Also check out SecureIIS. We have a free edition for personal use. So if
your looking for something like URLScan, but that actually works, grab
SecureIIS. The free version can be downloaded at
http://www.eeye.com/html/Products/SecureIIS/Download.html
Signed,
Marc Maiffret
Chief Hacking Officer
I did notice that. My question is what did you do to your configuration to make it
work. I have had the problem all day with netscreen and have not come up with a
solution.
-Original Message-
From: abe vigoda [mailto:[EMAIL PROTECTED]
Sent: Tuesday, August 12, 2003 2:13 PM
To:
Ernie is correct
Regards,
Greg DeGennaro Jr., CCNP
Security Analyst
-Original Message-
From: Nelson, Ernie [mailto:[EMAIL PROTECTED]
Sent: Wednesday, August 13, 2003 12:51 PM
To: [EMAIL PROTECTED]
Subject: RE: Distinctions in Certification
It is my understanding that the main
Hi list,
Trying put place a caching box to save my bandwidth, parallely need to build
a bridge on the same system. (it is an ISP setup)
The purpose of bridging is , I have lots of customer behind my squid, so I
need the packets to take there own IP address to the internet and not my
caching
Most newer switches can lock down how many mac addresses are allowed to
be sourced on one port.. if that amount is reached, the port can be
disabled or other action taken (snmp trap, etc)... I know there are
plenty of cisco switches that do this anyhow, I'm sure there are
others...
Ethan
It is my understanding that the main difference is the cissp is knowledge from a
management type of perspective while the giac certifications are usually more hands on
with the actual technology. I have only lightly gone over what is needed for cissp,
so I cannot be sure. I have however
I've had many problems with Comcast, my connection has been lagging
horribly and is dropped frequently. I've contacted customer service and
supposedly they improved connection quality. I'd recommend if you have
the option to go with another ISP.
On Wed, 2003-08-13 at 09:31, Mark McConnell wrote:
Our firewall people just looked at that. I believe it is UDP 500.
cdv
Chris DeVoney
Clinical Research Center Informatics
University of Washington
[EMAIL PROTECTED]
206-598-6816
-Original Message-
From: [EMAIL PROTECTED]
Just a followup on this for the list... I don't know
about the AUP. Tough for me to tell what our end users
have agreed to when they signed up with Comcast (if
they did since many are captive former ATT Broadband
customers.)
We use the Cisco VPN and we were able to configure to
run over UDP.
On Mon, 2003-08-11 at 01:17, matt willson wrote:
In response to this response.
A.) if it's a spyware client or something similar that's attached to his
IE, switching email providors has no affect on this.
hmm.. well, I guess that assumes that there is spyware available that
detects use of
I'm using a VPN tunnel in the Baltimore/WDC area (both source and
destination in the same area) and have not had any problems with
connectivity today (8/12/03). It's been very smooth all day.
KC Smith
===
Keenan (KC) Smith
[EMAIL PROTECTED]
410-730-8652 (h)
410-852-9759
I thought it was port 500?
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Sent: August 12, 2003 8:28 PM
To: [EMAIL PROTECTED]
Subject: Nortel Contivity VPN and Firewalls
Hello,
Anyone has setup firewall policy to allow Nortel Contivity VPN clients
through ? What
It would be sort of odd for someone to go in a back room and pull out a computer, whip
it up on the switch and proceed to fire up ethereal. Yet not impossible using a switch
that locks down would deffinitely help but you also got to remember ARP cache
poisoning is a major factor in what you are
Well as someone who hires security staff, I look for hands-on real world
experience. The CISSP and the rest are all too conceptual based, I've
had students with these certs who do not know how to do fragmented port
scans.
From my experience a pratical security certification such as the ESA
from
Hello, all.
Backlog queue size means the memory size which stores syn_received state.
so this can be used against syn_flooding attack, right?
Then, other state like Established, Last_ack, Fin_wait_1, Closings are
stored at backlog queue too? or any other memory space?
Thanks in advance.
One thing that you could do is use a tool that would send an ICMP
packet to all possible addresses in your particular network. That
won't detect all connecting hosts, in particular if someone jacks in
to sniff only, but that assumes that your network is hub based. If
your network is switch
Comcast has many problems wit their network
-Original Message-
From: abe vigoda [mailto:[EMAIL PROTECTED]
Sent: Tue 8/12/2003 5:13 PM
To: [EMAIL PROTECTED]
Cc:
Subject: comcast blocking ipsec traffic?
