RE: Securing IIS Server

2003-08-14 Thread Marc Maiffret
Also check out SecureIIS. We have a free edition for personal use. So if your looking for something like URLScan, but that actually works, grab SecureIIS. The free version can be downloaded at http://www.eeye.com/html/Products/SecureIIS/Download.html Signed, Marc Maiffret Chief Hacking Officer

RE: comcast blocking ipsec traffic?

2003-08-14 Thread Christian Stratton
I did notice that. My question is what did you do to your configuration to make it work. I have had the problem all day with netscreen and have not come up with a solution. -Original Message- From: abe vigoda [mailto:[EMAIL PROTECTED] Sent: Tuesday, August 12, 2003 2:13 PM To:

RE: Distinctions in Certification

2003-08-14 Thread DeGennaro, Gregory
Ernie is correct Regards, Greg DeGennaro Jr., CCNP Security Analyst -Original Message- From: Nelson, Ernie [mailto:[EMAIL PROTECTED] Sent: Wednesday, August 13, 2003 12:51 PM To: [EMAIL PROTECTED] Subject: RE: Distinctions in Certification It is my understanding that the main

bridging plus caching using squid

2003-08-14 Thread Shankara Narayanan
Hi list, Trying put place a caching box to save my bandwidth, parallely need to build a bridge on the same system. (it is an ISP setup) The purpose of bridging is , I have lots of customer behind my squid, so I need the packets to take there own IP address to the internet and not my caching

RE: Network scanning

2003-08-14 Thread Ethan
Most newer switches can lock down how many mac addresses are allowed to be sourced on one port.. if that amount is reached, the port can be disabled or other action taken (snmp trap, etc)... I know there are plenty of cisco switches that do this anyhow, I'm sure there are others... Ethan

RE: Distinctions in Certification

2003-08-14 Thread Nelson, Ernie
It is my understanding that the main difference is the cissp is knowledge from a management type of perspective while the giac certifications are usually more hands on with the actual technology. I have only lightly gone over what is needed for cissp, so I cannot be sure. I have however

RE: comcast blocking ipsec traffic?

2003-08-14 Thread Jay
I've had many problems with Comcast, my connection has been lagging horribly and is dropped frequently. I've contacted customer service and supposedly they improved connection quality. I'd recommend if you have the option to go with another ISP. On Wed, 2003-08-13 at 09:31, Mark McConnell wrote:

RE: Nortel Contivity VPN and Firewalls

2003-08-14 Thread Chris DeVoney
Our firewall people just looked at that. I believe it is UDP 500. cdv Chris DeVoney Clinical Research Center Informatics University of Washington [EMAIL PROTECTED] 206-598-6816 -Original Message- From: [EMAIL PROTECTED]

RE: comcast blocking ipsec traffic?

2003-08-14 Thread abe vigoda
Just a followup on this for the list... I don't know about the AUP. Tough for me to tell what our end users have agreed to when they signed up with Comcast (if they did since many are captive former ATT Broadband customers.) We use the Cisco VPN and we were able to configure to run over UDP.

RE: Unrecognized folder in Hotmail Inbox.

2003-08-14 Thread Jeff MacDonald
On Mon, 2003-08-11 at 01:17, matt willson wrote: In response to this response. A.) if it's a spyware client or something similar that's attached to his IE, switching email providors has no affect on this. hmm.. well, I guess that assumes that there is spyware available that detects use of

RE: comcast blocking ipsec traffic?

2003-08-14 Thread Keenan Smith
I'm using a VPN tunnel in the Baltimore/WDC area (both source and destination in the same area) and have not had any problems with connectivity today (8/12/03). It's been very smooth all day. KC Smith === Keenan (KC) Smith [EMAIL PROTECTED] 410-730-8652 (h) 410-852-9759

RE: Nortel Contivity VPN and Firewalls

2003-08-14 Thread Seva Batkin
I thought it was port 500? -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Sent: August 12, 2003 8:28 PM To: [EMAIL PROTECTED] Subject: Nortel Contivity VPN and Firewalls Hello, Anyone has setup firewall policy to allow Nortel Contivity VPN clients through ? What

RE: Network scanning

2003-08-14 Thread K sPecial
It would be sort of odd for someone to go in a back room and pull out a computer, whip it up on the switch and proceed to fire up ethereal. Yet not impossible using a switch that locks down would deffinitely help but you also got to remember ARP cache poisoning is a major factor in what you are

RE: Distinctions in Certification

2003-08-14 Thread Peter Baxter
Well as someone who hires security staff, I look for hands-on real world experience. The CISSP and the rest are all too conceptual based, I've had students with these certs who do not know how to do fragmented port scans. From my experience a pratical security certification such as the ESA from

backlog queue size?

