Re: IIS running with least privs..

2002-11-06 Thread McKenzie Family
Guys, Is it possible to make the IIS application itself run with as little as possible privs on the windows box itself? Its to my understanding that it runs with system privs... Can this be changed some how? Or is it essential? Regards

Re: Risk of using SS#s (last 4 digits) for authentication

2002-11-06 Thread Andy Cowan
How many help desk techs do you have, is the real question. Every person who has access to any part of employee SSNs is a potential risk for identity theft and fraud. Suggestions for alternatives: 1) Use another number 2) If you must use part of the SSN, consider setting up an app where the

RE: Smart card help

2002-11-06 Thread Xu He
Take a look at the ikey or ActivCard ActivKey. They are SmartCard and reader in one, so you don't have to carry a reader around all the time. It's also plug and play, works great in Windows environment. I think it is probably an expensive implementation of PKI. Usually people use PKI as a

RE: Protecting PIX Firewall at the Perimeter Router

2002-11-06 Thread John Canty
I have the same config here 1720 perimeter and pix 515e. The pix can be set to receive telnet and pdm from one and only one IP and you can also set the interface on which it will see that IP. The router, I am less familiar with. I believe you may be able to do the same. The only downside is this

RE: Network Configuration Question?

2002-11-06 Thread Naman Latif
Whenever the switch receives a packet for which it doesn't find the destination mac address in its forwarding database, it sends that packet to all Ports in that VLAN. These are known as unknown unicast messages. You probably are seeing those packets. One way to block this is to have the ports

Apache-SSL

2002-11-06 Thread Mayur Kamat
Newbie question: I need to setup up a secure webserver. Do I install apache 2.0 and then go for mod-ssl or open-ssl OR do I directly opt for the apache-SSL project? which one is better in terms of security, functionality and convinience (in the same order of priority). thanks in advance, Mayur

RE: pc anywhere is safe?

2002-11-06 Thread Martin K. Lee
Safe in this case I assume you are referring to the encryption level. VNC/SSH can be relatively safe. Encryption is weak for PC anywhere 9 http://online.securityfocus.com/bid/1093 -Original Message- From: SB CH [mailto:chulmin2;hotmail.com] Sent: Tuesday, November 05, 2002 5:47 PM To:

RE: Securing DNS Server

2002-11-06 Thread Naman Latif
Thanx Bennett for understanding my question correctly. This information would definitely help. I did get some other useful suggestions like using + Try adding this to named.conf: options { query-source address * port 53; }; ++

RE: Re: Secure Intranet?

2002-11-06 Thread Danny.Carroll
If HTTPS is not secure enough, than why do banks use them? Just wondering... Because *most* people see the litle padlock in the status bar and think that it's secure. So the banks humour them. On the other hand it *does* provide some, if not fairly trivial security. -D

Symantec Corporate AntiVirus 8.0 - thoughts

2002-11-06 Thread Scott Plumlee
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Anyone have any opinions on this for managing workstation virus checkers? Doing it by myself and trusting the users to update is getting tedious. I'm interested in anyone running it on a Novell network especially. What do each of the modules

RE: Protecting PIX Firewall at the Perimeter Router

2002-11-06 Thread Gordon Brandt
Cisco has some very good documents on their site regarding the basic security configurations for routers. I do not, unfortunately, have the URL. That being said, there are a few things that you may want to place on your router 1. Block incoming traffic originating at RFC1918 private addresses.

Re: Securing DNS Server

2002-11-06 Thread Bennett Todd
2002-11-05-14:36:41 Naman Latif: Try adding this to named.conf: options { query-source address * port 53; }; ++ Which would have the originating queries only from Port 53, thus making it easier to implement in the firewall. It may make it easier to

Re: Protecting PIX Firewall at the Perimeter Router

2002-11-06 Thread rsavage
Yes, snmp for one. Then you might consider services you don't/won't ever need to be seen from the internet (like sun rpc services, any type of network back services, application service ports, etc.) If you only need something like port 80 open, then map out a way to only allow that port opened.

RE: Securing DNS Server

2002-11-06 Thread Steven Schullo
Naman, Unless this DMZ DNS system will provide name lookups for public clients, you only need to ensure your public to DMZ gateway/firewall/router will allow outbound syn connections and inbound ack connections to the DMZ DNS box. This will effectively limit any public system from establishing a

Re: Protecting PIX Firewall at the Perimeter Router

2002-11-06 Thread William Kupersanin
How about blocking packets with a source address of the internal networks and rfc1918 networks coming in on the serial interface and vice versa on the ethernet interface. -- Willie On Mon, 4 Nov 2002, Naman Latif wrote: Hi All, I wanted some suggestions\practical experiences for

Re: Network Configuration Question?

2002-11-06 Thread Pablo Gietz
Read This, may be related. http://www.phenoelit.org/arpoc/ Also I want to ear the experts opinion about this or similar soft. This work? this represent a risk? Thanks Pablo A. C. Gietz Jefe de Seguridad Informática Nuevo Banco de Entre Ríos S.A. Te.: 0343 - 4201351 - Original Message

RE: Re: Secure Intranet?

2002-11-06 Thread ONEILL David J
The only problem I see with your solution is that you are assuming that the partner on the other side of the VPN is keeping to the same level of security as your own system (at least as secure as your own.) What if the partner organization is an easy target? The VPN will allow an intruder to