If your unix is solaris, it can use LDAPS for an authentication protocol,
allowing you to leverage AD as a single account store. Unfortunately,
unless you rewrite the GINA, NT/w2k can't leverage a third party directory
service. This would allow for not for single signon, which implies that you
au
Have a look at NetDetector from Niksun. Its a Network IDS and records all
packets. Moreover it alerts the user when threshold value is reached. It can
also recreate TCP sessions.
Thanks,
Yash
-Original Message-
From: Marendra Nutriaji [mailto:[EMAIL PROTECTED]
Sent: Tuesday, March 11, 2
Hi
> User sends his user name and password to the service provider
> as an SMS, the
> ISP processes the request by running a script which initiates
> an "https"
> session with the Bank's Internet Banking Server, and does a
> balance inquiry
> using the username and password.
>
> If the crede
Just a thought in this area...what do you think of Observer. Is it an
overpriced tool? Would it work for what Mr. Berry wants?
- Original Message -
From: "JM" <[EMAIL PROTECTED]>
To: "Leon Ward" <[EMAIL PROTECTED]>;
<[EMAIL PROTECTED]>
Sent: Tuesday, March 11, 2003 11:49 PM
Subject: RE: J
I am currently looking into configuring my company's time servers. My initial
thoughts were setting up two or three in the dmz and configuring them to update their
time on a regular basis (haven't defined regular yet) and then install two or three
interal time servers that query these servers.
I have no comments on the technical support of NetScreen but there is one
more thing to be considered.
As a tech support engineer for both the products (SonicWALL as well
NetScreen), NetScreen has more features compared to SonicWALL. You ask it
and NetScreen has it.
Thanks,
Bhavin.
-Origina
I have a Watchguard Firebox, and it makes a great firewall, unfortuantly the
VPN features never seemed to work correctly for me (yes, I'm sure it was the
way that I was configuring it, but I . In the end I ended up configuring a
old workstation (P3 450, 256 MB of ram, and this is overkill) with Op
On Microsoft platforms there is a patch management util called SUS
"software update service?? (I think)
Once configured, the server will automatically download relevant
patches, you then point the clients to the sus server and push updates
to clients that way.
Jed
-Original Message-
Fro
Good afternoon my friends.
I am wondering if any of you can shed some light on this bit of information that I
have. Here is the background:
We are running GroupWise e-mail... with Guinevere antivirus scanner for inbound and
outbound Internet e-mail... which integrates with our Norton AV to dete
Hi,
Why would you allow the database to encryption and decryption information?
Regards /Daniel
First you must define the problem:
What is network overload? It can be a lot of diferent situations, the most common: bad
response time, Ok it is bad response time.
Second: what is the origin of bad response time. No easy answer, a lot of diferent
sources and incredible combinations of this. Do
collisions are not particularly useful in a "fully-switched" (sub-) network.
For that you really would need to sample the LAN port octet counters on the
switch/router and compare them against maximum expected (or SLA) bandwidth.
And even that would usually be far above what your servers could t
Hello, Akash et al:
I saved the "slides" of a recent webcast on this specific topic from
the SANS Institute. Perhaps you're interested in reviewing those for
an overview or educational purposes? It is a large file (419 KB), so
with respect for others who may or may not have access to a broadban
> From: JM <[EMAIL PROTECTED]>
> As the subject says, this is what I have got to do.
>
> I could dream up loads of examples of;
> if we don't detect a code read virus and we get it, then it
> will knock out our webservers and others until we fix it.
> if we have open null shares on the network, and
Am 19:12 10.03.03 - teilte Tim Thornton mir folgendes mit:
-> I understand that Qmail is not vulnerable to the
->recent Sendmail issue, but I want to know if Qmail will
->still forward the sendmail vulnerability "modified
->oversized header" downstream to other MTA's, thus
->leaving downstrea
http://www.netscreen.com/products/firewall_wpaper.html
Right on their website ;-)
At 10:47 AM 3/10/2003 -0800, you wrote:
While I see people recommend NetScreen, I can not based on my experience
with their techs, which includes level 2 techs.
While researching options for a firewall for a client,
2003-03-10T14:12:04 Tim Thornton:
> I understand that Qmail is not vulnerable to the
> recent Sendmail issue, but I want to know if Qmail will
> still forward the sendmail vulnerability "modified
> oversized header" downstream to other MTA's, thus
> leaving downstream sendmail servers open to the
It depends on how integrated an environment you need. I have used Samba, Windows
services for UNIX, and a NetApps system successfully for file sharing in a mixed
Windows, UNIX, and Linux enviroment. There were a few MAC's to using Dave.
Windows Services for UNIX is suppose to synchronize Windows
SAIC sells a product called UCAMS
http://www.saic.com/products/software/ucams/ucams-tech.html It is not a
single sign on application, but it is a password distribution
application. I.e. You have to sign on to each system but your userid
and password are the same. UCAMS has various clients inclu
does anyone have a recommendation for open source network
stress tool, specifically on a cisco switch? tia
--
<>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.0 (GNU/Linux)
iQCUAwUBPhxERRxoVYCzmrKXAQJK5gP3Y7CTsFyKpEz2p5W4GWI9+qSm+kWfdJ0R
xNlma0Ma
On Cisco's switches you can use the SPAN feature to send a mirror of data
received on a given port to another port.
IE, your firewall port is spanned to another switchport to allow your IDS to
sample all incoming data destined for the trusted net.
--BD
-Original Message-
From: David Gill
The "some" problems you are talking about are that since a switch has no
shared medium, with tcpdump you will see only your own traffic and
broadcast traffic, not the traffic of other hosts (except the broadcast).
On 07/03/2003, at 15.54, Scott Borre wrote:
>I am interested in what people recomm
Hi doug,
ID flag indicates which datagram fragments belong together so datagrams do
not get mismatched and sequence numbers are used to reassemble data in the
order in which it was
sent.
Carlos Eduardo Pinheiro - [EMAIL PROTECTED] - ICQ #: 134439332
http://pgp.mit.edu:11371/pks/lookup?op=get&sea
I some respects it depends on the type of business/computer network you are
protecting. You can get low/no cost scanners (NMAP, etc.) that will tell
you ports are open, and you can then do the leg work to verify that the
services should be running, and are patched etc.
In large commercial envi
24 matches
Mail list logo