2003-08-14 Thread SB CH
Hello, all. Backlog queue size means the memory size which stores syn_received state. so this can be used against syn_flooding attack, right? Then, other state like Established, Last_ack, Fin_wait_1, Closings are stored at backlog queue too? or any other memory space? Thanks in advance.

Re: Network scanning

2003-08-14 Thread himicos
One thing that you could do is use a tool that would send an ICMP packet to all possible addresses in your particular network. That won't detect all connecting hosts, in particular if someone jacks in to sniff only, but that assumes that your network is hub based. If your network is switch

RE: comcast blocking ipsec traffic?

2003-08-14 Thread Mark McConnell
Comcast has many problems wit their network -Original Message- From: abe vigoda [mailto:[EMAIL PROTECTED] Sent: Tue 8/12/2003 5:13 PM To: [EMAIL PROTECTED] Cc: Subject: comcast blocking ipsec traffic? Has

RE: Anit-Virus Software

2003-08-14 Thread Kenneth W. Kubiak
Hey John. My organization has had Norton Corporate Edition running for well over a year now, protecting over 100 workstations and 7 servers. Not that you should ever become complacent about virus', but knowing I have NAVCE protecting me has really helped ease my worries in that area! It's

Re: Network scanning

2003-08-14 Thread White-Tiger
Ok, I do not know about eapol for wireless products, just hardline. when you plug in your device, you won't be able to see any broadcasts until you go through the eapol process with the MAC of the NIC, so if they have access to a PC, they can look at the pc MAC, then spoof it on the switch with

Re: sftp vs ftp with ssl

2003-08-14 Thread Ido Breger
Try to add /sbin/nologin to /etc/shells When you add a user, change his shell in /etc/passwd to /sbin/nologin - Original Message - From: Skibi de LaPies [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Friday, August 08, 2003 12:30 AM Subject: RE: sftp vs ftp with ssl -Original

RE: sftp vs ftp with ssl

2003-08-14 Thread Glenn English
On Thu, 2003-08-07 at 16:30, Skibi de LaPies wrote: Another one question in this topic - for sftp services one need a shell account with interactive shell. If I don't want to allow users to login but I want to use sftp then what should I do? (of course i may be wrong, but I haven't found the

SSH mail server experiments

2003-08-14 Thread chris Verhagen
A week ago I started a webhosting service for subdomains at http://crystal-ninja.cjb.net . Now, ofcourse, people need to ftp into their public_html directory in their home dirs. I'm using proFTPd for that. But now for the problem: I just got the idea to make a funny mail service. People should

Re: Network scanning

2003-08-14 Thread Bradley Adams
In-Reply-To: [EMAIL PROTECTED] I just might have the answer http://www.dameware.com This is a very cool program that does an extremely large amount of network managment compaired to its price. l8tr Bradley Adams [EMAIL PROTECTED] Received: (qmail 30593 invoked from network); 7 Aug 2003

Re: Network scanning

2003-08-14 Thread Rory
for the wireless stuff I would just do mac filtering, any host that is not in the list of mac address is not allowed to join the wireless network. Of course the network traffic can still be sniffed using any laptop but you can just encrypt the traffic over wireless as you suggested. The mac

Re: Anit-Virus Software

2003-08-14 Thread [EMAIL PROTECTED]
[EMAIL PROTECTED] wrote: Cost is probably going to be a factor. Mcafee has a product in addition to VirusScan that you can use to manage all hosts from a single console. It's E-Policy Orchestrator. I don't believe Sophos has anything except reporting. sophos has since a *really* long time