Has
Hey John.
My organization has had Norton Corporate Edition running for well over a year now,
protecting over 100 workstations and 7 servers. Not that you should ever become
complacent about virus', but knowing I have NAVCE protecting me has really helped ease
my worries in that area! It's
Ok,
I do not know about eapol for wireless products, just
hardline.
when you plug in your device, you won't be able to see any
broadcasts until you go through the eapol process with the
MAC of the NIC,
so if they have access to a PC, they can look at the pc
MAC, then spoof it on the switch with
Try to add /sbin/nologin to /etc/shells
When you add a user, change his shell in /etc/passwd to /sbin/nologin
- Original Message -
From: Skibi de LaPies [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Friday, August 08, 2003 12:30 AM
Subject: RE: sftp vs ftp with ssl
-Original
On Thu, 2003-08-07 at 16:30, Skibi de LaPies wrote:
Another one question in this topic - for sftp services one need a shell
account with interactive shell. If I don't want to allow users to login but
I want to use sftp then what should I do?
(of course i may be wrong, but I haven't found the
A week ago I started a webhosting service for subdomains at
http://crystal-ninja.cjb.net . Now, ofcourse, people need to ftp into their
public_html directory in their home dirs. I'm using proFTPd for that.
But now for the problem: I just got the idea to make a funny mail service.
People should
In-Reply-To: [EMAIL PROTECTED]
I just might have the answer http://www.dameware.com This is a very cool
program that does an extremely large amount of network managment compaired
to its price.
l8tr
Bradley Adams
[EMAIL PROTECTED]
Received: (qmail 30593 invoked from network); 7 Aug 2003
for the wireless stuff I would just do mac filtering, any host that is not
in the list of mac address is not allowed to join the wireless network. Of
course the network traffic can still be sniffed using any laptop but you
can just encrypt the traffic over wireless as you suggested. The mac
[EMAIL PROTECTED] wrote:
Cost is probably going to be a factor. Mcafee has a product in addition to
VirusScan that you can use to manage all hosts from a single console. It's
E-Policy Orchestrator. I don't believe Sophos has anything except
reporting.
sophos has since a *really* long time
Trond,
I believe if you have port 22 open for SSH you should be ok. I use
OpenSSH sftp and don't need to do anything special and vsftpd for
regular ftp since it provide chroot option.
-Sunny
-Original Message-
From: subscribe [mailto:[EMAIL PROTECTED]
Sent: Wednesday, August 06, 2003
Your best bet is try gaining experience with your current company. Most Information
Security departments are more willing to hire from within than from outside.
Most Security Professionals have a varied background. Most of the ones I have met have
a background in System Administration, some
Have you considered SSH? It'll compress your traffic as well as encrypt it.
-Original Message-
From: Hendra Santosa [mailto:[EMAIL PROTECTED]
Sent: Tuesday, August 05, 2003 8:07 AM
To: [EMAIL PROTECTED]
Subject: Data Compression
Hi,
I have several sites and all of them are running
One that throws people off for file names and directory names, especially in
certain platforms, is ALT+255. :-)
--
Regards,
Tim Greer [EMAIL PROTECTED]
Server administration, security, programming, consulting.
- Original Message -
From: Birl [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent:
Hi,
You might want to check The Open-Source Security Testing Methodology Manual
http://www.isecom.org/projects/osstmm.htm
Cheers,
Lars
Sebastian Schneider [EMAIL PROTECTED] 2003-08-11 18:16
Hi,
is there a common approach to plan security audits?
Which ways are most fitting to security and
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
You should be able to do the Netscreen by just getting a test kit and
a Netscreen from ebay. They are extremely easy to use and configure
and not much changes between the different models.
I had the fortune of getting trained at work by both
I actually do this right now. I simply set my ssh daemon on port 80, and use
scp to covertly bypass most standard firewalls. Unless they do payload
inspection, you can normally pierce the firewall fine in this manner.
ie: scp -P 80 [EMAIL PROTECTED]:/get/some/file/ .
Short of that, you could
I use web sharing on IIS. You can share a folder and downloads can be
done as if they were from web page. If you can browse, you can get to
it. I suppose there is a way to upload but I haven't ever configured
that.
In Windows 2000/2003, rightclick on a folder and choose websharing.
