Thank you all for all the excellent references on
Sametime. I'd be interested in knowing if you're aware
of any anti-virus or anti-extension blocking products
(i.e., would block all .exe attachments) that
integrate with the product.
Thanks...Mike Ungar
___
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Thu, 23 May 2002 18:05:16 -0400, Lists wrote:
>I'm looking for a "secure" way to automatically create FTP accounts on a
>FTP server in the DMZ from an internal server.
>
>Here's the scenario:
>
>Client has multiple customers (hundreds) and would
Hi all
Heres my story:
I wanted to see how XP looked and decided to give it a test run
I managed to get a evaluation copy Of XP Pro Release Candidate 1 (Build
2505) and a spare box with a freshly formatted hard drive.
After installing I immediately went to Windows Update to try and grab the
pil
Good shot - and not just for a startup, but for ANY vulnerability
analysis! Should be done often!
Jim
Bennett Todd wrote:
>
> 2002-05-21-09:55:30 Meritt James:
> > [ start with ] review of the security plans, policies and
> > procedures in existence with the 'modification' where things are
> >
On 23-May-2002 at 21:28:19 Jim Grossl wrote:
> Are your saying that you have or are thinking of configuring
> your firewall to filter out packets with non-privileged ports in the
> *source* address?
>
Yes, we have...
> If you could I would think this would shutdown a great deal of incoming
> tr
Hi=20
I am new to Snort. I am a junior Java programmer and would like to =
install Snort on my Win2k machine and eventually on a *nix server when I =
get it up and running. The way that I learnt Java is by getting sniplets =
from examples etc and learning from Best Practices documents available =
Ivan,
Use this search argument in Google:
blacklist spam sites
That should give you sufficient returns to plow through...
Scott Miller
Mgr IS Support
Unimin Corporation
=> my opinions do not necessarily reflect those of Unimin Corporation, and
I have the scars to prove it...
Well snort will indeed dump more than enough information (maybe to much) ,
but understanding that information is not trivial, plus snort will show
you the incoming traffic to the computer it's installed on , unless that
computer is the gateway you wont get the needed data , if you will install
it
Hi all.
I installed libpcap-0.7.1 on my machine. I then uninstalled it (for some
reason) using 'make uninstall' and then deleting libpcap directory.
Now, I need libpcap again to install snort. I've downloaded it, run
'./configure', 'make' and 'make install' and everything seems to go OK.
But th
On Friday 24 May 2002 02:15, Michael Doughty wrote:
> > Yes, and it is the sending port that is blocked. That is my point.
> > If a remote mail server sends a message to our mail server using a
> > non-privileged port (i.e. the port they use to send the msg to us),
> > and we block that port, then
Hi
I'm a newcomer to the Security arena and am currently trying to get to
grips with honeypots, IDSs and firewalls for my dissertation. I'm running
NFR's Back Officer Friendly on my home computer, configured to listen for
Back Orifice, FTP, Telnet, SMTP, HTTP, POP3 and IMAP2, and something w
Hi all,
I am looking for any sugestions regarding limiting the number of
simultaneous logins a particular useranme can make (generally limit to one
only) for a small (read broke/poor) community college.
I am aware of CConnect (from the Win2k resource kit) but it requires a SQL
database which sim
Michael Ungar wrote:
>Is anybody familiar with IBM's Instant Messaging
>product called Sametime ? If so, I'd be interested in
>any info as to any security concerns with the product
>when used as an Enterprise solution (not for IM'ing
>outside the Corp).
>
>ThanksMike Ungar
>
I don't have any
On Wed, May 22, 2002 at 02:52:57PM -0700, [EMAIL PROTECTED] wrote:
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Hi,
> Anyone can help with this?
> I have a binary file that an attacker has left in a friend's RedHat7.2 hacked
>server. When i want to run it i recieve that error:
> $ ./
Hi all. Responses have been good before so I thought I'd try again.
I've recently set up a Mandrake 8.2 workstation. I've used firestarter
to build a firewall, and I want to use a packet sniffer.
After installing Snort, it didn't work due to a data type 113 error. I
uninstalled it, then reinstal
Hello,
I must also put my bid in for Watchguard. I got to set one up at my
last job (a firebox II). It has a decent windows GUI (It too, is a
Linux box, just already set up). Logging tools are pretty good, VPN is
available and pretty snappy, etc. It talks PPTP and its own flavor of
VPN.
Hi,
I already read paper of DRDOS and some e-mails of the securityfocus list,
but I have a doubt, whats is the best way to prevent a DRDoS attack, denny all
"SYN ACK" request to to Port 80, and source port > 1024.
In others words, we supose to deny a request coming
I was wondering how we can prev
Hello,
Have you looked at WS_FTP. (www.ipswitch.ca) It has the ability to use a
ODBC database for the user accounts, etc. You could have the web page create
the accounts in the database (Access DB or SQL) setting a creation time and
/or a expire date then have a trigger go through and set the acc
Unfortunately, the answer is server dependant. In both Unix and NT/2000 you
can script actions that can be triggered via a web interface.
With NT, you could simple use IIS, NT's integrated accounts, WMI, and ASP.
However, this would require you to take security precautions to make sure
the right
Hello. I have searched google and the bugtraq mail list with no luck
while looking for "banned sites" lists.
I mean, porn, warez, banners, ads, big cookie damage and all that thins
that i don't won't my sweet and innocent network lusers to see trough my
proxy :)
Any list would be appreciated,
20 matches
Mail list logo