RE: sftp vs ftp with ssl

2003-08-14 Thread Sunny Walia
Trond, I believe if you have port 22 open for SSH you should be ok. I use OpenSSH sftp and don't need to do anything special and vsftpd for regular ftp since it provide chroot option. -Sunny -Original Message- From: subscribe [mailto:[EMAIL PROTECTED] Sent: Wednesday, August 06, 2003

RE: Getting In

2003-08-14 Thread scott
Your best bet is try gaining experience with your current company. Most Information Security departments are more willing to hire from within than from outside. Most Security Professionals have a varied background. Most of the ones I have met have a background in System Administration, some

RE: Data Compression

2003-08-14 Thread Paul Farag
Have you considered SSH? It'll compress your traffic as well as encrypt it. -Original Message- From: Hendra Santosa [mailto:[EMAIL PROTECTED] Sent: Tuesday, August 05, 2003 8:07 AM To: [EMAIL PROTECTED] Subject: Data Compression Hi, I have several sites and all of them are running

Re: Using non-printable characters in passwords

2003-08-14 Thread Tim Greer
One that throws people off for file names and directory names, especially in certain platforms, is ALT+255. :-) -- Regards, Tim Greer [EMAIL PROTECTED] Server administration, security, programming, consulting. - Original Message - From: Birl [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent:

Ang: Security Audits

2003-08-14 Thread Lars Westergren
Hi, You might want to check The Open-Source Security Testing Methodology Manual http://www.isecom.org/projects/osstmm.htm Cheers, Lars Sebastian Schneider [EMAIL PROTECTED] 2003-08-11 18:16 Hi, is there a common approach to plan security audits? Which ways are most fitting to security and

RE: Check Point and/or NetScreen Training???

2003-08-14 Thread Michael LaSalvia
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 You should be able to do the Netscreen by just getting a test kit and a Netscreen from ebay. They are extremely easy to use and configure and not much changes between the different models. I had the fortune of getting trained at work by both

Re: file transfer over outbound port 80?

2003-08-14 Thread Dana Epp
I actually do this right now. I simply set my ssh daemon on port 80, and use scp to covertly bypass most standard firewalls. Unless they do payload inspection, you can normally pierce the firewall fine in this manner. ie: scp -P 80 [EMAIL PROTECTED]:/get/some/file/ . Short of that, you could

RE: file transfer over outbound port 80?

2003-08-14 Thread Nero, Nick
I use web sharing on IIS. You can share a folder and downloads can be done as if they were from web page. If you can browse, you can get to it. I suppose there is a way to upload but I haven't ever configured that. In Windows 2000/2003, rightclick on a folder and choose websharing. Pick the

RE: Transparent Screen Lock for Win NT/2000/XP

2003-08-14 Thread Angie Urtel
I played with it a little since it was nicer than the Clear Screen Saver by MS. However, if you are running virtual desktop software, it only locks the desktop you're on, not the others. Hence, I could bounce my mouse and get to my secondary desktop that was completely active even though my

Prevent wireless clients from connecting to rogue access points?

2003-08-14 Thread Kip Sr.
Hi there! We've seen a few cases in our office where some of our clients are automatically connecting to rogue WAPs and picking up an IP address. It's a bit of a security issue, since now the system is connected to our corporate network as well as someone else's network. Has anyone dealt with

Security Policy-Please help

2003-08-14 Thread Kampanellis Ioannis
Hi! I pursue an MSc in System and Network Security and I am currently doing my internship in a media group (ieTV, Radio, WebSites etc).My mission is to write down a security policy for their network. Basically I know where to start,meaning things such as Anti-Virus etc. The problem is that

Re: XP Box appears to be compromised

2003-08-14 Thread James Fields
Put the sniffer on it - don't take the attitude that the sniffer is the hard way or too time-consuming. Slap ethereal or something similar right on the box and capture the activity. Even if you don't look at all the packet details you'll get source and destination addresses and port numbers

Re: sftp vs ftp with ssl

2003-08-14 Thread Bryan S. Sampsel
Glenn English wrote: On Wed, 2003-08-06 at 11:53, subscribe wrote: The only problem I've had is that I still have to keep ftp around for some of the webmasters with *nix-challenged software. Actually, WSFTP client and CuteFTP are supporting it now. Have fun bursting their bubbles on that one.

