RE: Interesting One

2002-10-31 Thread lvickers
What of the case of "defragging the disk". Does this not reset the drive space pointers? Mr. Leonard J. Vickers ERDC-ITL Alexandria . VA Chief, ITCC CEERD-IM-A V: (703)428-6616, F:(703)428-6747 -Original Message- From: Joe Barrett [mailto:barrettj@;wam.umd.edu] Sent: Tuesday, October 29,

RE: Interesting One

2002-10-31 Thread Rygg Christian
Any chance of making it less maths independant, for those of us who prefer that? :) -Original Message- From: Dora Furlong [mailto:sparrowh@;deathstar.org] Sent: Wednesday, October 30, 2002 4:48 AM To: [EMAIL PROTECTED] Subject: RE: Interesting One Hmm this is an interesting topic.cons

Re: Interesting One

2002-10-31 Thread Meritt James
Melting - an interesting concept. Once the magnetic material passes its curie point, what would remain? Personally, I still like the way the plastic substrate vaporizes when it burns... Jim [EMAIL PROTECTED] wrote: > > John, actually, we beat this topic to death about a year ago. Your good > k

RE: Newbie: RedHat 8 or OpenBSD??

2002-10-31 Thread Michael Vaughan
In answer to your question..."It Depends". It will depend on how experienced your engineers are with Linux. OpenBSD can be a pain to install and configure. RedHat on the other hand is comparatively easy to setup. OpenBSD from what I understand is the most secure version out of the box but again s

RE: Interesting One

2002-10-31 Thread Tim Donahue
You are using software to try and recover information. If you can recover files after filling the platter with zeros 4 or 5 times and recover it without a direct attack on the platters (ie,using a SEM), then why is it so hard to believe that specialized HARDWARE can recover it after 30 times? A

Re: Interesting One

2002-10-31 Thread Candice Ward
Of course it wouldn't need to be done at all after the fact if a simple keyboard logger had already been placed on the monitored computer while its user or owner was away from the office on 10/30/02 8:42 AM, Tim Donahue at [EMAIL PROTECTED] wrote: >> Yes, it can be done.. it would cost abou

RE: Interesting One

2002-10-31 Thread Michael Vaughan
Folks, Here is how to erase a hard drive securely. 1) Boot to a floppy and wipe it securely using a program that randomly encrypts the sectors on the hard drive as it runs 10-20 times. 2) Take the Hard Drive out of the computer/server and set it on a bench AWAY from other magnetically sensitive m

RE: Interesting One reading a 30x over-written drive

2002-10-31 Thread mike
DoD drives that contain classified data must be destroyed (typically through incineration). Drives that didn't contain classified data may go through the 7 wipe process you mention. BCwipe is a program for windows that does a good job. At least some data can be restored from a drive with anyt

RE: Newbie: RedHat 8 or OpenBSD??

2002-10-31 Thread Golden_Eternity
Setting aside any religious preference, I wouldn't suggest using a x.0 or x.1 redhat release for your server. Before they blew their numbering scheme with 7.3, I would have said to stick with a .2 release. So, if you're gonna do redhat, do 7.3. Its a tested version and its a release they're going

RE: Interesting One reading a 30x over-written drive

2002-10-31 Thread Dan Darden
Man this is the best thread I have seen yet. Some great info and links for further research. My personal goal is demystifying that 'NSA Standard' It seems there are about as many standards as a normal government beauracracy! 7, 9, 30, 100 how many times IS IT exactly? (I guess that's w

RE: Interesting One

2002-10-31 Thread Chris Chandler
This is true; I can see how specialized hardware can recover some data that has been "formatted" say 30 times. At what point though does the recovered data still have any usability? When I do recoveries, I only charge for USABLE Megs of information as well as a standard fee. Nothing outrageous, mor

RE: TCP DNS requests

2002-10-31 Thread Paris E. Stone
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Question to ask, do you have a windows 2000 domain controller on your network? If so, it could be the culprit. Windows 2000 domain controllers require DNS to function and if you set it up to read DNS from your DNS server, it is probably hammering you

RE: Interesting One

2002-10-31 Thread Trevor Cushen
Maybe this will help. http://www.techtv.com/screensavers/answerstips/story/0,24330,9165,00.htm l It is magnectic polarity at work not as fancy as atoms. You may be looking for this http://www.qubit.org/ Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -O

Re: Interesting One

2002-10-31 Thread easy
hi there, about the recovery take a look at this: www.runtime.org GetDataBack it's a great tool! Best regards, Kiril Tsvetkov, BG

RE: Interesting One

2002-10-31 Thread Jimmy Liang
Interesting tho. How would the recovering software know if the data you're retrieving comes from the 30th re-write, or the 29th? You also have to consider that the data you're trying to recover isn't the first data written to the disk. So even if the atoms are not all aligned the right way, you wou

RE: Interesting One

2002-10-31 Thread Trevor Cushen
Thanks James Taylor I was wondering where I got the seven from. I have looked at the DOD standard that disk wiping products talk about and it has no number in it (Orange book). Other US government documents talk about three levels of disk destruction, wiping, degaussing, and destruction. This ma