Pick the
I played with it a little since it was nicer than the Clear Screen Saver by
MS. However, if you are running virtual desktop software, it only locks the
desktop you're on, not the others. Hence, I could bounce my mouse and get
to my secondary desktop that was completely active even though my
Hi there!
We've seen a few cases in our office where some of our
clients are automatically connecting to rogue WAPs and
picking up an IP address. It's a bit of a security
issue, since now the system is connected to our
corporate network as well as someone else's network.
Has anyone dealt with
Hi!
I pursue an MSc in System and Network Security and I am currently doing my internship
in a
media group (ieTV, Radio, WebSites etc).My mission is to write down a security
policy for
their network.
Basically I know where to start,meaning things such as Anti-Virus etc. The problem is
that
Put the sniffer on it - don't take the attitude that the sniffer is the
hard way or too time-consuming. Slap ethereal or something similar
right on the box and capture the activity. Even if you don't look at
all the packet details you'll get source and destination addresses and
port numbers
Glenn English wrote:
On Wed, 2003-08-06 at 11:53, subscribe wrote:
The only problem I've had is that I still have to keep ftp around for
some of the webmasters with *nix-challenged software.
Actually, WSFTP client and CuteFTP are supporting it now. Have fun
bursting their bubbles on that one.
That is true. If that's the case though, he should really consider investing
in a locking cabinet. They don't take up that much room. Of course there
are situations it won't be practical, but I think it can be managed in most.
Is there any reason to give everyone access to the switch?
I must say, we use eTrust AV in a VERY large enviorment and have never seen
this. The very fact that McAfee and Symantec have (combined) had about a
dozen quality issues ranging from the 4 vulnerabilities in ePO, to the more
recent issues that screwed everybody that upgraded to 7.04, only
You don't seem to be completely in the dark on this.
Doesn't matter that much if the network is old or not. Read some
documentation on the hardening of computers and networks. No need to start
and crack away at passwords, even windows has some policy-tools on this.
There are library's out there
Hi,
One of the Good things about ePolicy Orchestrator is it can manage more than
just McAfee anti-virus products. You can manage McAfee Desktop Firewall as
well and get details of other anti-virus products installed on your network
from other vendors such as Symantec (Norton) and Dr Ahn.. A
-Original Message-
From: NR [mailto:[EMAIL PROTECTED]
Sent: Tuesday, August 5, 2003 10:22 AM
To: [EMAIL PROTECTED]
Subject: Securing IIS Server
Hi,
I have IIS Server in which i want to install IIS lockdown and URLScan,
i heard they are very good to protect IIS server,
are they
Assuming someone's watching the screen, there's a good chance they'll close
the connection if they see you doing a netstat while they're connected.
Doesn't sound like anything related to terminal services (xp remote desktop)
as it'll lock the console session while the remote session is active.
Sanjay,
It's not quite password auditing but maybe you can have a look at
www.elcomsoft.com
they also have a few dictionaries availible to download.
Hope this helps
Geoffrey
-Original Message-
From: Sanjay K. Patel [SMTP:[EMAIL PROTECTED]
Sent: Tuesday, August 05, 2003 12:14 AM
To:
-Original Message-
From: Ozgur C. Demir [mailto:[EMAIL PROTECTED]
Sent: Tuesday, August 05, 2003 3:30 PM
To: [EMAIL PROTECTED]
Subject: User Tracking Audit on Unix Systems
Hello people,
I would like to learn if is there a tool to track a user when he/she logs
on
man lastlog
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I feel it gave me an edge during interviews. I new more stuff and
felt more comfortable answering questions. I don't think it gives me
an edge like a CISSP would or like my Check Point Certs did, but as
the industry starts realizing more certs as
Also, modify header data and TCP/IP settings defeat tools like Nmap...
http://www.port80software.com/support/articles/maskyourwebserver
- Chris
:: ::
Chris Neppes
Port80 Software, Inc.
www.port80software.com
5252 Balboa Ave., Ste. 605
San Diego, CA 92117
[EMAIL
Bob,
I just went through the same situation. There is an easy answer for you
if you are running a Cisco router on your perimeter.
Use IP Authentication Proxy. All you have to do is download the crypto
image of the latest IOS from Cisco and apply it to your router and then
configure IP
I have been using Symantec AV Corp/Enterprise for several years and have
been very satisfied. I have 13 servers, about 250 clients and an
Exchange Server.
