Unfortunately the current Firewall does not support any kind of bandwidth
throttling. The ISP will not allow access to the router without giving up
support for it. After all the feedback I think I will research an open
source solution and put some box between workstations and firewall. Thanks
ev
-BEGIN PGP SIGNED MESSAGE-
To all who have replied:
Thank you for your suggestions.
For those who were wondering, we have not yet decided on a platform for the servers.
We are a small financial institution and are awaiting some input from FDIC about open
source solutions Re: audit.
> I currently own an internet cafe. Instead of
> applying strict policies we have decided to image
the hard drives often. We have found that we had to
lock down the boxes to tight that they became
difficult for our customers to use. So far, we have
not had anyone attempting to compromise the sy
I have seen some. Having a pdf trigger something "bad" is hard, but can
be done. I would not lose any sleep over it.
Jim
m0use wrote:
>
> > Juan Mejia wrote:
> > >
> > > Hello guys,
> > > Tired of users who refuse to think twice before running an
> > > attachment,
>
> I just b
Ref: David Simcik <[EMAIL PROTECTED]>'s
message dated 08 January 2003, 9:51 hours.
>Hiya,
> Anyone know of a tool that can map TCP/UDP ports to a specific process in
>Windows (NT/2000)? My apologies if this is a naive question.
>
Do a *google* search for NPORT and you will be in busin
> There are some python and perl script that use
smbclient
> and nmbstat to do a full IP range samba share mount
on
> Linux.
None of this is necessary if the code is run from an
NT box. I sent the OP the code that I've used, but
haven't heard back from him...
_
Not really,
Add:
Hive: HKEY_CURRENT_USER
Key: Software\Microsoft\Windows\CurrentVersion\Policies\Network
Name: NoEntireNetwork
Type: REG_DWORD
Value: 1
Change:
Hive: HKEY_CURRENT_USER
Key: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Name: NoNetConnectDisconnect
Type: REG_DWORD
V
Hi,
Are there any possible threat scenarios from a buffer overflow in an
executable stored locally. For instance, say something like notepad.exe has
a buffer overflow, which might be exploited by issuing
notepad aa(3000 times).txt
Would this allow any sort of system compromise or privilege e