-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I have a client who has a fiber optic line between two buildings.
There is no physical security and so they are concerned about someone
tapping into the fiber line and capturing data.
I read something a while back about tapping fiber optic lines
Hi,
Can anybody recommend a good SELF PACED CBT on CD(s) or Web Based Training?
I am interested in taking some advanced level security courses on UNIX,
Win2k, firewalls, vulnerability assessments, firewalls, networks, etc. I
just finished taking the SANs UNIX self paced course and my
I've run across a couple log entries on my OWA server. I'm pretty new to
security (about a decade as a network admin, now taking on more and more
responsibility) and have Googled the Propfind command... only a handful
of results (including a MS Whitepaper I am currently reading).
Does anyone know
Sharon,
Here is a sample message:
Authorized Use Only!
You must be assigned an account to access this computer and the network.
The information on this computer and network is the property
of this organization and is protected by intellectual property rights.
Anyone using this system
www.eventid.com has explanations for most of the event codes that show up
in
the logs. Great resource as they have stuff that is just not to be found
at
Microsoft's sight unless you know what you are looking for in advance.
Don't know what is up but that site is not available and came with a
You could use something like antisniff from @stake.
Another solution would be to stand up a *nix or windows box with a name like
database or something that sounds interesting. Create a highly restricted
account on the dummy database box. Automate clients telnetting/logging in,
or doing
From: [EMAIL PROTECTED]
We have a small network consisting of an NT 4.0 Server with Win95,
Win98 and W2k workstations connected to it. There are three versions
of a login banner popping up on these workstations and we need to
standardize to the one official version. We've changed the banner on
the
Eventid.net allows you to search the events using the event id and the
source.
-Original Message-
From: Robert McIntyre [mailto:[EMAIL PROTECTED]]
Sent: Thursday, December 19, 2002 2:59 PM
To: Security-Basics (E-mail)
Subject: Windows Security Logs Resource
Does anyone know of a good
Hello Everyone,
Been searching for a little bit and can't seem to find a solution to one
minor problem we are having. We would like to have a login banner displayed
on our workstations running various versions of Solaris. We have already
setup banners that get displayed for telnet/rlogin/ftp, but
On Fri, 20 Dec 2002, Janssen, Steph wrote:
I'm afraid it only brings a small amount of safety. Also the Promiscous part
is getting a bit different.
Nowadays most people who sniff, sniff using tools that poison your
arp-cache, in your switches. http://ettercap.sourceforge.net/ is a good
I didn't see this come across the security basics list but I think it is a
great basic tool for *nix administrators to add to their toolbox.
Used alone or coupled with file integrity verification software like osiris
(http://osiris.shmoo.com/) you can have an increased degree of confidence in
Hey there,
I've only heard/read of ways to protect against attacks on switches
(checking the arp tables for modifications or tampering), but not really
much reliable info on doing stuff on hubs (like the last poster mentioned
below, sending echo packets, etc) But generally, you will not be able
Hi people,
I've been going through some articles on how to write secure code esp.
from: http://www.shmoo.com/securecode/
I am looking for something more specific for the windows platform. Are
there any specific guidelines/standards that one could follow?
And one more thing...this one might be
Chris,
Actually I didn't state my clearance at all. I was previously cleared to Top
Secret and that was removed when I retired from the Navy. And even then I
did not specify what access I had to any information or where I worked
(which would be very important to someone trying to target me for
Here is a sample message:
Authorized Use Only!
You may also add a 'surrender your privacy' message:
Authorized use only. By accessing this system, you agree to having
all your actions logged. The logs may be shared with others.
(the second half about sharing is important so you can for
I believe, if my memory isn't failing me, that I read mention of
this a few years back; perhaps research in ATT? The cladding does
indeed have to be stripped clear, baring the naked fiber. Then the
fiber is carefully, delicately bent past its minimum rated radius of
curvature, in a little jig that
According to our network people where I work there's currently no way to
splice fiber optic cable.
The two ways they mentioned (wrt monitoring fiber optic traffic) would
be to cut the cable and insert a transceiver in the line. The main issue
with this is that someone will notice the cable has
Mike
Best two to go after are the CISSP and the CISA.
--- Phillips, Mike [EMAIL PROTECTED] wrote:
Please accept my apologies if this is not the appropriate forum for this
question..
I am researching the relative value of various professional certifications
in the IT field.
In order to tap into a fiber line you have to break the sheath. The signal
is entirely optic, if you don't break the sheath you can't even see the
signal. However, even if someone does decide to break into it then they've
got another problem, exactly how to do it, it's extremely difficult
I'd recommend getting as many of the CompTIA certs as you can (in between
whatever you focus on for your career), right now they last forever and they
are recognized by almost anyone in any industry their certs cover. They
aren't hard (all are simply entry level), but it looks nice if you're
On Fri, Dec 20, 2002 at 06:45:57PM -0600, * KAPIL * wrote:
IMHO, your current job and future career goals have a lot to do with
what certifications your acquire and what certifications your keep
current as they expire. I for example have my A+, NET+ and Server+ from
back in the day when I
21 matches
Mail list logo