RE: Interesting One

2002-10-31 Thread Mark Ribbans
2c.. >From my experience working in the IT dept of a defence\aerospace company, the standard for wiping hard disks that had contained classified or higher data was to smash it with a hammer and chisel and have it disposed of. Mark Ribbans

RE: Interesting One reading a 30x over-written drive

2002-10-31 Thread Nero, Nick
Okay, I had read 3 times (which I forgot to put in the first email), but have since seen 7 referenced several times. A buddy of mine who did work for the NSA said they did 3 as well, so maybe it got increased recently (maybe the same time they showed DES to the door for AES). In any case, if the

RE: Interesting One

2002-10-31 Thread Trevor Cushen
I looked further at this DOD standard which was showing different numbers from various people (including myself) Here is an interesting article that discusses the DOD standard in the context of disk wiping software. Worth being aware of. http://www.darkstonedata.com/business/security8.html Tr

Interesting one

2002-10-31 Thread Trevor Cushen
I was sent this which seemed quite a coinicence as I am eagerly following the thread on disk forensics etc. I though the rest of you would see the humour. http://w1.270.telia.com/%7Eu27007970/ghetto.htm Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 **

RE: Interesting One

2002-10-31 Thread David
Actually, the DoD standard is : Secret - three times overwriting using approved software, but must be reused in a secret or higher level machine Top Secret - must be degaussed and broken up (with specific size of pieces limits) Top Secret Compartmentalized - melt in furnace or media surface remove

Re: Interesting One

2002-10-31 Thread Vlad
U.S. DoD - seven pass extended character rotation wiping [DoD 5200.28-STD]. And for the sake of argument the program i use has a limit of 100 passes. - Original Message - From: "maillist" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Wednesday, October 30, 2002 7:45 AM Subject: RE: Inte

Re: Interesting One

2002-10-31 Thread ATD
I have heard similar claims from "agencies" about the ability to recover data after multiple re-writes. I also happen to know that several of these "agencies" when doing drive disposal, literally drill holes in their drives then incinerate them. That is after they wipe the drive clean several times

RE: Interesting One

2002-10-31 Thread John Orr
You are correct, and I was a bit hasty in my initial response. I suppose my general distrust for salesmen is showing! I am no stranger to the world of physics, and Scanning Microscopy is certainly no exception. However, I *assumed* (my mistake) from the original post that the salesperson was

RE: NetBIOS Messenger spam - how did it get in?

2002-10-31 Thread Damon McMahon
Ahhh yes my mistake, mixing up the source and destination addresses. Of course, this begs the question why internet routers do not filter on source address, but I'm sure the ISPs have their own self-justifying reasons... 1. Is this possible? I would have thought any packet with such a spoofed

RE: Physical Firewalls VS NAT

2002-10-31 Thread Leonard.Ong
Hi Rick, The physical firewall will provide much more than blocking incoming request. 1. You may want to block outgoing connection to certain IP address / location 2. you want to implement Anti-spoofing 3. You want to have control of what incoming connection allowed and what's not, rather than d

Re: Physical Firewalls VS NAT

2002-10-31 Thread Chris Berry
From: "Rick Darsey" <[EMAIL PROTECTED]> I am doing some research for one of my clients. They have requested a physical firewall installed on their network. They are already >running a NAT'ed network behind a LinkSYS router. In this situation, what benifits, if any, will the physical firewall pro

Bootable vuln CD for Windows

2002-10-31 Thread Alexandros Papadopoulos
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Dear all. I'm looking for a way to scan existing Windows XP installations for trojans, viruses etc. The closest match to my needs seems to be Nessus, but I have the following reservation: Since the client has to be installed on the running Windows

RE: ports 29990 and 51417 scans

2002-10-31 Thread Jake Scobie
My search turned up that port 29990 is a very common game server port, RTCW, and Threewave. Port 51417 I found nothing useful on. Hope this helps. -Original Message- From: Dallas Jordan [mailto:DJordan@;sawgrassink.com] Sent: Wednesday, October 30, 2002 11:22 AM To: Security-Basics (E-m

Best Practices - DMZ Security.

2002-10-31 Thread tony toni
Hi, What are the best security practices for a DMZ? Or put a different way...what are things you should never allow to be done on a DMZ? To give you an example of what I am talking about we have had our DMZ set up for about 5 years. However we keep getting stranger requests for activities

NetScreen remote to PIX VPN configuration examples

2002-10-31 Thread Kevin Jones
Hello all, Looking for resources on configuring a NetScreen client to connect to a PIX VPN device. Any leads? Cheers, Kevin

RE: TCP DNS requests

2002-10-31 Thread Mike Powell
Carl I believe that DNS lookups use UDP because the request and response can each fit into one packet. If a DNS request is for some reason larger than 512 bytes which is the maximum size for a UDP packet (RFC1035 [6]) then the client will use TCP instead. Closing this port to internal clients co

RE: TCP DNS requests

2002-10-31 Thread Meidling, Keith, CTR, OSD-C3I
One program I know of that uses TCP requests for DNS requests is Microsoft's SMTP server that's bundled with IIS. There's a KB artilcle on MS's website that states that the RFC for DNS servers should be able to accept UDP and TCP requests. MS took this to extreme and set their SMTP server to ONLY u