To do the whole kit and caboodle (Quarantine Server, AMS, etc.) can be a
bit cumbersome, but once it is in place there seems to be very
-Message d'origine-
De : netsec novice [mailto:[EMAIL PROTECTED]
Envoyé : 7 août, 2003 21:35
À : [EMAIL PROTECTED]
Objet : Nessus/keyloggers
I would like to demonstrate the importance of physical security to
management by presenting information I was able to easily obtain by
On 6 Aug 2003 12:43:29 - Shelina Samji [EMAIL PROTECTED] wrote:
What are the security risks in implementing an Instant Messaging
Infrastructure for internal use only? Can it be secured?
Though I have zero experience with MSN, I would recommend using Jabber
(http://www.jabber.org)
*
We found fxscanner installed on one of our box's. The anitvirus removed it
but now there is a folder called earth that we cannot remove. We have tried
to take ownership but that still does not let us delete the folder. The
error we get is file not found while deleting.
How can we force folder
I would like to note a little about the security of 4 digit pin... I believe that
author wanted to point out that thanks to the fact, that you can't try the 4 digit
number more than three times at a time - which makes it a pretty strong system, not
that 4 digit is a strong password.
Of course
A recent article on SANS covered how to do this using only native and
freeware tools:
http://www.sans.org/rr/win/event_logs3.php
From : Alastair Cook [EMAIL PROTECTED]
To : [EMAIL PROTECTED]
Subject : Event Viewer Monitoring Tool
Date : Mon, 11 Aug 2003 12:20:23 +0100
Has anyone got any
Very informed, user based solution, found this a good starting point:
http://arstechnica.com/paedia/w/wireless-security-howto/home-802.11b-1.html
Mark Harris
Principal Security Consultant
ASPACE Solutions - Leading Business Minds
T: +44 (0)20 7744 6248
M: +44 (0)7867 526 808
Website
Hi,
I was successful in using the tool from the Symantec website. I had to
change settings in the Remote Procedure Call Service (RPC) in Windows XP
before downloading and running the tool. I changed the failure settings on
the recovery tab to 'Take No Action'.
Walter Parolini
Workload
I don't quite remember exactly, but there are override options for a lot of
ftp daemons (including proftpd b/c i've done it before). to some extent,
this is a case of rtfm, but the option is burried so i don't blame you for
asking. On the other hand, people will be able to get shell access of
Hi,
It's not the biggest cert but the Security+ might be a start. There is no
experience requirement but demonstrates some basic knowledge.
You could follow this up with the TICSA which requires two years of
experience or 48 hours of classes.
The GIAC courses also do not require experience.
Sure, there are several means.
At first you could use a DMS like Domino or sort of to build up
directories capable of fulltext search.
Another solution might be a website secured by login.
usually ssh at default port is available through firewalls.
On Thursday, August 7, 2003, at 05:50 PM, abe
I've been having problems installing Nessus on a new install of Red Hat
Linux 8.0. I'm very new to Linux and have been trying for the past two
weeks to figure this out on my own but I can't seem to get my head
around this. I'm sure its something simple. Can anyone give me a hand.
I have
On 2003-08-04 Chris Berry wrote:
From: Bob Walker [EMAIL PROTECTED]
While I am a huge fan of the msconfig utility in windows machines, it
doesn't work in win2k. Doesn't even exist. My advice would be to go
the safe mode route, as you suggested. Another possible avenue (for
advanced users
heya,
I loged onto my hotmail account and was surprised to see a folder in
there.
The folder would be the last one in the Inbox Trash etc etc field
on the left side of the page.
It said, Sonrie www.sonrie.net
It was empty, and i deleted this at once.
A wise guess could be that i was using
Using cross-platform keyboards (SUN, Windows, Mac), how does one use
non-printable characters in their passwords?
Since I work cross-platform, I use only a limited number of characters
while holding down the CTRL key.
Whilst searching Google, I came across a SecurityFocus article that said:
hold
Sorry, I lost the original posting - netcat is a great tool for what you
want. It's kind of like using telnet to connect to a port, but it works
for both UDP and TCP ports and you can pipe commands through it.
Versions are available for both Windows and Unix. You can find it at
the
The vetrinarian's mouth:
cat /usr/share/nmap/nmap-services | grep port number
I do not mean this facetiously. Unfortunately IANA doesn't assign official
ports to backdoors.
