Automatic FTP account creation

2002-05-24 Thread Lists
I'm looking for a secure way to automatically create FTP accounts on a FTP server in the DMZ from an internal server. Here's the scenario: Client has multiple customers (hundreds) and would like to have the ability for their customers to be able to upload/download files from their FTP server.

RE: Where can I find a secure file replication program?

2002-05-24 Thread Peter Van Egdom
you can build some tings with scp-tar-find -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] Sent: woensdag 22 mei 2002 20:57 To: Nicolas Jacques Cc: [EMAIL PROTECTED] Subject: Re: Where can I find a secure file replication program? Quoting Nicolas Jacques [EMAIL

Re: Cisco IOS question

2002-05-24 Thread Naren T
My $ 0.02 and if and if only you don't want any telnet at all .. from any interface .. BTW, if you do not assign a vty password .. (for telnet) you cannot log in ... You will be forced to only use a console cable Maybe someone has found a workaround .. for this ... Naren Singapore -

Access Control List on a directory (Solaris/Debian Linux)

2002-05-24 Thread David W Smith
Hi, I'm wanting to set up an ACL for a directory (accessible by members of a specfic group) on an NFS file-system accessible from Solaris 8 and Debian Linux platforms. Does anyone know if it's possible to use ACL's with NIS (though I'm aware that what I want to achieve might not need this

RE: Trend Scan Mail

2002-05-24 Thread Hood, Deran
Kirk, Are you sure that Trend is stripping the .exe? If your email client is Outlook 2002, it will prevent access to potentially harmful attachments like .exe and .mdf (Only ones that I have found so far) Whilst I haven't done this so far, apparently there is a setting on Exchange itself to

Re: cracking Windows 2000 EFS

2002-05-24 Thread Luv 2 Hack
I would try this: Find you PFX key stated by Brian Miller, then try moving the original SAM to another directory WinntEFS and try to do a repair install into that directory. Log in as Admin and do the directions in the following link:

Sametime

2002-05-24 Thread Michael Ungar
Is anybody familiar with IBM's Instant Messaging product called Sametime ? If so, I'd be interested in any info as to any security concerns with the product when used as an Enterprise solution (not for IM'ing outside the Corp). ThanksMike Ungar

RE: non-privileged port selection - how is it done?

2002-05-24 Thread Jim Grossl
Hi John, Are your saying that you have or are thinking of configuring your firewall to filter out packets with non-privileged ports in the *source* address? If you could I would think this would shutdown a great deal of incoming traffic!! This is not what you want. Jim Grossl Boise, Idaho USA

Re: Trend Micro Interscan 3

2002-05-24 Thread Naren T
Hi, I did encounter the same, when I implemented Trend Viruswall on Linux for few cases. I started to regret why I bothered to implement the solution ... The only workaround is, not to follow the recommendation of Trend: try not to create to mail queues. Run Trend on the same SMTP / TCP port as

RE: Trend Scan Mail

2002-05-24 Thread Sullivan, Glenn
Did you restart the scanmail service after you unchecked that box? Does the log show Attachment Blocked or Virus Found? Glenn Sullivan, MCSE+I MCDBA David Clark Company Inc. -Original Message- From: Kirk A. Ellsworth [mailto:[EMAIL PROTECTED]] Sent: Thursday, May 23, 2002 5:19 PM To:

RE: Cisco IOS question

2002-05-24 Thread Paul Neiberman
. Define what you actually want 'through' that interface in your access list and apply it to your serial interface (in or out), the implicit deny will 'take care' of the rest. You cannot block telnet on a cisco router! You can only block that port (23) You must block the telnet application on

Re: Appliances for SOHO that with integrated Firewall and DNS ser ver

2002-05-24 Thread Naren T
Hi, Both, Netscreen and Sonicwall are built on the same technology .. stateful inspection .. and none is better (or worse) than the other .. apart from whatever their own sales team talks of ... If I wanted protection at a higher level, I would (and any security minded person) would look for a

Re: Where can I find a secure file replication program?

2002-05-24 Thread john traenky
Yes, communicating state can be problematic for timed jobs. The solution I hit upon was to have the file preparation job rename the file as a last step. I was culling records from a log and the final step was to rename the file with cull in the name. The cronjob wakes and attempts to pick up

RE: Where can I find a secure file replication program?

2002-05-24 Thread Muhammad Faisal Rauf Danka
wuftp would be very easy, good and less painful, but It's vulnerable to MITM attack. I think he should go with the SSH idea or Samba over SSL. Regards, - Muhammad Faisal Rauf Danka Chief Technology Officer Gem Internet Services (Pvt) Ltd. web: www.gem.net.pk voice: 92-021-111-GEMNET

RE: Need Guidance

2002-05-24 Thread Amer Karim
Since you already have CCNA, you might want to familiarize yourself with the CISCO 'Business Resilience' model and see what they have to offer in terms of training / cert's in that area. From the viewpoint of IT, most of their topography is plain common sense, but they do offer some valuable

RE: Trend Micro Interscan 3

2002-05-24 Thread Karl Lovink
Steven, I had the same problem and that was that the license was invalid. In my case the eval period was over. When you look in the log files you could find some more info. Greetz, Karl On Thu, 23 May 2002, Steven Evans wrote: I used Interscan 3 (build 1103, I think) before. It turned our