Re: Sniffing Howto

2002-10-31 Thread phani
On Wed, Oct 30, 2002 at 12:25:41PM +, Nuno Branco wrote: hello, > > I am working with gcc and libpcap and i already read the tutorial in > www.tcpdump.org. I also tried looking around dsniff source code, but > that's a little ahead of me right now, I want to do more simple stuff > just for lea

RE: TCP DNS requests

2002-10-31 Thread Daniel Miessler
Zone Transfers use TCP instead of UDP on port 53. That is most likely what you are seeing. --Daniel > We are reporting TCP based DNS requests to one of our DNS servers coming > from internal, client IP addresses. My manager would like to block the TCP > packets. What or why would their be rand

RE: TCP DNS requests

2002-10-31 Thread Raghu Chinthoju
TCP/DNS(53) is used for zone transfer. To be simple, TCP/DNS(53) is used between the name servers to exchange/update there name databases where as UDP/DNS(53) is used for querying. I see two possibilities for having generated TCP based DNS requests in your network. 1. You must have another DNS se

Newbie: RedHat 8 or OpenBSD??

2002-10-31 Thread GSG Designs
I'm fairly new to this, so please bare with me. If this question has been asked in the past, I apologize. I'm new to the listserv as well. We are discussing starting our own web server. There is debate on whether RedHat 8 or OpenBSD is more secure. What are your thoughts? We will be doing

Filtering new KaZaa!!!

2002-10-31 Thread Soporte
Hi Guys!!! I am trying to block KaZaa using access lists, I read many tips like blocking port 1214, block the Morpheus network, but with the latest version of KaZaa it seems that not work, why? Let me explain... I have Kazaa Media Desktop 2.0 (Built: Friday, September 20, 2002 16:14:03), a

Basic Question only

2002-10-31 Thread Christopher Rea
I am sure that this is a silly question, but who are these guys that keep trying my firewall on port 53 (DNS) and port 8. I am sure they must be the good guys, but why do they keep knocking, I only have one DNS server that is setup for lookup mode ??? 66.28.34.130 204.71.35.136 212.62.17

RE: TCP DNS requests

2002-10-31 Thread Louis Erickson
I believe DNS uses TCP in certain circumstances. If I recall correctly, if the request to the DNS server generates a reply that's too big for UDP, it will use TCP instead. If you block TCP, you'll see strange behavior from your DNS server - it'll work sometimes but not others. Your internal clie

Re: TCP DNS requests

2002-10-31 Thread Douglas K. Fischer
At 08:46 AM 10/30/2002, Carl R Diliberto wrote: We are reporting TCP based DNS requests to one of our DNS servers coming from internal, client IP addresses. My manager would like to block the TCP packets. What or why would their be random TCP packets? We monitored several clients and it appears

Re: TCP DNS requests

2002-10-31 Thread Martin Wasson
udp is used for normal domain queries. tcp is used for zone transfers and large queries. Stopping it at the firewall (tcp/53) can be safe and will definitely stop any zone transfers, but the occasional DNS query might not work. It is better to use named.conf to control zone transfers. M.W.

RE: Interesting One

2002-10-31 Thread Chris Chandler
When they say it can be retrieved if a drive has been formatted up to 30 times, they are probably a little ambitious. Most formats are done using "format c:" and nothing else. Again, this just removes the pointers. When I redo a drive, I run a zero fill 3 times over it. Then to test whether or not

Re: NetBIOS Messenger spam - how did it get in?

2002-10-31 Thread stef
It is not as simple as it was presented here - in theory it could be done through source routing (and this assuming that all devices on the way "cooperate" in letting you do that) - you first do a traceroute from the station you want to reach it from, to the external interface of the NAT-in dev

Re: Viewing web content off-line (Apache) - default Oracle install ofself-service apps

2002-10-31 Thread Chris Berry
From: "Pablo Gietz" <[EMAIL PROTECTED]> You should encrypt the output from apache server, redirecting ports, and develop a personal browser that decrypt the pages "only for your eyes", making no chache of anything. Thats a pretty good idea, you could use some perl modules to slap together a spec

RE: Interesting One

2002-10-31 Thread David
John, actually, we beat this topic to death about a year ago. Your good knowledge of physics is misleading you. An extraordinary understanding of physics provides us with tools such as Magnetic Force Scanning Tunneling Microscopy which can recover data, with no theoretical limit of how many times t

Re: Interesting One

2002-10-31 Thread Jac
Bits being either on or off is not quite true. In a perfect universe this may be true, but the one we are in is far from perfect. Media writers are not capable of perfect over writing. There is always a small level of write error that occurs and the magnetic traces of previous writes are left behin

Re: Interesting One

2002-10-31 Thread Meritt James
The only thing that I would add is that total physical destruction works real, real well and is preferred if you don't plan on using it again. A furnace works really well and has other uses. (Plastic burns good) Jim Dan Darden wrote: > > I have never seen the process done, however have heard s