On 24/12/02 15:42 +0530, [EMAIL PROTECTED] wrote:
> hi all,
>I would like to know if there are any utilities on linux (preferably
> freeware) which can create a complete image of the hard-drive. I know dd
> exists, but that would create the image of the entire drive. If the drive
> was (say)
If you just want the files on the drive, then use tar. DD copies every bit on the
drive, allowing for a more comprehensive forensics investigation.
It sounds like that is not what you want. Tar will zip up files in a directory for
you allowing you to save the information elsewhere.
Charles
Hi to everyone,
I am new to this list. I am Marco and I am a college student.
I have already sent this message once, but I did not see it arrived (and
any reply). If you have received it (and replied), sorry for the
re-post.
I would like to have some suggestion for software for security (port
sca
I believe that Norton Ghost can image ext2 and ext3 drives.
- Original Message -
From: <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Tuesday, December 24, 2002 5:12 AM
Subject: copying a disk image to restore on linux
> hi all,
>I would like to know if there are any utilities on
security-cert - on one hand nice to have, but on the other: read the
corresponding mailinglists/*google* & (m)irc around
and forget the outdated certs !
/bl0w
not an cissp ...and still i could mess with you guys ;-)
At 08:59 24.12.2002 -0500, Meritt James wrote:
Sorta concur - CISSP is NOT a t
Might want to look at partimage. Also Norton Ghost does a good job at it,
though not free. Linux Magazine just had an article on this subject in a
recent issue.
Steve
On Tue, Dec 24, 2002 at 03:42:03PM +0530, [EMAIL PROTECTED] wrote:
> hi all,
>I would like to know if there are any utili
From: "Hornat, Charles" <[EMAIL PROTECTED]>
This is not true. The US Navy did this to the Russians a few years
back.
http://www.bizjournals.com/philadelphia/stories/2002/07/29/newscolumn2
.html
I don't recall what this method was called back then though, it wasn't
"clips".
You know, now that I t
In fact, a $1,200 "clip" can be used to tap into fiber-optics to steal or inject
data into
Keep wishing!! ;)
-Original Message-
From: Sarbjit Singh Gill [mailto:[EMAIL PROTECTED]]
Sent: Sunday, December 22, 2002 11:56 AM
To: [EMAIL PROTECTED]
Subject: Greetings
Seasons Greetings to all..
I wish for peace on earth.
Kind Regards
Gill
hi all,
I would like to know if there are any utilities on linux (preferably freeware)
which can create a complete image of the hard-drive. I know dd exists, but that would
create the image of the entire drive. If the drive was (say) 40 GB and the free space
is 20 GB then that would be a wast
Sorta concur - CISSP is NOT a technical certification and only the
unknowing will treat it as such.
Michael Boman wrote:
>
> On Fri, Dec 20, 2002 at 06:45:57PM -0600, * KAPIL * wrote:
> > IMHO, your current job and future career goals have a lot to do with
> > what certifications your acquire a
I don't think you are remembering correctly. One reason for using fiber is
its security in that it gives off no electromagnetic field. In a typical
cable, the fiber is buffered by a vinyl sheath, and then in cheaper cables,
a simple exterior cable sheath is applied. It is impossible to "tap" the
This is not true. The US Navy did this to the Russians a few years
back.
http://www.bizjournals.com/philadelphia/stories/2002/07/29/newscolumn2.h
tml
I don't recall what this method was called back then though, it wasn't
"clips".
Charles
-Original Message-
From: Alvey Robert W KPWA [
Guys, Its www.eventid.net
Try again, now.
Regards,
Planz
- Original Message -
From: "John Tolmachoff" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>; "'Mark Liechty'" <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>
Sent: Saturday, December 21, 2002 8:17 AM
Subject: RE: Windows Security Logs
Hi
Fibre can be tapped, the first and most noticeable is to break the fiber
insert your TAP and then re-enable the circuit. Intrusion Inc demonstrated
a pretty cool Fiber TAP to me at
http://www.intrusion.com/products/technicalspec.asp?lngProdNmId=39&lngCatId=
4
There are 2 problems with doing th
Tony,
It is often difficult to find CBT stuff for highly technical courses.
For instance, unix being the kind of OS it is and the very many switches
and command combinations, scripting etc, it very difficult to get one
CBT that will give this info. The CBT on CD for instance is prepared to
run on
On Fri, Dec 20, 2002 at 02:11:02PM -0500, [EMAIL PROTECTED] wrote:
> Hello List,
>
> We have a small network consisting of an NT 4.0 Server with Win95, Win98
> and W2k workstations connected to it. There are three versions of a
> login banner popping up on these workstations and we need to standar
On Sat, Dec 21, 2002 at 07:19:42PM +0530, Rahul Chander Kashyap wrote:
I've been going through some articles on how to write secure code esp.
from: http://www.shmoo.com/securecode/
I am looking for something more specific for the windows platform. Are
there any specific guidelines/standards that on
On Mon, Dec 23, 2002 at 03:01:19PM -0500, Lee Brink wrote:
> The other method they discussed is to remove the fiber cable's outer
> insulation and bend it. You could monitor the light signal at the bend
> via refraction. The two issues they brought up with this method is that
> AFATK it's only a
Mike,
If you want to know the best cert's to go after..go to monster.com (or some
other job site) and do a keyword search on cisa or cissp. You will get a ton
of security jobs that require a cisa and/or cissp. The problem with the cert's
the poster mentioned below (ie Security+, A+, Neetcrk+, et
Seasons Greetings to all..
I wish for peace on earth.
Kind Regards
Gill
21 matches
Mail list logo