RE: Telnet/SSL v SSH

2002-09-21 Thread tide
Reading this: ``HTTPS support : you can sniff http SSL secured data... and even if the connection is made through a PROXY'' from: http://ettercap.sourceforge.net/ would make me feel bad while using telnet over ssl. Correct me, If I'm wrong but telnet and http trough an ssl tunnel is the very same

Re: help learning to read tcpdumps and network captures

2002-09-21 Thread Frederick Garbrecht
You need to have a good understanding of tcp/ip itself and the protocols that run on it. A very good introduction is tcpip illustrated: http://www.amazon.com/exec/obidos/tg/detail/-/0201633469/qid=1032614292/sr=8 -1/ref=sr_8_1/102-1097914-6536962?v=glance&s=books&n=507846 SANS offers various cou

Re: Setting up LAN: problem...

2002-09-21 Thread J . Reilink
- Original message - On Fri, 20 Sep 2002 08:50:43 + "sifu ." <[EMAIL PROTECTED]> wrote in message <[EMAIL PROTECTED]>: > > hello! > > I've recently bought an E-TECH ROUTER/SWITCH with the purpose of > building a home network. The problem here is that I don't get a LAN > signal on th

Re: ipchains help

2002-09-21 Thread Nikolai
On Sat, 2002-09-21 at 05:41, Mike Arnold wrote: > -A input -i eth0 -s 0/0 -d 0/0 -p icmp -l -j DENY > > I think Thanks, the test returned 'blocked', I feel better now :-) > You might also want to add > > -A input -i eth0 -s 0/0 -d 0/0 -p udp -l -j DENY > > to block UDP protocols connection

RE: MASTERS DEGREE PROGRAMS IN SECURITY

2002-09-21 Thread Mark L. Jackson
// I am looking for Masters degree programs in "Information // Security", "Information Assurance" or "Information Warfare". // // I live in the Washington, DC area. Now I'm aware of three local // institutions that have some form of this type of program, // George Mason, // James Madison and

Re: ipchains help

2002-09-21 Thread Dave
Hi, Well in your line -A input -i eth0 -s 0/0 -d 0/0 -p tcp -y -j DENY -l you specifically block ONLY tcp connection attempts. so udp/icmp etc are still allowed. You can use -A input -p icmp -j DENY -l but that still allows for UDP. You cannot block all UDP if you want DNS to work, so

RE: help learning to read tcpdumps and network captures

2002-09-21 Thread Daniel Miessler
I suggest TCP Illustrated, Volume 1, by Stevens. It is the standard for learning the protocols that you are looking at. --danielrm26 > -Original Message- > From: Teodorski, Chris [mailto:[EMAIL PROTECTED]] > Sent: Friday, September 20, 2002 11:40 AM > To: Security-Basics (E-mail) > Subj

Re: Defense Plan

2002-09-21 Thread Jamesz
>The company I work for had no security at all when I started here. I've >made a number of improvements, but I'm trying to come up with a defense in >depth security plan, and I thought I'd run it past you guys to see if I've >missed anything. In no particular order, they are as follows: >1)

Re: Power user versus Administrator

2002-09-21 Thread spatel
sometimes ODBC info is put in the registry for security. If this is the case you might have problems but generally it should not create problems. -Sanjay - Original Message - From: "Lubrano di Ciccone, Christophe (DEF)" <[EMAIL PROTECTED]> To: "'Kevin Wharram'" <[EMAIL PROTECTED]>; <[EM

Re: help learning to read tcpdumps and network captures

2002-09-21 Thread shawn merdinger
The classic: W.R. Stevens, TCP/IP Illustrated V.1 ISBN: 0201633469 -scm TC:Teodorski, Chris TC> TC> TC>Can anyone point me to a good resource to learn how to read these? I have been running ethereal.and I'm trying to make sense of what I have in my capture. TC> TC>To try and learn, I

Why are our bounce returns monitired by a thrid party?

2002-09-21 Thread Robin Lynn Frank
I am uncertain as to whether this falls under the heading of security or is more properly, a privacy issue, so I'll leave that to the moderator. As a matter of policy, we bounce any spam sent us. As is often the case, those bounces may go to invalid addresses, resulting in a bounce from those