IPChains does not do port forwarding.
Ipchains does the port forwarding, but to the same machine, if you agree
to
use the concept of redirecting. It does not forward to some other machine.
Since firewalls are most times in front of an entrie LAN, IPChains would not
do portfowarding in that
- Original message follows -
IPChains does not do port forwarding.
Ipchains does the port forwarding, but to the same machine, if you agree
to
use the concept of redirecting. It does not forward to some other machine.
Ok, this has been a very interesting
i keep getting a port scan from 68.39.224.5 (ns01.plnfld01.nj.comcast.net)
obviously a nameserver. Why would they be scanning me ? any help is greatly
appreciated.
thx
mark
dewt wrote:
The programming practices of microsoft are the biggest culprit in IE and
outlook security issues for the most part, netscape's security history is
notably better, and you really only have to use the netscape smart update to
keep up to date
Very true I personally use
Hello All, I am presently wrapping up my masters in Applied Information Technology
with an emphasis in Network/Data Securities, I am working on a
major/thesis/dissertation which is my last requirement prior to graduation, Send
any Job Leads will travel/relocate anywhere..ok back to
On Sat, Mar 02, 2002 at 04:15:14AM -0500, Sumit Dhar wrote:
The second part is, say I am running the key server Now there is a user
X I want to certify What I will need to do is most probably sign his
public key with my private key??
And then re-upload it to the keyservers, where all of the
My users want me to to give them POP3 access via
the firewall. We have an Exchange Server runnig with
a Checkpoint Firewall. Are there any security issues
that I need to watch out
Doesnt Exchange support spop? (SSL layer on pop3), or APOP?
//HÅkan
In my opinion this is not the wisest thing to do but under PGP options in
the general tab there is a single signon section that allows you to specify
how long to cache the passphrase. One of the options is to cache passphrase
while logged in.
At 07:38 PM 3/3/2002, [EMAIL PROTECTED] wrote:
Well, that is a hard one How we define what is stateful ?
It all depends on the definition
In my point of view, it matchs states How it does it is another
matter entirely
But maybe thats just me being naive
On Mon, Mar 04, 2002 at 11:14:36AM -0800, monk wrote:
No flames, please But a question
At 11:39 AM 18/02/02 -0500, you wrote:
I am looking for a way to restrict access to sites for some of my clients
without using a proxy/firewall solution
Is there a way to restrict Internet Explorer to a predefined list of hosts
or create a custom list of approved sites with a deny all at the end?
Thanks for an array of responses(From those with suites, to those
currently building such technology!)
FYI : For other people wanting to know (what i found remarkably useful) is
that all M$ Licensed Products on a network (or local) can be analyzed Free
with the following tool:
In-Reply-To: [EMAIL PROTECTED]
Jim,
Many people make the mistake of diving right in
with scans, looking for holes. Let me recommend
something not quite as easy, but in the end a far
better option.
Diagram the configuration, and take things one
step at a time. Start with each system
Recommending a filemon and regmon are both good ideas
what result did they come up with
u could also try using trillian as a irc client
to see if it is a problem with his version of mirc
also install a winsock tracer on mirc
and see what results that gives
get a good but very obscure firewall
Hi,
I would like to ask about how to check the efficient and effective of an
MSSP
- What scope or tests should be included in the checking? Or
- Any tools which can be used for such purpose
Thanks in advance,
Michael
Can anyone tell me if it's possible to have the event logs in either Windows
NT or Windows 2000 log to another machine What I'm looking at is setting
up some machines and when someone logs on or accesses a file I want the
event to not log on that paticular machine, but to another one that is
According to this report http://www.mp3newswire.net/stories/2002/morpheushack.html
hackers brought down Morpheus for 2 days or more... Apparently the
hackers have also changed the registry settings on the users machines.
Regards,
Dhar
--
Smith Wesson: The original point and click interface.
The one thing to understand with these tools is that they will only pull the
serial number that was used with installation, not necessarily the license
number that you own Ex: You own 25 copies of Office 2000, but only used one
disk and one serial number to do all of the installations The tools
The first half of the book is boring; there is nothing new compared to what
one can learn in school, and one can imagine by himself. But I agree that
the second part, which explains clearly how and why we are using today's
cryptography systems, is quite interesting.
Hopefully the book is so
And the Google responses continue... At least the Google query you provided
brings up some good resources. To the original poster: Check out 'SSH, The
Secure Shell', an O'Reilly book. Sure, it's a gigantic man-page in nice
packaging, but it's a great reference.
