I'm looking for a secure way to automatically create FTP accounts on a
FTP server in the DMZ from an internal server.
Here's the scenario:
Client has multiple customers (hundreds) and would like to have the
ability for their customers to be able to upload/download files from
their FTP server.
you can build some tings with scp-tar-find
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: woensdag 22 mei 2002 20:57
To: Nicolas Jacques
Cc: [EMAIL PROTECTED]
Subject: Re: Where can I find a secure file replication program?
Quoting Nicolas Jacques [EMAIL
My $ 0.02 and if and if only you don't want any telnet at all .. from any
interface ..
BTW, if you do not assign a vty password .. (for telnet) you cannot log in
...
You will be forced to only use a console cable
Maybe someone has found a workaround .. for this ...
Naren
Singapore
-
Hi,
I'm wanting to set up an ACL for a directory (accessible by members
of a specfic group) on an NFS file-system accessible from Solaris 8 and
Debian Linux platforms. Does anyone know if it's possible to use ACL's
with NIS (though I'm aware that what I want to achieve might not need this
Kirk,
Are you sure that Trend is stripping the .exe? If your email client is
Outlook 2002, it will prevent access to potentially harmful attachments
like .exe and .mdf (Only ones that I have found so far) Whilst I haven't
done this so far, apparently there is a setting on Exchange itself to
I would try this:
Find you PFX key stated by Brian Miller, then try moving the original SAM to
another directory WinntEFS and try to do a repair install into that
directory. Log in as Admin and do the directions in the following link:
Is anybody familiar with IBM's Instant Messaging
product called Sametime ? If so, I'd be interested in
any info as to any security concerns with the product
when used as an Enterprise solution (not for IM'ing
outside the Corp).
ThanksMike Ungar
Hi John,
Are your saying that you have or are thinking of configuring
your firewall to filter out packets with non-privileged ports in the
*source* address? If you could I would think this would shutdown
a great deal of incoming traffic!! This is not what you want.
Jim Grossl
Boise, Idaho USA
Hi,
I did encounter the same, when I implemented Trend Viruswall on Linux for
few cases. I started to regret why I bothered to implement the solution ...
The only workaround is, not to follow the recommendation of Trend: try not
to create to mail queues. Run Trend on the same SMTP / TCP port as
Did you restart the scanmail service after you unchecked that box?
Does the log show Attachment Blocked or Virus Found?
Glenn Sullivan, MCSE+I MCDBA
David Clark Company Inc.
-Original Message-
From: Kirk A. Ellsworth [mailto:[EMAIL PROTECTED]]
Sent: Thursday, May 23, 2002 5:19 PM
To:
.
Define what you actually want 'through' that interface in your access list
and apply it to your serial interface (in or out), the implicit deny will
'take care' of the rest.
You cannot block telnet on a cisco router!
You can only block that port (23)
You must block the telnet application on
Hi,
Both, Netscreen and Sonicwall are built on the same technology .. stateful
inspection .. and none is better (or worse) than the other .. apart from
whatever their own sales team talks of ...
If I wanted protection at a higher level, I would (and any security minded
person) would look for a
Yes, communicating state can be problematic for timed
jobs.
The solution I hit upon was to have the file
preparation job rename the file as a last step. I was
culling records from a log and the final step was to
rename the file with cull in the name.
The cronjob wakes and attempts to pick up
wuftp would be very easy, good and less painful, but It's vulnerable to MITM attack. I
think he should go with the SSH idea or Samba over SSL.
Regards,
-
Muhammad Faisal Rauf Danka
Chief Technology Officer
Gem Internet Services (Pvt) Ltd.
web: www.gem.net.pk
voice: 92-021-111-GEMNET
Since you already have CCNA, you might want to familiarize yourself with the
CISCO 'Business Resilience' model and see what they have to offer in terms
of training / cert's in that area. From the viewpoint of IT, most of their
topography is plain common sense, but they do offer some valuable
Steven,
I had the same problem and that was that the license was invalid. In my
case the eval period was over. When you look in the log files you could
find some more info.
Greetz,
Karl
On Thu, 23 May 2002, Steven Evans wrote:
I used Interscan 3 (build 1103, I think) before. It turned our
16 matches
Mail list logo