RE: Network scanning

2003-08-14 Thread CHRIS GRABENSTEIN
That is true. If that's the case though, he should really consider investing in a locking cabinet. They don't take up that much room. Of course there are situations it won't be practical, but I think it can be managed in most. Is there any reason to give everyone access to the switch?

Re: Anit-Virus Software

2003-08-14 Thread greg.jensen
I must say, we use eTrust AV in a VERY large enviorment and have never seen this. The very fact that McAfee and Symantec have (combined) had about a dozen quality issues ranging from the 4 vulnerabilities in ePO, to the more recent issues that screwed everybody that upgraded to 7.04, only

Re: Security Policy-Please help

2003-08-14 Thread J. Lambrecht
You don't seem to be completely in the dark on this. Doesn't matter that much if the network is old or not. Read some documentation on the hardening of computers and networks. No need to start and crack away at passwords, even windows has some policy-tools on this. There are library's out there

Re: Anit-Virus Software

2003-08-14 Thread Ian
Hi, One of the Good things about ePolicy Orchestrator is it can manage more than just McAfee anti-virus products. You can manage McAfee Desktop Firewall as well and get details of other anti-virus products installed on your network from other vendors such as Symantec (Norton) and Dr Ahn.. A

Re: Securing IIS Server

2003-08-14 Thread salgak
-Original Message- From: NR [mailto:[EMAIL PROTECTED] Sent: Tuesday, August 5, 2003 10:22 AM To: [EMAIL PROTECTED] Subject: Securing IIS Server Hi, I have IIS Server in which i want to install IIS lockdown and URLScan, i heard they are very good to protect IIS server, are they

RE: XP Box appears to be compromised

2003-08-14 Thread Paul Farag
Assuming someone's watching the screen, there's a good chance they'll close the connection if they see you doing a netstat while they're connected. Doesn't sound like anything related to terminal services (xp remote desktop) as it'll lock the console session while the remote session is active.

RE: Password audit dictionary

2003-08-14 Thread O'Connell, Geoffrey
Sanjay, It's not quite password auditing but maybe you can have a look at www.elcomsoft.com they also have a few dictionaries availible to download. Hope this helps Geoffrey -Original Message- From: Sanjay K. Patel [SMTP:[EMAIL PROTECTED] Sent: Tuesday, August 05, 2003 12:14 AM To:

RE: User Tracking Audit on Unix Systems

2003-08-14 Thread Shane Lahey
-Original Message- From: Ozgur C. Demir [mailto:[EMAIL PROTECTED] Sent: Tuesday, August 05, 2003 3:30 PM To: [EMAIL PROTECTED] Subject: User Tracking Audit on Unix Systems Hello people, I would like to learn if is there a tool to track a user when he/she logs on man lastlog

RE: Getting In

2003-08-14 Thread Michael LaSalvia
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I feel it gave me an edge during interviews. I new more stuff and felt more comfortable answering questions. I don't think it gives me an edge like a CISSP would or like my Check Point Certs did, but as the industry starts realizing more certs as

RE: Securing IIS Server

2003-08-14 Thread Chris Neppes
Also, modify header data and TCP/IP settings defeat tools like Nmap... http://www.port80software.com/support/articles/maskyourwebserver - Chris :: :: Chris Neppes Port80 Software, Inc. www.port80software.com 5252 Balboa Ave., Ste. 605 San Diego, CA 92117 [EMAIL

Fw: Securing Web access from internet

2003-08-14 Thread Chris
Bob, I just went through the same situation. There is an easy answer for you if you are running a Cisco router on your perimeter. Use IP Authentication Proxy. All you have to do is download the crypto image of the latest IOS from Cisco and apply it to your router and then configure IP

RE: Anti-Virus Software

2003-08-14 Thread Kevin Rogers
I have been using Symantec AV Corp/Enterprise for several years and have been very satisfied. I have 13 servers, about 250 clients and an Exchange Server. To do the whole kit and caboodle (Quarantine Server, AMS, etc.) can be a bit cumbersome, but once it is in place there seems to be very

