Thats just 1 class, so far i found 4 others.
Robb, Bev writes:
Some info from Spade:
OrgName:America Online
OrgID: AOL
NetRange: 152.163.0.0 - 152.163.255.255
CIDR: 152.163.0.0/16
NetName:AOL-BNET
NetHandle: NET-152-163-0-0-1
Parent: NET-152-0-0-0-0
NetType:
Try looking at www.pricewatch.com no bidding hassle, and usually pretty cheap.
Hope it helps.
*** REPLY SEPARATOR ***
On 11/29/2002 at 7:01 PM Jay D. Dyson wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Sat, 30 Nov 2002, ALBEE,RUSSELL. S FC2 (CV63 CS5) wrote:
Does
In the alternative, you could buy a brand new system with an 800MHz
processor, 256 meg RAM and Lindows 2.0 for $200 at (don't laugh now) ---
http://www.walmart.com
Yep. Bought one for my 77 year old mother and another for my mother-in-law.
They run great and meet all their needs. Then I convinced
The Entity currently known as Chris emitted:
I'm blocking these ips though IPchains, but i really would like to know how
to get every class owned by aol so i can block them all.
Receiving mail from aol is no big thing to me, considering 99.9% of the time
is junk or spam.
Is there some way to
From: Dozal, Tim [EMAIL PROTECTED]
I think were a bit off the original topic now. I really don't consider
physically damaging the router by ripping out the console port a viable
security method but sure if that floats your boat by all means destroy
the router and buy a new one if you ever need to
AFAIK
MD5 is a one-way hashing system. If you can reverse that, congrats.
Change your ISP?
-Original Message-
From: flur [mailto:[EMAIL PROTECTED]]
Sent: 01 December 2002 00:14
To: [EMAIL PROTECTED]
Cc: cyber_armstrong
Subject: Re: Can anyone break MD5 scheme?
Perhaps a less
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Webtrends, NEtIQ will do that for you on Wintel platforms.
- -Message d'origine-
De : Niall O Malley (LMI) [mailto:[EMAIL PROTECTED]]
Envoyé : lundi 2 décembre 2002 9:49
À : [EMAIL PROTECTED]
Objet : Log Analysis
Hi,
Are any of you
On Mon, 2002-12-02 at 03:48, Niall O Malley (LMI) wrote:
Hi,
Are any of you aware of a tool that will allow an administrator to analyse log files
and produce statistics based on the log content. I want to see what sites have been
accessed, how many times etc.
Perl.
Next time, if you'd
I recently downgraded my security from NTLMv2 only to NTLMv2 refuse LM
responses.(for SAMBA) We're having an intermittant problem where some users
can't log off of win2kpro. I don't have profile limits set. Basically what
happens is they go to start, logoff, then hit yes, and it just drops
Not sure about windows, but there are alot of tools like that available for
Unix/Linux
Webalizer will show you traffic to and from sites (plus alot more info) on
a graph and plain text.
If you mean 'sites' as in what computer has been accessed from where, check
sourceforge.net or freshmeat. i
Garbage cans around big companies. Your local LUG and 2600 should have
people that would know where to find these items for $0.
On Mon, 2 Dec 2002, simsjs wrote:
Date: Mon, 02 Dec 2002 11:59:25 -0800
From: simsjs [EMAIL PROTECTED]
To: security-basics [EMAIL PROTECTED]
Subject: Re: Low end
Are any of you aware of a tool that will allow an administrator to analyse
log files and produce statistics based on the log content. I want to see
what sites have been accessed, how many times etc.
I want something preferably in real time with a gui/html interface. If it
was
I found a un-managed ftp server floating around our network.
I am quite sure the machine itself had not been compromised completely, but
I found a directory in there with the above name.
Has anyone else seen this before?
Any help or advice appreciated.
Cheers
JM
On 30/11/02 04:21 -0500, Chris wrote:
snip
I'm blocking these ips though IPchains, but i really would like to know how
to get every class owned by aol so i can block them all.
