sent: Thursday, December 20, 2001 10:09
Greets,
I have recently became in need for encrypted chat in my place of work. I
have seen a few options such as using pgp plugins to encrypt messages when
using icq or jabber but I was wondering what some of you would advise. I am
running a mixed linux/2k network & thanks for the help in
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
If it's at all feasable, i urge you to implement SSH (and
SCP for file transfers).
If you want to have a windows server, the only good server
software i know of is at http://ssh.com/ and it costs $$
but if you want to use a linux/unix machine as a
3des has not been broken. Check www.distributed.net if you'd like to be
including in any encrytion breaking project they have running. I don't
think they are attempting 3des as of right now, as the theoretical time
it would take to crack it is way beyond any computers that are currently
in existan
Hi,
which groups r u talking about ??? do u mean the user groups in NT server.
If its that then getting somethin like "Hackin Server" in the description
area should drive balls outta ur head.. I think this prank is played by
some1 inside ur organization or else ur machine is
compromised..!!!
hi,
i need to know the cost of the implmenetation of the firewall. the model are as
follows
PIX535firewall
regards;
N.Raja
Confidential information may be contained in this e-mail and any files transmitted
with it ('Message'). If you are not the addressee indicated in this Message
Instead of tarring Microsoft with your broad brush, lets be fair instead.
The Microsoft security articles show that setting up tight security on Win
2000 and NT4 is not nearly as difficult as many think. Experience with many
servers hardened the "Microsoft way", shows that their procedures are
e
Martin Radvany wrote:
>
> I have a Linux box running Red Hat 7.0 as a firewall. I
> used a scanner at www.hackerwacker.com to scan the
> machine. All TCP ports were closed, as expected, but
> many UDP ports were open and listed as "danger
> items," ripe for hacker exploits.
>
> I can not
On 18/12/01 23:41 -, Securitynews wrote:
> Is there such thing as POP3 proxying. Does anyone know of an application
> for this?
http://perdition.sourceforge.net
cyrus imapd ships with its own proxy servers.
Devdas Bhagat
I would recomend proftp. I don't know if there has been a port to
windows systems but proftp has excelent
and easy way of authenticating users so that the users do not have to be
the same as the actual system users. Also, ftpd-BSD is quiet good, but
afaik only works under Linux (the original is
19 matches
Mail list logo