RE: Nessus/keyloggers

2003-08-14 Thread Manuel Lanctôt
-Message d'origine- De : netsec novice [mailto:[EMAIL PROTECTED] Envoyé : 7 août, 2003 21:35 À : [EMAIL PROTECTED] Objet : Nessus/keyloggers I would like to demonstrate the importance of physical security to management by presenting information I was able to easily obtain by

Re: Microsoft Instant Messenger

2003-08-14 Thread Juraj Ziegler
On 6 Aug 2003 12:43:29 - Shelina Samji [EMAIL PROTECTED] wrote: What are the security risks in implementing an Instant Messaging Infrastructure for internal use only? Can it be secured? Though I have zero experience with MSN, I would recommend using Jabber (http://www.jabber.org) *

Fxscanner and files

2003-08-14 Thread Sanjay K. Patel
We found fxscanner installed on one of our box's. The anitvirus removed it but now there is a folder called earth that we cannot remove. We have tried to take ownership but that still does not let us delete the folder. The error we get is file not found while deleting. How can we force folder

RE: UNIX password auditing tool and the search for dictionaries too

2003-08-14 Thread Tomas Wolf
I would like to note a little about the security of 4 digit pin... I believe that author wanted to point out that thanks to the fact, that you can't try the 4 digit number more than three times at a time - which makes it a pretty strong system, not that 4 digit is a strong password. Of course

RE: Event Viewer Monitoring Tool

2003-08-14 Thread Damon McMahon
A recent article on SANS covered how to do this using only native and freeware tools: http://www.sans.org/rr/win/event_logs3.php From : Alastair Cook [EMAIL PROTECTED] To : [EMAIL PROTECTED] Subject : Event Viewer Monitoring Tool Date : Mon, 11 Aug 2003 12:20:23 +0100 Has anyone got any

RE: wifi security

2003-08-14 Thread Mark Harris
Very informed, user based solution, found this a good starting point: http://arstechnica.com/paedia/w/wireless-security-howto/home-802.11b-1.html Mark Harris Principal Security Consultant ASPACE Solutions - Leading Business Minds T: +44 (0)20 7744 6248 M: +44 (0)7867 526 808 Website

RE: Purging Blaster.worm

2003-08-14 Thread Parolini, Walter A REV:EX
Hi, I was successful in using the tool from the Symantec website. I had to change settings in the Remote Procedure Call Service (RPC) in Windows XP before downloading and running the tool. I changed the failure settings on the recovery tab to 'Take No Action'. Walter Parolini Workload

Re: SSH mail server experiments

2003-08-14 Thread Adam Newhard
I don't quite remember exactly, but there are override options for a lot of ftp daemons (including proftpd b/c i've done it before). to some extent, this is a case of rtfm, but the option is burried so i don't blame you for asking. On the other hand, people will be able to get shell access of

RE: Getting In

2003-08-14 Thread David Olsen
Hi, It's not the biggest cert but the Security+ might be a start. There is no experience requirement but demonstrates some basic knowledge. You could follow this up with the TICSA which requires two years of experience or 48 hours of classes. The GIAC courses also do not require experience.

Re: file transfer over outbound port 80?

2003-08-14 Thread Sebastian Schneider
Sure, there are several means. At first you could use a DMS like Domino or sort of to build up directories capable of fulltext search. Another solution might be a website secured by login. usually ssh at default port is available through firewalls. On Thursday, August 7, 2003, at 05:50 PM, abe

Problems installing Nessus

2003-08-14 Thread Scott McKee
I've been having problems installing Nessus on a new install of Red Hat Linux 8.0. I'm very new to Linux and have been trying for the past two weeks to figure this out on my own but I can't seem to get my head around this. I'm sure its something simple. Can anyone give me a hand. I have

Re: Question for all

2003-08-14 Thread Ansgar Wiechers
On 2003-08-04 Chris Berry wrote: From: Bob Walker [EMAIL PROTECTED] While I am a huge fan of the msconfig utility in windows machines, it doesn't work in win2k. Doesn't even exist. My advice would be to go the safe mode route, as you suggested. Another possible avenue (for advanced users

Unrecognized folder in Hotmail Inbox.

