On Wed, Jul 16, 2003 at 01:09:10PM +0200, Pessoft wrote:
> 1) Exist any way how to disable, or change sendmail banner to not
> show sendmail's version.
In the .mc file:
define(`confSMTP_LOGIN_MSG', `$j Sendmail 8.12.11/8.12.10; $b')
in the .cf file:
O SmtpGreetingMessage=$j Sendmail 8.12.11/8.1
On Mon, Jul 07, 2003 at 08:27:17PM -0400, Jim wrote:
> I've been following some of the conversations about 192.168 networks,
> and tried some experimentation, and came up with a few questions:
>
> 1. I've tried the technique mentioned to ping the broadcast address,
> and then check arp -a (on Win
On Fri, Jul 04, 2003 at 04:56:10PM +0700, Nawapong Nakjang` wrote:
> Does anyone know if there is a free management console for Tripwire? I
> know Samhain has a nice console. But we ve already deployed Tripwire on
> several hosts and sataisfied with its performance but of course not its
> managebil
On Wed, Jun 25, 2003 at 02:24:46AM -0400, Anish Basu wrote:
> web server will be running Red Hat 9.0. Is there any reason to install
> and configure firewall software such as IPTables on the web server itself?
> Are there any advantaqes or disadvantages to having two firewalls set up
> this way?
On Mon, Jun 16, 2003 at 09:29:36PM -0400, Derek Perry wrote:
> Is there a sshd for Windows (W2K Server is the actual OS) that is freely
> available? I am doing a senior design project for a class at school and I
> would like a way to log in remotely to the server at the company which I am
> workin
On Tue, May 27, 2003 at 12:38:58PM -0400, steve baker wrote:
> One of our users has received questionable and possibly life threatening
> emails from a yahoo account that was created recently. They have approached
> us to find out as much as we can pertaining to the person sending it.
>
> Of cour
On Fri, Mar 28, 2003 at 04:28:31PM -0500, Steven Bourque wrote:
> Does anyone know of a location that lists current encryption laws worldwide?
>
> We are looking at implementing encryption to locations world wide
> (within one organization) and want to know of any possible legality
> issues we m
On Thu, Mar 06, 2003 at 08:06:50PM -, Craig Brauckmiller wrote:
> Hello all. I'm looking for a log analyzer for Ethereal. I downloaded the
> Win32 version of Ethereal and want to run some basic analysis on my
> network traffic. I have Google'd for some utils and tried SawMill but it
> doe
On Thu, Feb 20, 2003 at 09:33:36AM -, Kenneth Hauklien wrote:
> Hi
>
> Is there any way to limit a users / groups processes? I run a shell/web
> server and want to limit them down to for example 2-3 processes. Is this
> possible in any way?
>
> Thank you all in advance
Depends on the OS.
On Fri, Feb 07, 2003 at 10:54:13AM +0100, Chris Carter wrote:
> Hi guys,
>
> For the last two months or so I have been receiving emails with the
> I-Worm/Sobig virus attached about twice a day. My anti-virus sw protects
> me well so I am not infected in any way (nor has anybody else here).
> Initi
On Thu, Feb 06, 2003 at 08:35:22PM -0700, [EMAIL PROTECTED] wrote:
> Is anyone on this e-mail continually getting spam e-mails about Norton
> System Works 2003? I would think that this would be a scam to try and
> get credit card numbers etc... If it was legitimate, I think I will
> switch to linux
On Fri, Feb 07, 2003 at 08:13:43PM +0530, Prathap R wrote:
> i just used nmap to detect the os on the network. out of
>curiosity,i want to know if there is a way of making the OS
>undetectable. it will be of great help if anyone could point out how
>do it?. i am using both windows and linu
On Fri, Jan 24, 2003 at 10:07:07AM -0800, Curt Seeliger wrote:
> On Thursday 23 January 2003 11:31 am, Brad Arlt wrote:
> >
> > Though shalt not let network services alter any critical files is the
> > best approach.
> >
> > What is normally done by myself and
On Tue, Jan 21, 2003 at 05:33:41AM +, Ing. Bernardo Lopez wrote:
> How secure could be my webserver if i allow some php scripts to modify
> the file (directly) /etc/passwd & /etc/shadow but my script will only
> allow to modify the line of the loged user (like userid=visitor, then he
> only can
On Mon, Dec 23, 2002 at 03:01:19PM -0500, Lee Brink wrote:
> The other method they discussed is to remove the fiber cable's outer
> insulation and bend it. You could monitor the light signal at the bend
> via refraction. The two issues they brought up with this method is that
> AFATK it's only a
On Fri, Dec 06, 2002 at 09:08:33AM +0100, [EMAIL PROTECTED] wrote:
> Hi
>
> i have a strange communication between two of my Linux server, it's ICMP
> packet on port 3.
> Do you know what it could be ?
ICMP doesn't have ports.
ICMP type 3 are IP error messages. Type 3 code 4 is used as part of
On Wed, Dec 04, 2002 at 11:05:22PM +0500, Muhammad Naseer Bhatti wrote:
> What my credit card company has done, when you call their
> help/support desk for any assistance, they first authenticate
> you. They do it by letting you enter your secret pincode into the
> system. The computer authenticate
On Tue, Dec 03, 2002 at 07:50:10PM +0100, Robert Sieber wrote:
> Hello colleauges,
>
> imaging the following situation:
>
> User calls the helpdesk to reset/alter some kind
> of account-password (NT, RAS, PKI-PIN ...) and you
> has to determin wheter the user is the correct
> (owner of the acco
On Thu, Nov 28, 2002 at 06:02:42AM +0900, ALBEE,RUSSELL. S FC2 (CV63 CS5) wrote:
> Which *NIX firewall software is the best to use in terms of sercurity and
> reliability? IPF? IPChains? IPTables?
