...or use SSH tunneling and generate new keys frequently
if they are really paranoid. I think with fiber and some
sort of encryption scheme a person intent on sniffing traffic
has there work cut out.
At this point however it would probably be easier to bypass
the fiber altogether and exploit a
Hello,
I don't know if there is anything else, but here are 2 things I did on 1 of
my boxes.
I created the directory /etc/dt/config/C. Then copied Xresources from
/usr/dt/config/C to /etc/dt/config/C. Edit /etc/dt/config/C/Xresources and
uncomment (or add a new one) the line
- Original Message -
From: Alvey Robert W KPWA [EMAIL PROTECTED]
To: 'Phillips, Mike' [EMAIL PROTECTED];
[EMAIL PROTECTED]
Sent: Tuesday, December 24, 2002 6:41 AM
Subject: RE: A question about certification and training
Hi,
I'd recommend getting as many of the CompTIA certs as you can
Yes i know that aplication... his name is:
tar
Available in all unix flavors... and all good administrators know
that...
If you want an image, not a tarball... then... dd if=/dev/disk
fo=/
El mar, 24-12-2002 a las 04:12, [EMAIL PROTECTED] escribió:
hi all,
Marco,
It isn't abundantly clear what you want to do. You
say you're asking for security software for port
scan, firewall, etc.. You say you already have
ZoneAlarm and VirusScan.
What isn't clear is what you're trying to do. Are you
asking for offensive or defensive capabilities?
For
I think Mondo Rescue might be what you're looking or. It's a
back-up/disaster recovery tool which creates an image of either your entire
filesystem or a subset of your files, and can be found at
http://www.microwerks.net/~hugo/
At 03:42 PM 24/12/2002 +0530, [EMAIL PROTECTED] wrote:
hi all,
Greetings,
As an admin of a Windows Domain I am looking for a tool that will provide
the same type of information (especially the service pack/patch level)
that I can get from Winfingerprint http://winfingerprint.sourceforge.net/
but that will run from a shell on Linux. I suspect that it is
Are you saying that:
# df -h == used MB or GB
then:
# dd if=/dev/hda1 bs=1M count=used MB or GB | gzip hda1-image.gz
then, on the new drive:
# zcat hda1-image.gz | dd of=/dev/hda1 /dev/null
won't cut it for you?!?
On Tuesday 24 December 2002 04:12 am, [EMAIL PROTECTED] wrote:
hi all,
Has anyone ever heard of or seen the a file of this name and type before?
popup.powerball
It is not an ASCII file and it is 20,617 bytes.
Regards,
Jim
It isn't abundantly clear what you want to do. You
say you're asking for security software for port
scan, firewall, etc.. You say you already have
ZoneAlarm and VirusScan.
Yes, I already have ZoneAlarm and VirusScan. I would like to know if
there is something else to try.
What isn't clear
Does anybody know of some good books or websites that contain case studies
about computer security breakins and what the admin did/should have done to
correct the problems. I found the case studies in Hacking Linux Exposed very
interesting and I am looking to learn anything from those type of
u may use ghost
- Original Message -
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Tuesday, December 24, 2002 7:12 AM
Subject: copying a disk image to restore on linux
hi all,
I would like to know if there are any utilities on linux (preferably
freeware) which can create a
Hello,
I'm about to start huge documentation phase on creating Incident Response
Guidelines / Handling - including creating the structure, creating the
Incident Response Team, documenting the guidelines per incidents - such as
web server hacked, DOS attack, Virus Outbreak
I need your help on
From: ONEILL David J [EMAIL PROTECTED]
VPNs are not the Holy Grail for network security.
Undeniably true, VPNs are part of the current trend towards defense in depth
that is required when you don't have a true solution.
As a matter of fact, I am suggesting that our project dump its VPN.
Hi Marco,
if you really wanna do something with security first upgrade to
an real operating system like Linux, BSD, Windows 2000 or Windows
XP Pro.
I would like to have some suggestion for software for security (port
scan, firewall, etc.); I have a Pentium III, 256 Mb of RAM, 20 GB of Hd,
http://inner-smile.com/nocrack.phtml
- Original Message -
From: Rahul Chander Kashyap [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Saturday, December 21, 2002 10:49 AM
Subject: Writing secure code
Hi people,
I've been going through some articles on how to write secure code esp.
16 matches
Mail list logo