2003-08-14 Thread dagreat1
heya, I loged onto my hotmail account and was surprised to see a folder in there. The folder would be the last one in the Inbox Trash etc etc field on the left side of the page. It said, Sonrie www.sonrie.net It was empty, and i deleted this at once. A wise guess could be that i was using

Using non-printable characters in passwords

2003-08-14 Thread Birl
Using cross-platform keyboards (SUN, Windows, Mac), how does one use non-printable characters in their passwords? Since I work cross-platform, I use only a limited number of characters while holding down the CTRL key. Whilst searching Google, I came across a SecurityFocus article that said: hold

Re: verifying an open or closed port on an ip address

2003-08-14 Thread James Fields
Sorry, I lost the original posting - netcat is a great tool for what you want. It's kind of like using telnet to connect to a port, but it works for both UDP and TCP ports and you can pipe commands through it. Versions are available for both Windows and Unix. You can find it at the

AW: source LAN port 137 dest 169.x

2003-08-14 Thread Meidinger Chris
The vetrinarian's mouth: cat /usr/share/nmap/nmap-services | grep port number I do not mean this facetiously. Unfortunately IANA doesn't assign official ports to backdoors. -chris -Ursprüngliche Nachricht- Von: David Gillett [mailto:[EMAIL PROTECTED] Gesendet: Thursday, July 31, 2003

RE: Getting In

2003-08-14 Thread Manuel Lanctot
De : Michael LaSalvia [mailto:[EMAIL PROTECTED] Envoye : 12 aout, 2003 15:10 A : 'Jay Woody'; [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED] Objet : RE: Getting In -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hum I had the same issue a year ago. I just had gotten laid off

RE: Cisco Workaround

2003-08-14 Thread Cesar Osorio
David, Have you got a Syslog server where you can check the errors appearing, then send them to Cisco or who ever is your CISCO support, looking at the logs it should give a good indication onto why you clients a droping the VPN, maybee they need another client as well ? Regards, Cesar

RE: Database of strange files

2003-08-14 Thread Di Fresco Marco
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 it appears to be: O4 - Global Startup: Symantec Fax Starter Edition Port.lnk = C:\Program Files\Microsoft Office\Office\1033\OLFSNT40.EXE As I supposed, it is something legitimate related to

RE: Anit-Virus Software

2003-08-14 Thread Jeff Wichman
Actually if factoring cost into the factor I wouldn't suggest looking at McAfee's product. Not that it is bad, but after going through a through review process of Trend, McAfee, Norton, and Sophos their price was just below Trend the most expensive. We chose Sophos and they do have a management

RE: Event Viewer Monitoring Tool

2003-08-14 Thread Seth Connolly
I use eventsentry, http://www.eventsentry.com/. Very cheap filtering solution. I have it set up to email certain events to me and one daily summary email from each server covering all events on that server. It has several notication options, such as smtp, syslog, odbc, xhtml, ascii printer, net

RE: Cisco Workaround

2003-08-14 Thread Cesar Osorio
David, Have you got a Syslog server where you can check the errors appearing, then send them to Cisco or who ever is your CISCO support, looking at the logs it should give a good indication onto why you clients a droping the VPN, maybee they need another client as well ? Regards, Cesar

RE: Securing IIS Server

2003-08-14 Thread Jay Woody
If you have some money approved, I think this is one of the best pay protections possible. http://www.eeye.com/html/Products/SecureIIS/index.html JayW dave kleiman [EMAIL PROTECTED] 08/05/03 11:21AM Yes IIS Lockdown and UrlScan are an important part of for locking down an IIS server. Also

AW: Anit-Virus Software

2003-08-14 Thread Meidinger Chris
It's a good idea to use one product on clients and another on the gateways so that you benefit from two signature bases / two heuristic approaches from two different companies. just a thought, not criticism. badenIT GmbH System Support Chris Meidinger Tullastrasse 70 79108 Freiburg

Re: port 2112

2003-08-14 Thread J. Lambrecht
check in portlists for possible trojans at that portnbr., as i remember kerberos is somehow attracting attention to one of it's port. Ehr, thought this had something to do with LDAP or some other similarlylike service. Verify wich services there are running at your host wich is initiating (?) the