Erik Tayler
[EMAIL PROTECTED]
Outlook Web Access does not support S/MIME. Here's a link to a good
comparison document from MS:
http://www.microsoft.com/office/outlook/evaluation/compare.doc
Good Luck,
M. Dante Mercurio, CCNA, MCSE+I, CCSA
Consulting Services Manager
Continental Consulting Group, LLC
www.ccgsecurity.com
Hello All,
Does anyone know of the existance of a program
(preferably freeware) that I can used to create a
script that changes the administrator password on
NT/Windows 2000 servers I planned on running this
script on a workstation and changing the administrator
password on machines in the
On Fri, 1 Mar 2002, Jay D. Dyson wrote:
For example:Question: Is there a Howto or a FAQ on NFS?
Answer : Go to Google and enter howto+faq+nfs.
Well, *S*, that would be simplifying things a bit too much. I do
remember this happened when someone asked for Basic
Greetings.
I would imagine, this would defeat the purpose of encryption. T'were i you,
though i am not, i would reconsider one's concept of security, paying
particular attention to the fact that security does not necessarily
translate to convenience.
Nicewhile, perhaps there is an option which
You made a very good point. It IS unfair for people to ask
lists the same questions over and over and expect a response every time.
But certainly it is unfair to give that answer to somebody new to the
list, they don't know about this google concept... Go to google
appears rude to them.
All,
I am looking at purchasing the new Symantec Gateway Security Appliance that
is new out this month I looking for the differences between the Gateway
Appliance and Symantec VelociRaptor (other than the price) I have about
300 users that will sit behind this device
So my question is, does
On 4 Mar 2002 [EMAIL PROTECTED] wrote:
Every time I send an email I have to type in my
passphrase. How do I configure PGP so it
automatically does this?
Are you really sure you want to do this?? I mean what happens when
someone else access your box?? What if your box is broken into?
Yes, they do.
D. Weiss
MCSE/CCNA/SSP2
-Original Message-
From: Trevor S [mailto:[EMAIL PROTECTED]]
Sent: Monday, March 04, 2002 5:28 AM
To: Marc Eiler (Volt); Hornat, Charles;
[EMAIL PROTECTED]
Subject: Re: detecting wireless access points
Do sniffers like AirSnort detect the MAC
Folks, what would comprise a Network Enginners tool kit.
-Scanning tools
-Sniffer
-Syslog,FTP,TFTP Servers
-Ping/Trace utils
-Screen capture tool
What else can you think of ?
Thanks
Pradeep
Try Express Meter from Reflection software.
On Mon, 4 Mar 2002 13:30:26 -0600
Javier Otero [EMAIL PROTECTED] wrote:
*This message was transferred with a trial version of
CommuniGate(tm) Pro*
Try Intel Lan Desk
-Mensaje original-
De: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Just block the login server domain and port
that way they CANT login to the chat server
,hence they CANT chat
below is a list of each of the chat programs
login domain name and port assigned to each program
msn login server address:messengerhotmailcom
msn login server port:1863
icq login
Even if you had your setup as an AdHoc system running VPN over it?
- Original Message -
From: [EMAIL PROTECTED]
To: Trevor S [EMAIL PROTECTED]; Marc Eiler (Volt)
[EMAIL PROTECTED]; Hornat, Charles
[EMAIL PROTECTED]; [EMAIL PROTECTED]
Sent: Tuesday, March 05, 2002 4:02 AM
Subject: RE:
On Sat, 2 Mar 2002, Thomas Madhavan wrote:
Could someone please explain exactly what it is that kernel hardeners, like
Bastille Linux (am I right? Is it a kernel hardener?) do on the system. I've
read into it a bit, but not in any great depth. I'll go and check out the
bastille-linux domain
Hi comprepsrv!
On Mon, 04 Mar 2002, [EMAIL PROTECTED] wrote:
Every time I send an email I have to type in my
passphrase. How do I configure PGP so it
automatically does this?
I see you are using Entity(?) as MUA.
Mine is mutt, and it asks for the passphrase only once, and then
Hello Jason,
hard to give a good answer without more details but if you are telneting
or copying files etc then SSH might be a solution. SSH is available for
all systems.
PGPvpn will work on Windows systems and is compatible with 2000 VPN
IPSec setup. Sets up a seamless VPN that is
Hi
I have been given the task of reviewing a clients URL
filtering setup, they currently use Websense, which is
currently licensed to around 2000 users
They in fact have more like 20,000 users, so the default
action on the licensing issue is to allow urls, once license
theshold has been
35 matches
Mail list logo