Reading this:
``HTTPS support : you can sniff http SSL secured data... and even if the
connection is made through a PROXY''
from:
http://ettercap.sourceforge.net/
would make me feel bad while using telnet over ssl. Correct me, If I'm
wrong but telnet and http trough an ssl tunnel is the very same
You need to have a good understanding of tcp/ip itself and the protocols
that run on it. A very good introduction is tcpip illustrated:
http://www.amazon.com/exec/obidos/tg/detail/-/0201633469/qid=1032614292/sr=8
-1/ref=sr_8_1/102-1097914-6536962?v=glance&s=books&n=507846
SANS offers various cou
- Original message -
On Fri, 20 Sep 2002 08:50:43 +
"sifu ." <[EMAIL PROTECTED]> wrote in message
<[EMAIL PROTECTED]>:
>
> hello!
>
> I've recently bought an E-TECH ROUTER/SWITCH with the purpose of
> building a home network. The problem here is that I don't get a LAN
> signal on th
On Sat, 2002-09-21 at 05:41, Mike Arnold wrote:
> -A input -i eth0 -s 0/0 -d 0/0 -p icmp -l -j DENY
>
> I think
Thanks, the test returned 'blocked', I feel better now :-)
> You might also want to add
>
> -A input -i eth0 -s 0/0 -d 0/0 -p udp -l -j DENY
>
> to block UDP protocols connection
// I am looking for Masters degree programs in "Information
// Security", "Information Assurance" or "Information Warfare".
//
// I live in the Washington, DC area. Now I'm aware of three local
// institutions that have some form of this type of program,
// George Mason,
// James Madison and
Hi,
Well in your line
-A input -i eth0 -s 0/0 -d 0/0 -p tcp -y -j DENY -l
you specifically block ONLY tcp connection attempts.
so udp/icmp etc are still allowed.
You can use
-A input -p icmp -j DENY -l
but that still allows for UDP. You cannot block all UDP if you want DNS to
work, so
I suggest TCP Illustrated, Volume 1, by Stevens. It is the standard for
learning the protocols that you are looking at.
--danielrm26
> -Original Message-
> From: Teodorski, Chris [mailto:[EMAIL PROTECTED]]
> Sent: Friday, September 20, 2002 11:40 AM
> To: Security-Basics (E-mail)
> Subj
>The company I work for had no security at all when I started here.
I've
>made a number of improvements, but I'm trying to come up with a defense in
>depth security plan, and I thought I'd run it past you guys to see if I've
>missed anything. In no particular order, they are as follows:
>1)
sometimes ODBC info is put in the registry for security. If this is the case
you might have problems but generally it should not create problems.
-Sanjay
- Original Message -
From: "Lubrano di Ciccone, Christophe (DEF)" <[EMAIL PROTECTED]>
To: "'Kevin Wharram'" <[EMAIL PROTECTED]>;
<[EM
The classic:
W.R. Stevens, TCP/IP Illustrated V.1
ISBN: 0201633469
-scm
TC:Teodorski, Chris
TC>
TC>
TC>Can anyone point me to a good resource to learn how to read these? I have been
running ethereal.and I'm trying to make sense of what I have in my capture.
TC>
TC>To try and learn, I
I am uncertain as to whether this falls under the heading of security or is
more properly, a privacy issue, so I'll leave that to the moderator.
As a matter of policy, we bounce any spam sent us. As is often the case,
those bounces may go to invalid addresses, resulting in a bounce from those
11 matches
Mail list logo