Re: Anit-Virus Software

2003-08-14 Thread Chris Berry
From: Dave C [EMAIL PROTECTED] John I've had good luck with Norton Corp SAV. So have I, it works very well. And if your users are a little more tech savvy, you can create a webpage for them to install their own client. That's not even necessary, Norton Corporate can install all the clients

RE: Anit-Virus Software

2003-08-14 Thread stephen at unix dot za dot net
NAV is too heavy performance wise, the difference between NAV loaded and unloaded is very noticeable, whereas with trend pc-cillion or officescan corp edition, the machine runs as if NAV isn't running.. not arguing, NAV is a nice product, i just find it way too heavy on resources compared to

User Tracking Audit on Unix Systems

2003-08-14 Thread Ozgur C. Demir
Hello people, I would like to learn if is there a tool to track a user when he/she logs on an unix server (say Linux), it mush be including which commands he/she enter, which files he/she accessed even changed..so on... it s a kind of session recorder maybe. I have tried GNU session but it is

Re: Windows XP computer spewing packets

2003-08-14 Thread J. Lambrecht
If i remember well this could have something to do with nic's from different brands on the same switch, apparently on very rare occassions these can get entangled in some really weird stuff and generate such occurency - Original Message - From: [EMAIL PROTECTED] To: [EMAIL PROTECTED]

Re: Windows 2000 - Invites you

2003-08-14 Thread pablo gietz
JM: Kids don't know how to chage password, and are running with restricted user. . JM wrote: How old are your kids, maybe not so innocent eh? You probably setup W2000 with all the default options, so have IIS running on there, with unpatched vulnerabilities. Check the event log that may

Re: Windows 2000 - Invites you

2003-08-14 Thread Thomas TS
On Fri, 2003-08-08 at 16:30, pablo gietz wrote: Hi list I have a machine with Windows 2000 with SP4, Kerio Personal Firewall. My kids use to chat with messenger. Last night I discover my admin password was changed, so I have a little surprised. My only corrective action until now was to

RE: Event Viewer Monitoring Tool

2003-08-14 Thread Roland Venter
I've had some good results with a couple of VB scripts run as nightly tasks to monitor event logs, Details can be found here: http://www.secwiz.com/Default.aspx?tabid=79 Did I mention they cost nothing, Cheers, Roland Security Wizards www.secwiz.com

RE: sftp vs ftp with ssl

2003-08-14 Thread Skibi de LaPies
-Original Message- From: Bryan S. Sampsel [mailto:[EMAIL PROTECTED] Sent: Thursday, August 07, 2003 3:08 PM To: [EMAIL PROTECTED] Subject: Re: sftp vs ftp with ssl Another one question in this topic - for sftp services one need a shell account with interactive shell. If I don't want to

Re: Links for FAQ

2003-08-14 Thread Jan Reilink
[Maybe for the moderator only, you decide :)] Justin Pryzby wrote: The following links were distributed at Defcon 11, and I'm familiar with most of them. I think these should be included in the FAQ. The links were distributed in association with InfoSec News of attrition.org, which which I have

RE: Unrecognized folder in Hotmail Inbox.

2003-08-14 Thread matt willson
In response to this response. A.) if it's a spyware client or something similar that's attached to his IE, switching email providors has no affect on this. B.) It could have been an error on the MS side A year ago I took a couple c classes with a Hotmail OPS admin, Here in San jose at the local

RE: Purging Blaster.worm

2003-08-14 Thread Johannes Lemmerer
I used the tool Symantec provides (available at their homepage) and afterwards could not find any traces of the worm left on my computer. so it propably works mit freundlichen Grüßen / with regards johannes lemmerer -Original Message- From: Jose Guevarra [mailto:[EMAIL PROTECTED]

RE: Getting In

2003-08-14 Thread Jay Woody
Ask again on a different day guys. Many are out trying to fight the worm at the moment. You may get more replies in a week or so. JayW Duffy Hazelhurst [EMAIL PROTECTED] 08/11/03 07:07PM I can't wait to see the reply, I'd love to know the answer myself. Duffy -Original

file transfer over outbound port 80?