-chris
-Ursprüngliche Nachricht-
Von: David Gillett [mailto:[EMAIL PROTECTED]
Gesendet: Thursday, July 31, 2003
De : Michael LaSalvia [mailto:[EMAIL PROTECTED]
Envoye : 12 aout, 2003 15:10
A : 'Jay Woody'; [EMAIL PROTECTED]; [EMAIL PROTECTED];
[EMAIL PROTECTED]
Objet : RE: Getting In
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hum I had the same issue a year ago. I just had gotten laid off
David,
Have you got a Syslog server where you can check the errors appearing, then
send them to Cisco or who ever is your CISCO support, looking at the logs
it should give a good indication onto why you clients a droping the VPN,
maybee they need another client as well ?
Regards,
Cesar
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
it appears to be:
O4 - Global Startup: Symantec Fax Starter Edition Port.lnk =
C:\Program Files\Microsoft Office\Office\1033\OLFSNT40.EXE
As I supposed, it is something legitimate related to
Actually if factoring cost into the factor I wouldn't suggest looking at
McAfee's product. Not that it is bad, but after going through a through
review process of Trend, McAfee, Norton, and Sophos their price was just
below Trend the most expensive.
We chose Sophos and they do have a management
I use eventsentry, http://www.eventsentry.com/. Very cheap filtering
solution. I have it set up to email certain events to me and one daily
summary email from each server covering all events on that server. It has
several notication options, such as smtp, syslog, odbc, xhtml, ascii
printer, net
David,
Have you got a Syslog server where you can check the errors appearing, then
send them to Cisco or who ever is your CISCO support, looking at the logs
it should give a good indication onto why you clients a droping the VPN,
maybee they need another client as well ?
Regards,
Cesar
If you have some money approved, I think this is one of the best pay
protections possible.
http://www.eeye.com/html/Products/SecureIIS/index.html
JayW
dave kleiman [EMAIL PROTECTED] 08/05/03 11:21AM
Yes IIS Lockdown and UrlScan are an important part of for locking down
an
IIS server.
Also
It's a good idea to use one product on clients and another on the gateways
so that you benefit from two signature bases / two heuristic approaches from
two different companies.
just a thought, not criticism.
badenIT GmbH
System Support
Chris Meidinger
Tullastrasse 70
79108 Freiburg
check in portlists for possible trojans at that portnbr., as i remember
kerberos is somehow attracting attention to one of it's port. Ehr, thought
this had something to do with LDAP or some other similarlylike service.
Verify wich services there are running at your host wich is initiating (?)
the
From: Dave C [EMAIL PROTECTED]
John
I've had good luck with Norton Corp SAV.
So have I, it works very well.
And if your users are a little more tech savvy, you can create
a webpage for them to install their own client.
That's not even necessary, Norton Corporate can install all the clients
NAV is too heavy performance wise, the difference between NAV loaded and
unloaded is very noticeable, whereas with trend pc-cillion or officescan
corp edition, the machine runs as if NAV isn't running..
not arguing, NAV is a nice product, i just find it way too heavy on
resources compared to
Hello people,
I would like to learn if is there a tool to track a user when he/she logs on
an unix server (say Linux), it mush be including which commands he/she
enter, which files he/she accessed even changed..so on... it s a kind of
session recorder maybe. I have tried GNU session but it is
If i remember well this could have something to do with nic's from different
brands on the same switch, apparently on very rare occassions these can get
entangled in some really weird stuff and generate such occurency
- Original Message -
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
JM:
Kids don't know how to chage password, and are running with restricted user.
.
JM wrote:
How old are your kids, maybe not so innocent eh?
You probably setup W2000 with all the default options, so have IIS
running on there, with unpatched vulnerabilities.
Check the event log that may
On Fri, 2003-08-08 at 16:30, pablo gietz wrote:
Hi list
I have a machine with Windows 2000 with SP4, Kerio Personal Firewall.
My kids use to chat with messenger.
Last night I discover my admin password was changed, so I have a little
surprised.
My only corrective action until now was to
I've had some good results with a couple of VB scripts run as nightly tasks
to monitor event logs,
Details can be found here:
http://www.secwiz.com/Default.aspx?tabid=79
Did I mention they cost nothing,
Cheers,
Roland
Security Wizards
www.secwiz.com
-Original Message-
From: Bryan S. Sampsel [mailto:[EMAIL PROTECTED]
Sent: Thursday, August 07, 2003 3:08 PM
To: [EMAIL PROTECTED]
Subject: Re: sftp vs ftp with ssl
Another one question in this topic - for sftp services one need a shell
account with interactive shell. If I don't want to
[Maybe for the moderator only, you decide :)]
Justin Pryzby wrote:
The following links were distributed at Defcon 11, and I'm familiar with
most of them. I think these should be included in the FAQ. The links
were distributed in association with InfoSec News of attrition.org,
which which I have
In response to this response.
