Hi there,
I am looking for some good links about secure configuration of Cisco
Switches, both CatOS and Cisco IOS. Security is meant here as security of the
switch itself, so vLANs and similar aspects of secure switching are not my focus.
Unfortunately, google is not very helpful...
Does
Officially, there is no support for Beta or RC products, as those
products are specifically designed for testing the product for final
release.
John Tolmachoff
IT Manager, Network Engineer
RelianceSoft, Inc.
Fullerton, CA 92835
www.reliancesoft.com
-Original Message-
From: Matt
In a quick check on the net for this problem, it appears to be the result of
building openssl from source, but having mismatched component dependencies
(like the recommendation at the bottom - needing the correct libssl). Most
recommendations are to uninstall openssl you have and either rebuild
If it's already installed, try simply typing:
nc -h
And if it's correctly installed, it will give you a nice help screen.
Sec [[EMAIL PROTECTED]] wrote:
I have not installed netcat before on Linux. It is apparently included
in my Linux. How can I start using / install it ?
--
Bruno
I am using snort, ethereal, and the nmapnt on windows 2000. My problem seems
to be that they all have to use winpcap and installing winpcap for one
uninstalls it for the other two. I cant seem to get all three to work at the
same time. What am I missing?
Maybe I'm misunderstanding what you're saying (listing is used so that folks
can modify their hosts file)but I _WOULD NOT EVER_ put anything with one
thousand one hundred and ninety eight lines as my host file. MS even
recommends you not use the template host file with comments because
Probably Domino versus IIS.
I looked at it a while back, it wasn't cheap, that's for sure. However I
think IBM/Lotus has adjusted the pricing downward. It was nice and worked
well, at the time it was just too pricey for what you got. We may revisit it
though at this point...
Patrick
-
Isnt this just a service to resolve hostname ?
- Original Message -
From: SoloCDM [EMAIL PROTECTED]
To: Security-Basics (Listserv) [EMAIL PROTECTED]
Sent: Sunday, May 26, 2002 9:06 AM
Subject: What Is hosts2-ns
On Linux, what is hosts2-ns? How is it accessed from a remote host?
That's probably true, I'm only familiar with the usage in Win2k...and even
then very little. All of our installs use DNS, except for very very special
instances.
I still have to stand firm on thinking that it's a bad idea though... I
don't know how many machines you admin, but I really really
I think Jay covered most of it , but still in addition, security WILL probably
be important enough once people are technically aware of the damage an unsecure
system may cause, BUT and this is very important to remember - NO ONE except
the people who deal with security , likes to hear about
Hello Roberto,
Wednesday, May 29, 2002, 3:01:48 AM, you wrote:
rpn I have been getting HTML email from different folks on one of my account.
rpn They all are similar to the HTML below. Can someone tell me what this email
rpn is all about? Does it pose a security threat?
rpn -Roberto Cahanap
On 29 Mai 2002, Roberto Cahanap wrote:
I have been getting HTML email from different folks on one of my
account. They all are similar to the HTML below. Can someone tell
me what this email is all about? Does it pose a security threat?
It looks like Klez. Try searching for Klez-virus. Is
Hi Chisolm
I'd suggest you try this first before making comment. In my experience with using this
method to block content and save bandwidth, I've noticed no latency (at least nothing
in human terms).
However, I should have noted that if you use this method on a Win2K workstation, it is
[EMAIL PROTECTED] stated the following:
I think this is the default name for a name server hence hosts-ns.
On Linux, what is hosts2-ns? How is it accessed from a remote host?
Someone recently tried to access my server through port 81.
I found out differently from other sources. Port
Hello everyone!!
I am in search of software that will do the following..
Automatically compress and encrypt data from hard drive to a CDRW
on a regular schedule without ANY user intervention...
Win2k Pro OS
I have searched everywhere and have found solutions that will do everything
but the
The command is nc. Check out man nc or
http://www.atstake.com/research/tools/nc110.txt for more information.
Sean
- Original Message -
From: Sec [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Tuesday, May 28, 2002 10:46 AM
Subject: Using Netcat
I have not installed netcat before on
I just received a mailing from Verisign that borderlines on fraud. It is at
the least, VERY misleading. It states in BOLD letters Domain Name
Expiration Notice and to reply by June 20, 2002. However the domain it
pertains to doesn't expire until 1/03 and is NOT registered with Verisign.
The form
Just a thought. Automatic respones do have a DoS ring to them. IP Spoofing
could make you an unwitting attacker. There are many dangers to automated
respones such as the one you are thinking of. What safegaurds are you
considering?
From: JM [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
I thought Snort was capable of dropping packets based on the snort
ruleset... am I wrong? Is that performed only by the firewall?
I realise Ethereal is only for listening to what's happening.
Does anyone have any in depth installation and config tutorials?
Snort.org has a few, but nothing I
dear all,
it depends on the what you want to do, it is not
necessary to have mq iis running to have your
sametime running.
i do a quite a bit of consulting implementation of
sametime.
mike, if you want more info pls mail me
[EMAIL PROTECTED]
regards,
--- Kristofer Mcconnell
[EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Roberto,
Hi!
A script can call an attached executable automatically by just
opening the email, not the attachment itself. This poses a security
risk. An example of such a script:
img SRC=cid:mr.malware.to.you; style=display:none
img id=W0W
Hello there,
I am not sure about this as I am unfamiliar with the aforementioned client,
but have you tried compiling and insmodding all netfilter modules?
Maybe this is a bit like NAT'ed ftp,where there are special modules needed
for the server.
You already mentioned you used
22 matches
Mail list logo