2003-08-14 Thread abe vigoda
Here's our issue: We often have engineers on site at customer locations where we need to drop off or pick up files from a public file server. Currently we are using ftp for this purpose however ftp outbound is being blocked by more and more of our customers and only port 80 is open. My question

RE: UNIX password auditing tool and the search for dictionaries too

2003-08-14 Thread Meidinger Chris
He means DoS in the sense that the person doesn't know their password, and can't access the passworded resource, silly. Thus, an allowed person is Denied the Service of a resource. Nobody (ok, almost nobody) is actually worried about an overloaded Password Machine. As far as standing behind people

Re: Nessus/keyloggers

2003-08-14 Thread pablo gietz
Be careful A Lesson I have learned some time ago, from the management. They say You not need to kill me to demonstrate that you can do it. So better mount a presentation with test machines. netsec novice wrote: I would like to demonstrate the importance of physical security to management by

RE: Network scanning

2003-08-14 Thread Tony Kava
I've always been fond of arpwatch. Arpwatch keeps a simple database of MAC addresses and IP addresses associated with them. It sends e-mail notifications when a new device appears on the network and when the MAC address associated with an IP address changes. This tool does not require anything

RE: UNIX password auditing tool and the search for dictionaries too

2003-08-14 Thread Tim Heagarty
Please pardon me if this has already been covered in this thread, I didn't see the earlier posts on the subject. First the PIN algorithm is widely known and there really is no need for much of a PIN cracker program. Like DES the algorithm is published but the keys are kept secret. If an

Re: verifying an open or closed port on an ip address

2003-08-14 Thread Birl
As it was written on Aug 7, thus [EMAIL PROTECTED] spake unto security-basics...: Ian: Date: Thu, 7 Aug 2003 13:44:58 -0400 Ian: From: [EMAIL PROTECTED] Ian: To: [EMAIL PROTECTED] Ian: Subject: verifying an open or closed port on an ip address Ian: Ian: Hello, Ian: Ian: I am looking for a

RE: Event Viewer Monitoring Tool

2003-08-14 Thread Freddie Soerensen
Al You might want to take a look at EventSentry (http://www.eventsentry.com) They also have a free version with limited functionality but good for testing Freddie Perfection is achieved not when you have nothing more to add, but when you have nothing left to take away. -Original

RE: Blocking port 4444 for W32.Blaster.Worm

2003-08-14 Thread Michael LaSalvia
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Why would you have that port open any way on your firewall. A firewall should be explicit deny all unless there is a need to have that port open. I don't know many people that have port open for any reason. I can say that because I deal with many

RE: Some 'new guy' questions

2003-08-14 Thread Meidinger Chris
Hi Sayo, if people flame you for asking newbie questions, it's usually because they have no idea themselves what they are talking about, just ignore them. Anyway, you can use fport from foundstone.com to see which application is bound to which port. Then you just use google to research the

Transparent Screen Lock for Win NT/2000/XP

2003-08-14 Thread Cathy Milan
We have been testing the Transparent Screen Lock http://www.e-motional.com/TScreenLock.htm It basically allows you to prevent access to a Windows server but allows the display to be visible.Before going ahead with a large scale installation I was wonderingif any of you guys have had any

Re: Purging Blaster.worm

2003-08-14 Thread Andreas Rothlauf
Hi, JG Has anyone successfully purged the MSBlaster worm. There is a tool out JG there that can do it but is it reliable? Symantec has made a tool available: http://www.symantec.com/avcenter/venc/data/w32.blaster.worm.removal.tool.html A friend told me that it works. greetZ //AndY

SecurityFocus new article announcement

2003-08-14 Thread Kelly Martin
The following article was added to the SecurityFocus basics section today: Basic IIS Lockdown Using Scripts and Group Policy by Mark Squire This paper is written for system administrators who want to make their life managing IIS easier using scripts with Active Directory and Group Policy.

RE: comcast blocking ipsec traffic?

2003-08-14 Thread Jennifer Fountain
Last I heard (heard from comcast) is that they do not block vpn traffic but do monitor. If you do use it all the time, they request that you purchase the business service.Not sure what they will do if you refuse. -Original Message- From: David Gillett [mailto:[EMAIL PROTECTED] Sent:

  1   2   3   >