If you run your own email servers, use access.db
@aol.comREJECT
A whois on aol.com shows 4 different
Hi,
There have already been many excellent suggestions regarding this topic.
I just thought I'd make mention of another product to add to the mix:
SafeGuard PrivateCrypto
http://www.utimaco.com/privatecrypto/eng_privatecrypto.html
I don't personally use the product, but know a few people who
Not being able to distinguish between a valid client or
not from a network perspective makes it pretty hard. You can
easily stop this accross the board (with a router, etc).
It may be a bit more of a hassle but if you know the valid
clients MAC address ahead of time you could filter out that
way
From: Jason Yates [EMAIL PROTECTED]
But don't think banning aim is easy as a firewall rule. Let me give you a
personal example. A previous employer of mine, decided blocking instant
messaging was a good idea. They simply blocked, on the firewall, the
default port AIM uses, problem fixed
Does anybody know of any good locations online to purchase old 486
machines or low end Pentium machines for use as a Firewall and/or IDS?
I've tried searching on google and just keeping getting links to
Pentium 4 computers. I will be using either a Linux or BSD flavor on
these machines.
Doing a whois \ \[EMAIL PROTECTED] reveals:
[whois.arin.net]
OrgName: America Online
OrgID: AOL
Address: 8619 Westwood Center Drive
Suite 200 Vienna VA 22182
Country: US
Comment:
RegDate: 1992-04-01
Updated: 2002-11-22
AbuseHandle: AOL382-ARIN
AbuseName: America Online, Inc.
Hi..
Well that just depends on what service you're refering to? There is a bunch of
them out there.
Personally I prefer ACID(http://acidlab.sourceforge.net) for Snort and
Fireparse(http://aaron.marasco.com/linux.html) for Iptables. The best way to
find out yourself is to look at
Perhaps a less controversial solution to get your linux box online would be
to designate an older machine running MS Windows as a router... There is
lots of software that will do this for you (ie Sygate, WinRoute, etc). With
few access list rules you can make the router quite transparent, and
Hello,
As for MD5, to the best of my knowledge, brute force is the only way to
'crack' it... however I have heard rumors that some implementations are
weaker then others.
Brute force is the least efficient attack against MD5, the next best thing
is a 'birthday attack' which is based on the
Hi,
Out of curiosity - does your mail server not allow you to reject all mail
from *@aol.com?
Would that not be a little easier than blocking all of their IP addressing
blocks?
Then again, there are some other benefits to blocking them at an IP level
g
Byrne G
- Original Message -
Is there some way to whois arin on a nic handle to get all the classes?
also depends on what you call 'AOL'. Here are the records for
'AOL-NOC-ARIN'. But should the Netscape division be considered
part of AOL as an ISP?
152.163.0.0-152.163.255.255 America Online
Some info from Spade:
OrgName:America Online
OrgID: AOL
NetRange: 152.163.0.0 - 152.163.255.255
CIDR: 152.163.0.0/16
NetName:AOL-BNET
NetHandle: NET-152-163-0-0-1
Parent: NET-152-0-0-0-0
NetType:Direct Assignment
NameServer: DNS-01.NS.AOL.COM
NameServer:
Hi,
I have prepared an .ins and .cab file that can be used to lock starting URL,
Connection tab, and Internet Connection Wizard of user IE's. The question is, is
there a way to overcome this setting once imported and how about changing setting of
individual item via registry i.e where are
I know mac addresses can be spoofed pretty easily, but could you setup an
access list or filter that would disallow all mac addresses except for the
ones specified on your network(s)?
The initial setup would probably be tedious, but it's worked fairly well to
keep most unauthorized logins off the
Are their any tools that will take a zone transfer dump and map a
network out of it? I usually come across clients who allow zone
transfers and we are able to see names of all their servers and IP info.
It is possible to draw quiet a detailed network map from this info.
Are their any tools that
28 matches
Mail list logo