A.) if it's a spyware client or something similar that's attached to his
IE, switching email providors has no affect on this.
B.) It could have been an error on the MS side
A year ago I took a couple c classes with a Hotmail OPS admin, Here in
San jose at the local
I used the tool Symantec provides (available at their homepage) and
afterwards could not find any traces of the worm left on my computer. so it
propably works
mit freundlichen Grüßen / with regards
johannes lemmerer
-Original Message-
From: Jose Guevarra [mailto:[EMAIL PROTECTED]
Ask again on a different day guys. Many are out trying to fight the
worm at the moment. You may get more replies in a week or so.
JayW
Duffy Hazelhurst [EMAIL PROTECTED] 08/11/03 07:07PM
I can't wait to see the reply, I'd love to know the answer myself.
Duffy
-Original
Here's our issue:
We often have engineers on site at customer locations
where we need to drop off or pick up files from a
public file server. Currently we are using ftp for
this purpose however ftp outbound is being blocked by
more and more of our customers and only port 80 is
open.
My question
He means DoS in the sense that the person doesn't know their password, and
can't access the passworded resource, silly.
Thus, an allowed person is Denied the Service of a resource. Nobody (ok,
almost nobody) is actually worried about an overloaded Password Machine.
As far as standing behind people
Be careful
A Lesson I have learned some time ago, from the management. They say
You not need to kill me to demonstrate that you can do it. So better
mount a presentation with test machines.
netsec novice wrote:
I would like to demonstrate the importance of physical security to
management by
I've always been fond of arpwatch. Arpwatch keeps a simple database of MAC
addresses and IP addresses associated with them. It sends e-mail
notifications when a new device appears on the network and when the MAC
address associated with an IP address changes. This tool does not require
anything
Please pardon me if this has already been covered in this thread, I didn't
see the earlier posts on the subject.
First the PIN algorithm is widely known and there really is no need for much
of a PIN cracker program. Like DES the algorithm is published but the keys
are kept secret. If an
As it was written on Aug 7, thus [EMAIL PROTECTED] spake unto security-basics...:
Ian: Date: Thu, 7 Aug 2003 13:44:58 -0400
Ian: From: [EMAIL PROTECTED]
Ian: To: [EMAIL PROTECTED]
Ian: Subject: verifying an open or closed port on an ip address
Ian:
Ian: Hello,
Ian:
Ian: I am looking for a
Al
You might want to take a look at EventSentry
(http://www.eventsentry.com)
They also have a free version with limited functionality but good for
testing
Freddie
Perfection is achieved not when you have nothing more to add, but when
you have nothing left to take away.
-Original
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Why would you have that port open any way on your firewall. A
firewall should be explicit deny all unless there is a need to have
that port open. I don't know many people that have port open for
any reason. I can say that because I deal with many
Hi Sayo,
if people flame you for asking newbie questions, it's usually because they
have no idea themselves what they are talking about, just ignore them.
Anyway, you can use fport from foundstone.com to see which application is
bound to which port. Then you just use google to research the
We have been testing the Transparent Screen Lock
http://www.e-motional.com/TScreenLock.htm
It basically allows you to prevent access to a Windows server
but allows the display to be visible.Before going ahead with
a large scale installation I was wonderingif any of you guys
have had any
Hi,
JG Has anyone successfully purged the MSBlaster worm. There is a tool out
JG there that can do it but is it reliable?
Symantec has made a tool available:
http://www.symantec.com/avcenter/venc/data/w32.blaster.worm.removal.tool.html
A friend told me that it works.
greetZ //AndY
The following article was added to the SecurityFocus basics section today:
Basic IIS Lockdown Using Scripts and Group Policy
by Mark Squire
This paper is written for system administrators who want to make their
life managing IIS easier using scripts with Active Directory and Group
Policy.
Last I heard (heard from comcast) is that they do not block vpn traffic
but do monitor. If you do use it all the time, they request that you
purchase the business service.Not sure what they will do if you
refuse.
-Original Message-
From: David Gillett [mailto:[EMAIL PROTECTED]
Sent:
1 - 100 of 247 matches
Mail list logo