If setting up a terminal server with Win2k and you want 128bit then you'll
have to manually set that up through terminal services configuration under
the properties of the RDP-Tcp connections. The encryption level by default is
at medium (56-bit). You'll also need 128bit support in the OS. As a not
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
There is some basic 128 bit encryption used with terminal services, but
it is compromised just about every other day. As most of the other
responses indicated SSH is good strong encryption and it can be free if
you go with OpenSSH. VPN would be good
Yes it does, but, like anything else, adding an extra layer of security
doesn't hurt too much.
Besides, I'm sure a lot of people on this list may argue as to whether or
not the encryption used in these
products is really secure, or if they are just there as "marketing hype".
(How many exploits/com
Am Donnerstag, 2. Januar 2003 19:33 schrieb Stacy Olivas:
The rdp 4/5 (Microsoft) and ICA (Citrix) protocol are encryptet by design.
See an overview about ICA and RDP:
http://www.microsoft.com/windows2000/server/evaluation/features/rdp.asp
> Whenever I use Terminal Services (a.k.a Remote Deskto
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Here's a link to a FAQ concerning their Terminal Services Advanced
Client. It states: "The encryption for the TSAC depends on the server
it is connecting to, but it will support up to 128-bit. The 128-bit
client is available in all languages. It will
SSH tunneling is a nice way of creating an encrypted tunnel.
Essentially with an SSH client program you setup the tunneling
rules and then authenticate and logon to the remote SSH host.
After establishing the connection you can use any of your existing
programs to tunnel inside the SSH session.
It
On Fri, 2002-12-20 at 12:45, Mike Heitz wrote:
> I've run across a couple log entries on my OWA server. I'm pretty new to
> security (about a decade as a network admin, now taking on more and more
> responsibility) and have Googled the Propfind command... only a handful
> of results (including a MS
Whenever I use Terminal Services (a.k.a Remote Desktop) I establish an ssh
session and use the port forwarding feature
to tunnel the ts session thru.
-Original Message-
From: scott [mailto:[EMAIL PROTECTED]]
Sent: Thursday, January 02, 2003 5:38 PM
To: [EMAIL PROTECTED]
Subject: remote de
On 02/01/03 11:38 -0500, scott wrote:
> this might be a stupid question but, is there any encryption used with
> remote desktop. also, if there is not is there any products (free or low
> cost) that i can use to protect my remote desktop connections, such as vpn,
> and what is the best way to s
It seems you have found out the problems with running an
'open' FTP server. It sounds like you may be running FAT instead
of NTFS, which would not be recomended especially for a machine
accessible to the outside world.
I would suggest that you set the permissions on the FTP directories
and remove
hi,
this might be a stupid question but, is there any encryption used with
remote desktop. also, if there is not is there any products (free or low
cost) that i can use to protect my remote desktop connections, such as vpn,
and what is the best way to set it up?
thanks
Scott
OOPS - forgot the article number:
http://online.securityfocus.com/archive/88/193227
On Tuesday 31 December 2002 10:54 am, Don Phillipe wrote:
> I have a small server I use for my home business and use it mainly for
> anyone who needs to send a large file that will not go through email. I
> have
You can use the whois command to search for IP
addresses:
whois -h whois.arin.net or
This will give you the allocated IP addresses given by
ARIN for a specific organization. You can do a reverse
lookup also by using the IP address in the
area and the company's name and allocated IP's will
get
Try using the good old command prompt as administrator (Start->Run->Cmd).
One command that will be usefull is dir /x which will show you the name of
the folders and files in 8.3 format. Then del and rmdir.
From: "Don Phillipe" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Subject: MS IIS 5 ser
You can go to:
http://www.apnic.net/db/ranges.html#country
There you'll find links to some of the regional internet registries
including apnic itself from which you can get listings.
Steve
On Mon, Dec 30, 2002 at 01:40:07PM -0200, Jefferson Costa wrote:
> Hi everybody !
>
> I'm lookingo for a
On Tuesday 31 December 2002 4:54 pm, Don Phillipe wrote:
> I have a small server I use for my home business and use it mainly for
> anyone who needs to send a large file that will not go through email. I
> have an anonymous UPLOAD FTP account that I open up to receive these. From
> time to time I
If it makes you feel better you're definately not alone in this. It
happens to hundreds of people every day. It had happened to a server I
inherited when I started this job and they couldn't figure it out either.
The only reason I know about the fix is because I was an idiot and created
a COM1
Hello Don,
Typical hacker trick. They have used reserved words like com3 and lpt2 to create
directories that the command interpreter and file manager won't touch because it
thinks they are really hardware devices and you can't really delete hardware
with a command. If you don't have the 'security
18 matches
Mail list logo