on the topic of ssh tunnelling
my friend has an analogue leased line (probably outdated overseas, but
this is south afirca so dot dot dot).
the connection isn't _that_ fast as you can imagine if compared to diginet
lines, but someone told me running a end to end ssh tunnel would speed
Greets,
I am pretty new to the security world, and am starting by learning how simple networks
are subverted. I have been hacking my home network, but have not been able to get the
*snarf commands from dsniff to produce any useful output.
As root, I use fragrouter to forward packets, and
- Original Message -
From: Brad Arlt [EMAIL PROTECTED]
To: Pessoft [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Wednesday, July 16, 2003 5:49 PM
Subject: Re: Sendmail banner Network start output suppression
On Wed, Jul 16, 2003 at 01:09:10PM +0200, Pessoft wrote:
1) Exist any way
| I am interesting in getting some ideas as to which
| packages are out
| there and recommended to monitor a router.
|
| Like the following stats:(in real-time)
|
| CPU Utilization
| Bandwidth Utilization
| Packet Count
| Packets in Error
| Type of Traffic
|
|
Mmmm I must be phrasing my question badly...
The majority of responses seem to suggest storing All
the passwords in a file (or database) protected by a
shared password. As I mentioned in my email this isn't
suitable because
1. Anyone who requires access to the file/database for
a specific
MRTG, Solarwinds, and, InterMapper.
InterMapper shows real-time traffic flows between devices as running Ants.
(It runs on a Mac,
and its worth buying one just to run the software).
- Original Message -
From: Nick Benigno [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Monday, July 14, 2003
I received this mail below, and call me paranoid, but I think
this may be a ploy by Thawte to generate additional business.
The certificate in question runs out soon, and I have been
constantly harassed by them into applying for a new one for
the past 3 months. I mean, harassed, I even had my
See /etc/syslog.conf and know where the cron writes it logs
On Wed, Jul 16, 2003 at 04:55:36PM +0200, Matthias G?ntert writes:
Hello list,
my suse linux 7.3 server has been hacked. The hacker frequently started a
reverse netcat shell via crontab. But how was the hacker able to hide his
Plus, it really doesn't matter anyway, since if your sendmail
version/install or configuration is vulnerable to something, they'll
probably try anyway, since they don't see the version or know it may be
fake.
--
Regards,
Tim Greer [EMAIL PROTECTED]
Server administration, security, programming,
I got the same problem recently from verisign, i got one email every 2
days or so to remember me that our certificate was going to expire
etc...
at the end i was so annoyed that i generated a new certificate myself
using my own CA on linux ... (we only needed a certificate for our
private
Their notice is true and accurate.
--
Regards,
Tim Greer [EMAIL PROTECTED]
Server administration, security, programming, consulting.
- Original Message -
From: JM [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Thursday, July 17, 2003 5:00 AM
Subject: Harassment by SSL Provider?
I
Just remove the code for the help command :)
Or why not change to postfix or exim. both are better choices than
sendmail.
--
Marcus Weman ([EMAIL PROTECTED])
Network Engineer
Knivsta Kommun, GAS-Ek/IT
Ängbyvägen 8, 741 75 Knivsta, SWEDEN
Direct: +46 18 347103, Mobile: +46 708 216594
Phone: +46
Try ethereal for packet inspection/capture
-Original Message-
From: Paul Benedek [mailto:[EMAIL PROTECTED]
Sent: Tuesday, July 08, 2003 10:08 AM
To: 'Justin Pryzby'; 'Damon McMahon'
Cc: [EMAIL PROTECTED]
Subject: RE: Continued probing with source IP 10.x.x.x
Hi,
To ensure that you are
That may be correct, Tim, but does it justify 2-3 emails a day to
multiple people within his organization? Seems a bit overzealous to me.
Doesn't sound like they put a lot of 'thawte' into it. ;)
Dave Killion
Senior Security Engineer
NetScreen Security Group, NetScreen Technologies, Inc.
From: John Brightwell [EMAIL PROTECTED]
Mmmm I must be phrasing my question badly...
The majority of responses seem to suggest storing All
the passwords in a file (or database) protected by a
shared password. As I mentioned in my email this isn't
suitable because
1. Anyone who requires access to
I must have missed that part. I was just responding to the point about the
notice and if it's true what they say. I'd imagine someone emailing you
notifying you of anything too often, would be construed as harassment
though, no matter what the topic is. I would assume this isn't an
intentional
Thanks all, at least it is common knowledge about their problems.
I can now use The register URL below to put my CIO's mind at rest
For 5 minutes or so anyway.
Cheers
JM
-Original Message-
From: Lenea Berryman [mailto:[EMAIL PROTECTED]
Sent: 17 July 2003 16:28
To: '[EMAIL
Or Qmail. :-)
--
Regards,
Tim Greer [EMAIL PROTECTED]
Server administration, security, programming, consulting.
- Original Message -
From: [EMAIL PROTECTED]
To: M.S. Lucas [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Thursday, July 17, 2003 8:45 AM
Subject: Ang: Re: Sendmail banner
18 matches
Mail list logo