remote packet capture?

2002-02-15 Thread Eric Polin
security-focus listers, i have a box (bsd) that i need to lay some type of GUI packet decoder on, but i need it to display on a remote workstation. i know this can be accomplished with running etherpeek w/ x11 forwarding. Heres the problem, the remote workstation is a win2k box. any ideas?

Databases

2002-02-15 Thread Wayne Hanley
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 We are currently developing a system to allow remote users (via the internet) to use our database system. The data files are all legacy in Dbase4 format. The problem I face is how to set this up. The solutions I'm looking at are a server

RE: SSL Question

2002-02-15 Thread Dawes, Rogan (ZA - Johannesburg)
To the best of my knowledge, the encryption keys and signing keys are the same. i.e. You would negotiate a session key that would be used to symmetrically encrypt the data sent. The fact that the recipient can decrypt it implies that the data is authentic, since only the two parties would be

Re: Home Networking

2002-02-15 Thread monk
Coyote Linux (www.coyotelinux.com)is a great floppy disk solution(there is an embedded version on the way, but not here yet), and if you are looking for something a little more robust, you may consider setting up a Linux box, with iptables. Freesco is also a decent floppy solution, and has a

RE: Denial of service question.

2002-02-15 Thread leon
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Great question. I definitely want to take a stab at this one. First all of if you are worried about redundancy you could get a back up line and run bgp. That might be a little too complex for this scenario so my other answers follow the posters

Auditing Tools Evaluation

2002-02-15 Thread Michael Jarrett
Does anyone have or know of a report/website that has evaluated Security Auditing tools such as Intrusion.com, Aelita, etc? I would like to see a comparison between different auditing tools in order to make an educated determination on which tool my client should implement. If

Re: Backup for win2k boxes in the DMZ

2002-02-15 Thread Dennis Depp
But if the box is compromised, so is your internal network! ;( Denny At 06:30 PM 2/12/2002 +, James McGee wrote: The last place I worked at had a great method... Put an addition NIC in them, that way you can keep it separate you can also use this for the admin of the site. In addition,

RE: free IDS on windows platform

2002-02-15 Thread Jason Burzenski
DEMARC isn't free for everyone. FREE FOR NON-COMMERCIAL USE No part of DEMARC may be used by any commercial entity without having first obtained a commercial license from DEMARC Organization unless exempt by meeting one of the following conditions: a. Your company's primary business is as an

RE: Floodnet Controls

2002-02-15 Thread leon
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Yeah I am going to go out on a limb and be contrary. What you are saying is not exactly clear to me but I am going to give it a shot anyway Can't an ids look at the actual payload instead of the url layer 3 - - layer 4 info? Are you talking about

RE: Home Networking

2002-02-15 Thread Rick Bestany
Buy an old Pentium 100 with 32 MB RAM and a 2 GB hard drive at a computer show for about $25. Put a couple of NICs in it. Download the ISO copy of Smoothwall from www.smoothwall.org and burn it to CD. Install on the old Pentium 100 Surf fast and safely. -Original Message- From:

Re: Home Networking

2002-02-15 Thread Christopher Rector
In addition to running a linksys modem router I would implement a utility like Router Rooter or LinkLogger. It allows you to see what's going on with your router and who and or what is hitting it from the outside. RouterRooter is freeware found at http://routerrooter.perceptron.com/ LinkLogger

Re: BCC email virus

2002-02-15 Thread Meritt James
Right. That is a way they may be run. Don't do that. Not that big a thing to modify your own configuration. V/R Jim John Daniele wrote: Why just don't run emailed executables? Because for as long as you are running an email client that interprets vb/java/lotus/*scripting code, you

Apache problem

2002-02-15 Thread Raul Jaramillo
Hi. The access_log file from my apache web server (1.3.22) have the following lines: 195.175.122.227 - - [12/Feb/2002:21:50:54 -0500] HEAD http://www.members.lolitas-porn.com/ HTTP/1.0 200 0 195.175.122.227 - - [12/Feb/2002:21:57:20 -0500] HEAD http://www.members.lolitas-porn.com/ HTTP/1.0

RE: Contraband hacking tool Executables

2002-02-15 Thread John Allhiser
A current list? www.google.com I'm glad to see that AOL is finally cleaning up its PCs and servers. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] Sent: Wednesday, February 13, 2002 2:37 PM To: [EMAIL PROTECTED] Subject: Contraband hacking tool Executables I

RE: Port 32230

2002-02-15 Thread Kinsey, Robert
Just a thought. You might want to CHECK a site before you suggest someone use it. There IS no IANA assignment listed for port 32230 - it's been checked (even according to the original message in the thread) so sending this link isn't very helpful, is it? Regards, Robert

Administrivia: Re: Certificates (MCSE, CCNA...)

2002-02-15 Thread Stephen Entwisle
Hey Folks, I think the Certificates (MCSE, CCNA...) has run its course, so I am going to kill it. If you are still inclined to offer the original poster your opinion/advice, please feel free to do so off-line. Stephen Entwisle Moderator, Security-Basics SecurityFocus

Re: Software Firewall Development

2002-02-15 Thread Justin_Andrusk
Browse through the programming section of Securityfocus.com. I saw some freely available firewall api's. Justin Sec Info

RE: free IDS on windows platform

2002-02-15 Thread Todd Suiter
Indeed, Demarc is VERY cool. We use snort+demarc+ntop on an OpenBSD 2.9 box, mostly for safety net for our other IDS systems. Its actually somewhat amazing what snort+demarc catches vs some of the 'commercial' IDS packages. I highly recommend Demarc, you cannot beat the price (though there are

RE: network traffic logging tool ?

2002-02-15 Thread leon
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Argus is a company that produces security products. They are most well known for their pitbull firewalls and hosting the openhack challenge. I believe they do have a logging tool also. Cheers, Leon PS: Russel is quite friendly if the original

Re: Open Ports on windoze 95/98

2002-02-15 Thread monk
It appears that this program is only for WinNT/2000, unless I am mistaken... --- Red Wolf [EMAIL PROTECTED] wrote: Can anyone recommend a program (preferably free) that will tell you which program is listening on an open port in windoze 95/98? Fport

RE: PKI Books

2002-02-15 Thread Harrington, Chris
There are 3 books that I would recommend (and ones that I use). 1. Planning for PKI by Housley and Polk (Wiley Tech Publishing) 2. PKI by Tom Austin (also Wiley Tech Publishing) 3. PKI: Implementing and Managing E-Security (RSA Press) If you are serious about understanding the inner workings of

Re: Home Networking

2002-02-15 Thread Bob Staaf
Nick, I use a Sonicwall (www.sonicwall.com) SOHO2 (they are now up to SOHO3). Off of that I use a Linksys 5 port switch where I have 3 machines connected. I also have a Netgear Ethernet to Phone Line bridge (www.netgear.com/categories.asp?xrp=7yrp=17) connected and I have one of my

Re: Re: Home Networking

2002-02-15 Thread dude
I have to second the linksys suggestion. I have the 4-port router and wireless access point combo(available for $149 at www.pcmall.com) and I am extremely satisfied. They are really easy to set up. I set up my 5 machines in less that 30 minutes. Mine seems to be secure for what I need.