Not that I know of but you would not want to even if the was. The only way
to recover a router if the password has been forgotten is to console into
it. That requires The engineer to be on site and to have access to the
"secure" area where the equipment has be deployed. If you were/are able to
"
Believe it or not, this does seem pretty rock solid advice. So the next
question would be what steps would one take to protect the perimeter
router???
Thanks,
//John
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Thursday, November 14, 2002 8:24 AM
To: [EMAIL
As an aside:
Does anyone know where the autocomplete data is
stored? I've checked the registry and have scanned
loads of binary files on my own Win98 machine with no
luck. I used sysinterals.com regmon and filemon, but
it didn't help.
Thanks,
Donnie
--- Jim Markley
<[EMAIL PROTECTED]> wrote:
> S
The packets do not have to go directly to the source IP. They have to
get to something that can get them to something... that can get to the
source IP. Extrapolate proxies.
Jim
Bill Hamel wrote:
>
> Then routing wise, how do the packets find their way back to the firewall
> if they don't know
Please do a google on "TCP Hijacking".. very
possible.. not very easy.. but applications like
"hunt" ( for the script kiddies ) exist..
--- Pablo Gietz <[EMAIL PROTECTED]> wrote:
> Dear list:
> It's possible that a intruder could take active part
> of a TCP connection
> after this was establishe
Why would you want to do that? Is it company owned or privately owned?
If company owned, then if you quit or get fired, only you know the
password to the router itself else the next expert will have to
reconfigure the router changing the bits so that the password no longer
exists creating time...
Hi all,
I have seen and read some of the Firewall vendors say that their firewall
throughput is put 380 mbps or 1Gbps with some 2,80,000 concurrent sessions.
What does it mean ? Please clarify me.
Thanks in advance..
Sai
The 802.11x (I think that's what it's called) system may be what you are
looking for. This system utilises the client authenticating to a RADIUS
server via EAP. Most Cisco wireless gear has this WEP type (called
LEAP). It's quite strong and the keys change regularly at predetermined
intervals.
Eve
| -Original Message-
| From: Ross Nelson [mailto:[EMAIL PROTECTED]]
| Sent: 12. november 2002 23:03
| Subject: RE: Secure e-mail
|
| Yes, but GnuPG is licensed under the GPL, isn't it? You could use
| that as an alternative. The downside to GnuPG, if it is an option,
| is that it's done
Only after flipping to the proper configuration:
BRAIN on
"Sergey B. Kamyanov" wrote:
>
> Best UNIX management tool is /dev/hands :)
>
> Regards,
>
> Sergey Kamyanov
>
> System Administrator
> R.I.S.K. Co
> http://www.risk.az
>
> > -Original Message-
> > From: Chuck Spafford [mail
James,
I would still practice RFC1918 and RFC2827 at your edge router
Stephen Wilcox
R & D Specialists
Universal Computer Systems
Voice: (713) 718-1800 ext. 2172
Email: [EMAIL PROTECTED]
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Thursday, November 14,
You can have a look at CERT's site for information
about these FTP commands.
E.g.; for PORT command, please see the following
links...
http://www.cert.org/advisories/CA-1997-27.html
http://www.cert.org/tech_tips/ftp_port_attacks.html
--- Charley Hamilton <[EMAIL PROTECTED]> wrote:
> I've used
The packets have the firewall's external interface ip as their destination
ip field; the firewall handles the address translation back to the internal
host. When you initiate an outbound connection from an internal host, the
firewall substitutes the 'hide-NAT' address (the firewall's external
inte
If you want full control of network read/writes use
libnet/libpcap.. have a look at tcpdump.org..
Using libnet/libpcap you can write directly to the
wire.
--- Paulo Abrantes <[EMAIL PROTECTED]> wrote:
> Hello Vik,
>
> What the attacker does is not allowing the Kernel to
> fill in the IP datagra
Willie -
We too were faced with this issue. Here are the things we did to somewhat
lock them down..
first we determined what internal resources they needed I.E. printer access
internet access etc etc..
using NT we brought them on the domain with timed access from x to y for
instance if the contr
At 11:44 PM 11/13/02 -0500, you wrote:
I never agreed with it, but one
of their reasons to open this was passive FTP. Their reason was a lot of
the sites that were visited used Passive FTP, that randomly uses any port
above port 1024.
quick reply, hope this hasn't been covered ad naseum...
a s
Dear all,
We recently deployed a web server on Solaris 8(Intel), with
apache 1.3.27 and ipfilter firewall.
Is this a good combination or any issues, comments ?
regards
anant
Our Network Operations group recently noted an increased failure on snmp
queries against our internal routers and switches. After tracking down the
offending IP address, we discovered that our Desktop group had deployed
Microsoft SMS company- wide and it was attempting network discovery by
sending
Stephen, et al,
I agree whole heartedly with 2827 filtering and the PIX can do that as well
(router can too). I however, disagree with 1918 at the edge router. The
ASA algorithm in the PIX makes it a better location to handle the NATing of
public to 1918 addresses. Also, the edge router is n
I haven't tried this on Linux.
I guess nobody cares about having zombie sessions on their machine Have to come up
with a proof of concept attacks.
Regards,
Leonard Ong
Network Security Specialist, APAC
NOKIA
Email. [EMAIL PROTECTED]
Mobile. +65 9431 6184
Phone. +65 6723 1724
Fax.+
Hi,
I have loaded a preset config for Internet Explorer 6. Now most of the settings e.g.
proxy, dial-up, etc are greyed out. Anyone knows how to unload the config file and
regain access to settings ?
Thanks
Regards,
Leonard Ong
Network Security Specialist, APAC
NOKIA
Email. [EMAIL PROTECT
For example:
my bank uses the last digits of the SSN to login..
so all you need to compromise my account is my account
number and the last four digits of my SSN.
and how does one get my SSN or bank account number??
dumpster diving!!..
also: some websites use the SSN as the login.. and
then so
22 matches
Mail list logo