Hello,
Is there any product available on the market, whcih
can make different applications running on UNIX,
Single Sign On enabled with or without customization.
Applications are not web enabled
Regards
Aji Abraham
__
Do You Yahoo!?
Sign up for
Well..Logic would suggest using the most complicated password
available..
P.S. reply to all isnt always your friend.
- Original Message -
From: Aditya Lalit Deshmukh [EMAIL PROTECTED]
To: 'John Forristel' [EMAIL PROTECTED]; 'Richard Conlan'
[EMAIL PROTECTED]; [EMAIL PROTECTED]
I was having a conversation with, you could say, one of my friends and
it somehow turned into a bit of a bet you can't hack me challenge.
Anyways, in the course of this he managed to freeze my OpenBSD 3.0
firewall/nat box with some sort of attack. When I checked my system logs
after a reboot, I
The O'Reilly Books on Perl are the best without a doubt.
Learning Perl by O'Reilly is the place to start the the Advanced Perl
Programming and keep the Perl Reference by your side. All by O'Reilly
and also the cheaper of the books on the market.
http://perl.oreilly.com
Good luck
Trevor
On
Unfortunately cases like that, you have only two choices:
1) Don't use such services for anything sensitive
and/or
2) Change the passwords for those services much more frequently than you
do your other passwords, something on the order of 15 days or less
| -Original Message-
| From:
Hey there,
I'm looking for a Wireless HUB/Switch with support for Internet (through
ADSL, this is NOT a PPPoE connection it's a VPN/PPTP), NAT, DMZ and LAN. The
point is, I hear a lot of bad things about some brands and just nothing at
all on some others. What I'm looking for is advice on which
Hello..
when I start tcpdump by just issuing
bash# tcpdump
or
bash# tcpdump -i eth1
the packets roll by to fast.. or to specify.. it logs all packets but
I'm only interested in a few of them. How do I limit the output
so that only.. lets say.. UDP packets coming from 192.168.0.33 is shown?
I would refer you to a document post by Michael Burnette ([EMAIL PROTECTED]) on
july 2. Very interesting...
For those of you that wish to view it, I have posted my white paper on
Blackberry forensics to a website.
I should have emailed a copy already to anyone that requested it; this
version
Good Morning all,
What about using M.S. SMS or an equivelant product to scan all the
machines on your network. I have also found a product called SMP from a
down load site. SMP is very similar to SMS with out the price tag. Both
give a read out of all the hardware and drivers on the remote
Dear Cheryl,
Hfnetchk is an assessment tool that does not assist in download and/or
applying patches.
Kind Regards
Sarbjit Singh Gill
MCT
- Original Message -
From: Cheryl Goh [EMAIL PROTECTED]
Date: Saturday, July 6, 2002 10:03 am
Subject: Re: Modems detection/ patches
You guys might like to check out the isp-wireless mailing list. Your
discussion would go over well there.
Lots of very knowledgeable individuals.
[EMAIL PROTECTED]
Be warned though, you might want to subscribe for the digest, and not the
real-time list. It is high traffic.
Jeremy
-
I've had really good results with Socks2Http. (www.totalrc.net) It's
really only worth trying out if you have a broadband connection running
from home to utilize though. It supports proxy tunneling and uses port
80 to pass thru a firewall. Don't worry if you app doesn't support
Socks since
Hello,
Is there any tool available to find out users
privilege on folders in different servers including
NT,2000 UNIX
Regards
Aji
__
Do You Yahoo!?
Sign up for SBC Yahoo! Dial - First Month Free
http://sbc.yahoo.com
You could try using Remote.exe that comes with the NT4 resource kit
instead of netcat. I'm not sure if it encrypts the data or not, but you
do need to know a unique identifier to start the session. You could
just make the ID a very long a complex string. I've had good results
with it behind a
I forgot this lst line in myt previous mail.
The is a not-for-free equilalent from Shavlik called Hfnetchkpro which
can deploy patches. He is a comparisons between the free tool and the
not so free one.
http://www.shavlik.com/security/prod_hf_compare.asp
Sarbjit Singh Gill
[EMAIL
I have a firewall I have been working on. 3 NICs. I have real IP addresses
for the outside NIC, DMZ NIC, and servers in the DMZ. I used bridging to get
packets from the internet to the servers in the DMZ. Here is the problem.
Bridging seems to be at a lower level then packet filtering. I can't
On Monday 05 August 2002 01:46, Marcos Fontana wrote:
somebody knows one proxy/cache extremely safe?
Squid can be set up to be quite secure with the right ACLs (Access
Control Lists). Have a look at http://www.squid-cache.org for more
details. It all depends on what you call safe though.
By
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Kerberos also listens on port 88 on Win2k systems.
Steven L. Schullo, CISSP, MCSE, CCNA
BORN
Dallas Infrastructure
mailto:[EMAIL PROTECTED]
- -Original Message-
From: Peter Kristolaitis [mailto:[EMAIL PROTECTED]]
Sent: Sunday, July 07,
18 matches
Mail list logo