I consider Chains, Table, and Filter en par for stability.
Chains might be a little more stable,
On Tue, Nov 26, 2002 at 12:53:11PM +0530, Sumit Dhar wrote:
> Hello Everyone,
>
> Here is something I would like to do: (Could someone tell me if it is
> possible on Linux)
>
> -Every user's home directory is encrypted. No one other than the user
> (including root) can read the files/directories
On Tue, Nov 26, 2002 at 03:39:12PM +0200, Geoffrey O'Connell wrote:
> Good day.
>
> Are there any free programs out there that I can use for custom packet
> generation (packet spoofing)
> Basically looking for something like HPing2 or WinInject that runs on
> Windows 9x. I know I could have
> foun
As a caveat, I have not actually used Smart Cards (we can't afford
them). I have read a little on them, and seen them in use in a Sun
demo lab though (which was really neat).
On Thu, Nov 07, 2002 at 09:04:08AM +0100, Jens Johansson wrote:
> Hi.
>
> I have a Sun Blade 100 workstation, running Sol
On Mon, Oct 28, 2002 at 09:34:17AM -0800, Naman Latif wrote:
> Hi,
> Are there any security issues involved if we run DNS Server (BIND 9.2.1)
> and Mail Server (Sendmail 11.8) on the same physical machine (in DMZ) ?
There may be, but I think it solves more problems than it makes.
I have been runn
On Fri, Oct 25, 2002 at 11:31:11PM -, christian mathieu wrote:
> Hello,
>
> I would like to know if there is a way to create an account on a win2K
> machine, that has admin rights to be able to look anywhere in the machine,
> but could not modify anything. The goals is to allow some admins
On Tue, Oct 22, 2002 at 09:42:29AM -0500, Ansel, Kenny L. (Sytex Contractor) wrote:
> Does anyone know of a NATIVE way that will force users to create a password
> containing uppercase, lowercase, alpha, and numeric characters?
>
> The /etc/default/passwd does the MIN & MAX and length
>
>
On Fri, Oct 18, 2002 at 12:07:35PM -0700, Evil Monkey wrote:
> I've been playing around with PGP and have found something kooky. I'm
> curious if y'all have seen the same thing and might be able to offer some
> explaination:
[snip]
> passphrase doesn't exist and won't let me do a thing. On the ne
On Thu, Oct 17, 2002 at 03:28:35AM +, SB CH wrote:
> 12:24:08.901473 eth0 < client.com.2157 > www.server.com.ssh: P
> 2801:2841(40) ack 13496 win 16736 (DF)
> 12:24:08.901481 eth0 < client.com.2157 > www.server.com.ssh: P
> 2801:2841(40) ack 13496 win 16736 (DF)
> 12:24:08.901483 eth0 < clien
On Tue, Oct 15, 2002 at 04:01:42PM -0400, Link, Jennifer wrote:
> We are looking at provided mail access via internet connection (home,
> internet cafe, library etc.) and I'm trying to research what vulnerabilities
> exist for such access. Any websites, books or personal experience you could
> pro
On Sat, Oct 12, 2002 at 02:05:33AM +, SB CH wrote:
> Hello, all.
>
> As you know, basic tcp/ip based service is throught plain text.
> So I use ssh instead telnet, and sslwrap with pop3 etc.
> But I have no idea about ftp encryption method.
> using sslwrap, I can't use ftp service because
On Tue, Oct 08, 2002 at 02:32:09PM +, [EMAIL PROTECTED] wrote:
> Newbie to the World of TCPDUMP.
>
> I am running Snort IDS.
> I have recently been interested in also logging ALL traffic that comes in/out
> my network via TCPDUMP (ip headers atleast).
> This is really for the purpose of Fore
On Mon, Oct 07, 2002 at 04:02:35PM +0100, Trevor Cushen wrote:
> Hello all,
>
> Quick opinion based question. I have an switched internal network that
> currently uses a lot of rcp with rsh authentication to moves files
> about. Platforms are unix and nt (ftp on the nt side)
>
> More secure is
On Tue, Sep 24, 2002 at 11:54:17AM +0200, voguemaster wrote:
> The only hint I have about the diff between SSH and SSL is the message
> I replied to. When I was talking about elaborating on tunneling I was
> basically asking what can I do with tunneling. Neither the SSL or the SSH
> websites give
On Mon, Sep 23, 2002 at 04:07:29PM -0600, [EMAIL PROTECTED] wrote:
> Hi everyone!!!, I'm an EDP auditor and I want to know some
> commentaries about the use of Snort IDS...I'de like to know if
> anyone recommend it and if it's a good choice to install in a
> financial organization.
We use snort.
On Thu, Sep 19, 2002 at 10:02:49PM +, netsec novice wrote:
> Can someone help me understand the difference between SSH and Telnet over
> SSL?
I will only talk about SSH v2 (and Telnet/SSL).
On the most basic level there is little difference. SSH is a remote
tty encryption standard. Telnet
34 matches
Mail list logo