Why don't you do this, use a CF boot device, or similar embedded device for
your data collector. Put a wireless card in it, and configure a VPN
Connection to your storage device. This should meet your low power
consumption needs, the company that comes to mind has products that use a
max
KevinKevin Wharram wrote:
I need to encrypt confidential data on a CD.
What would be the best way of doing it, i.e. which software?
You really need to be more specific about your environment,
anticipated attackers, whether you need to be able to
transparently mount the
CD, etc.
If your attackers
Jennifer Fountain wrote:
Could anyone tell me their configuration or recommend a
good configuration for company time servers?
A couple points that haven't been mentioned:
1) learn the restrict line in the configuration file. Your main
time servers can be locked down tightly.
2) learn the
Wonderful tool made and suggested by Mookhey and his colleagues there for windows
NT/2k information gathering.
However, for NDS I'll recommend the following:
http://www.nmrc.org/files/snetware/
http://www.nmrc.org/files/netware/
and specially http://www.nmrc.org/pandora/index.html
and AS/400
greetings.
these are rather annoying. perhaps if a new mailing list was made, like,
[EMAIL PROTECTED], or [EMAIL PROTECTED]
the thing that is perhaps rather annoying, is if an entity subscribes to
the various lists, they receive the same stuff, reworded, or just
forwarded, throughout the
Samba can use a nis user database We do it all the time, so you would
have just one user database with either implementation.
--
Brian Carpio
CSG Systems Inc.
Open Systems Unix System Admin
x3317
--
On Mon, 24 Mar 2003, David M. Fetter wrote:
Better yet try LDAP
If it is the users personal computer I think there are a lot of issues
here that have not been addressed. i.e: ownership of software.
the case if the employee is no longer an employee. If employees are
required to work from home then that is what a laptop or a loan machine
is for. The hypothetical
Hi,
I currently approve of all production changes to our firewalls (internet and dmz) and
also approve all VPN request for for external companies that want access into our
network. We have 12 firewalls and about 700 production servers (Unix and Windows).
This is my question: Do you do this
Hi All,
Yesterday I noticed the following entry in logs:
Packet log: input REJECT eth0 PROTO=17 169.254.208.158:137
169.254.255.255:137 L=96 S=0x00 I=3072 F=0x0
000 T=128 (#9)
This occured only on our internal (10.10.x.x address) network. The packets
were seen three times over the course of
[EMAIL PROTECTED] wrote:
Samba can use a nis user database We do it all the time, so you would
have just one user database with either implementation.
Right, I understand this, but LDAP with kerberos would be a more secure
implementation. Security was the basis of my suggestion since this is
This is built into windows 2000, if you use the windows 2000 CA and set up a
domain. You can also pay for Baltimore's CA or SunOne's CA to get the same
thing. You will still need your system to be a member of a domain.
Walt
-Original Message-
From: Justin Derry [mailto:[EMAIL
Dear All
I too would like the same information. So if anyone does have material
concerning best practice guideline for PKI implementation could they also
forward same to me.
Dr.Adrian McCullagh Ph.D.
Solicitor
Freehills
Direct 61 7 3258 6603
Telephone 61 7 3258
Facsimile 61 7 3258 6444
Hello,
I'm not 100% sure what you are trying to do. If you want to lock the port down
completely at the machine then install a personal firewall on it. If you need the
port internally then block it for external connections at the firewall and router. If
you need it externally but securely
or try the openrelay tool from http://kickme.to/dpsecurity
- Original Message -
From: Steven J. Sobol [EMAIL PROTECTED]
To: Dan Phan [EMAIL PROTECTED]
Cc: Nuzman [EMAIL PROTECTED]; security basics
[EMAIL PROTECTED]
Sent: Tuesday, March 25, 2003 4:36 PM
Subject: RE: smtp relay
Times Enemy,
these are rather annoying. perhaps if a new mailing list was made, like,
[EMAIL PROTECTED], or [EMAIL PROTECTED]
the thing that is perhaps rather annoying, is if an entity subscribes to
the various lists, they receive the same stuff, reworded, or just
forwarded, throughout the
Last summer I worked with a company that used a PKCS12 Certificate on a
USB token for authentication of employees to access the VPN when they
are offsite. They used iKey from Rainbow Technologies. It worked well
for them
http://www.rainbow.com/ikey/index.html
You may want to check it out.
Give a quick call to PCguardian. They have a product that fits your
exact requirements.
Bryan Glancey
[EMAIL PROTECTED]
CTO
EPS Technology
999 Executive Parkway Drive
St. Louis, MO 63141 USA
http://www.epsione.com/
314-205-2300
314-205-2303 fax
-Original Message-
From: Bear Giles
Rainbow iKey Series lets you to logon W2k enviroments.
Ive tested iKey VPN-Solutions 2032 and 3000 series. And it works.
.
The only thing youve to do is modify local security policy in order to
block/unblock the session when you retire/insert the key.
Also, it can
Secure user authentication to
Hey Folks,
I've already received a number of responses to the earlier posts regarding
the SecurityFocus article announcements. If you have an opinion one way or
the other, feel free to post it to the list. I won't approve the messages
to the list, but we will take a look at what list subscribers
19 matches
Mail list logo