RE: Wireless Device Security

2003-03-26 Thread Michael Osten
Why don't you do this, use a CF boot device, or similar embedded device for your data collector. Put a wireless card in it, and configure a VPN Connection to your storage device. This should meet your low power consumption needs, the company that comes to mind has products that use a max

Re: Encrypting data on a cd

2003-03-26 Thread Bear Giles
KevinKevin Wharram wrote: I need to encrypt confidential data on a CD. What would be the best way of doing it, i.e. which software? You really need to be more specific about your environment, anticipated attackers, whether you need to be able to transparently mount the CD, etc. If your attackers

Re: NTP recommedations

2003-03-26 Thread Bear Giles
Jennifer Fountain wrote: Could anyone tell me their configuration or recommend a good configuration for company time servers? A couple points that haven't been mentioned: 1) learn the restrict line in the configuration file. Your main time servers can be locked down tightly. 2) learn the

Re: Server Auditing

2003-03-26 Thread Muhammad Faisal Rauf Danka
Wonderful tool made and suggested by Mookhey and his colleagues there for windows NT/2k information gathering. However, for NDS I'll recommend the following: http://www.nmrc.org/files/snetware/ http://www.nmrc.org/files/netware/ and specially http://www.nmrc.org/pandora/index.html and AS/400

Re: SecurityFocus Article Announcement

2003-03-26 Thread Times Enemy
greetings. these are rather annoying. perhaps if a new mailing list was made, like, [EMAIL PROTECTED], or [EMAIL PROTECTED] the thing that is perhaps rather annoying, is if an entity subscribes to the various lists, they receive the same stuff, reworded, or just forwarded, throughout the

Re: Linux/windows remote authentication

2003-03-26 Thread brian_carpio
Samba can use a nis user database We do it all the time, so you would have just one user database with either implementation. -- Brian Carpio CSG Systems Inc. Open Systems Unix System Admin x3317 -- On Mon, 24 Mar 2003, David M. Fetter wrote: Better yet try LDAP

RE: Home users with VPN connections

2003-03-26 Thread Kevin Saenz
If it is the users personal computer I think there are a lot of issues here that have not been addressed. i.e: ownership of software. the case if the employee is no longer an employee. If employees are required to work from home then that is what a laptop or a loan machine is for. The hypothetical

Security Approval Process

2003-03-26 Thread Debbie Torri
Hi, I currently approve of all production changes to our firewalls (internet and dmz) and also approve all VPN request for for external companies that want access into our network. We have 12 firewalls and about 700 production servers (Unix and Windows). This is my question: Do you do this

Strange Packet logs in ipchains

2003-03-26 Thread Sam Dirk
Hi All, Yesterday I noticed the following entry in logs: Packet log: input REJECT eth0 PROTO=17 169.254.208.158:137 169.254.255.255:137 L=96 S=0x00 I=3072 F=0x0 000 T=128 (#9) This occured only on our internal (10.10.x.x address) network. The packets were seen three times over the course of

Re: Linux/windows remote authentication

2003-03-26 Thread David M. Fetter
[EMAIL PROTECTED] wrote: Samba can use a nis user database We do it all the time, so you would have just one user database with either implementation. Right, I understand this, but LDAP with kerberos would be a more secure implementation. Security was the basis of my suggestion since this is

RE: USB Tokens

2003-03-26 Thread Walter Williams
This is built into windows 2000, if you use the windows 2000 CA and set up a domain. You can also pay for Baltimore's CA or SunOne's CA to get the same thing. You will still need your system to be a member of a domain. Walt -Original Message- From: Justin Derry [mailto:[EMAIL

Re: PKI and Digital Certificates Best Practices

2003-03-26 Thread Adrian McCullagh
Dear All I too would like the same information. So if anyone does have material concerning best practice guideline for PKI implementation could they also forward same to me. Dr.Adrian McCullagh Ph.D. Solicitor Freehills Direct 61 7 3258 6603 Telephone 61 7 3258 Facsimile 61 7 3258 6444

RE: network drive port change method?

2003-03-26 Thread Trevor Cushen
Hello, I'm not 100% sure what you are trying to do. If you want to lock the port down completely at the machine then install a personal firewall on it. If you need the port internally then block it for external connections at the firewall and router. If you need it externally but securely

Re: smtp relay tester?

2003-03-26 Thread Peter VE
or try the openrelay tool from http://kickme.to/dpsecurity - Original Message - From: Steven J. Sobol [EMAIL PROTECTED] To: Dan Phan [EMAIL PROTECTED] Cc: Nuzman [EMAIL PROTECTED]; security basics [EMAIL PROTECTED] Sent: Tuesday, March 25, 2003 4:36 PM Subject: RE: smtp relay

RE: Re: SecurityFocus Article Announcement

2003-03-26 Thread Stephen Entwisle
Times Enemy, these are rather annoying. perhaps if a new mailing list was made, like, [EMAIL PROTECTED], or [EMAIL PROTECTED] the thing that is perhaps rather annoying, is if an entity subscribes to the various lists, they receive the same stuff, reworded, or just forwarded, throughout the

RE: USB Tokens

2003-03-26 Thread Elkhatib, Ahmad
Last summer I worked with a company that used a PKCS12 Certificate on a USB token for authentication of employees to access the VPN when they are offsite. They used iKey from Rainbow Technologies. It worked well for them http://www.rainbow.com/ikey/index.html You may want to check it out.

RE: Encrypting data on a cd

2003-03-26 Thread Bryan E. Glancey
Give a quick call to PCguardian. They have a product that fits your exact requirements. Bryan Glancey [EMAIL PROTECTED] CTO EPS Technology 999 Executive Parkway Drive St. Louis, MO 63141 USA http://www.epsione.com/ 314-205-2300 314-205-2303 fax -Original Message- From: Bear Giles

Re: USB Tokens

2003-03-26 Thread rafael
Rainbow iKey Series lets you to logon W2k enviroments. Ive tested iKey VPN-Solutions 2032 and 3000 series. And it works. . The only thing youve to do is modify local security policy in order to block/unblock the session when you retire/insert the key. Also, it can Secure user authentication to

Re: SecurityFocus Article Announcements

2003-03-26 Thread Stephen Entwisle
Hey Folks, I've already received a number of responses to the earlier posts regarding the SecurityFocus article announcements. If you have an opinion one way or the other, feel free to post it to the list. I won't approve the messages to the list, but we will take a look at what list subscribers