mended to proxy or socksify
your connections throughout as many servers as you can find. Most
IDSes and log correlation tools will be able to detect your DNS
queries and handle is as hostile behavior.
Regards,
Alberto Cozer
Security Outsource Director, Future Technologies Digital Security
IBM Certi
much time on this. It's better spending more time hardening your
system and deploying IDSs
Best regards,
Alberto Cozer
Security Oustourcing Director, Future Technologies Digital Security
IBM Certified AIX System Specialist
Checkpoint Certified Security
f colocate both
DMZs on the same network segment/firewall NIC. In this case you will
have to pay attention for addressing, routing and nating in order to
avoid security problems.
Alberto Cozer
Security Outsource Manager, Future Technologies Digital Security
IBM Certified AIX System Specialist
in order to get more information about what do do
with the product (whether implement it or not), since you might have
no support from Tivoli.
It is one of the hardest Tivoli products that I have ever deployed.
Best regards,
Alberto.
Alberto Cozer
Security Outsource Manager, Future Technologies D
There is a tool called "Promiscan" which was presented at the BlackHat
last year. You can find this tool at http://www.securityfriday.com/.
They have also presented techniques for primiscuous interfaces
detection, some new some known.
Regards
Alberto Cozer
Security Outsource Manag
Abraham,
Depending on your environment architecture, IBM Tivoli Global Sign-On
might solve
your problem.
Regards,
Alberto Cozer
Security Consultant, Future Technologies Digital Security
IBM Certified AIX System Specialist
[EMAIL PROTECTED]
http://www.fti.com.br
Tel / Fax: 55 (21) 2522-5362
ready been comercially released but the link for downloading the
presentation is bellow.
http://www.blackhat.com/presentations/bh-usa-01/DaijiSanai/bh-usa-01-Sanai.ppt
Alberto Cozer
Security Analyst, Future Technologies Digital Security
IBM Certified AIX System Specialist
[EMAIL PROTECTED]