A hardware firewall will typically run off an ASIC chip and will not have a
hard disk. Examples of a hardware firewall would be Netscreen. Watchguard
however is a hybrid firewall. It uses a combination of an ASIC chip and
software.
An appliance firewall is defined as a firewall that comes with an
When NAT is configured at the firewall to allow the public to access a web
server, it is a Static NAT which basically tells the firewall to forward all
traffic destined to the global address of a web server to the internal
address that is unknown to the public. All traffic is passed through and
I totally agree with Jeremy. If file and print sharing is turned off and
there are no other services such as an FTP or IIS Server running on the box
(this would be 3rd party app in the case of win98) then the chances of
hacking the box is extremely low.
It is only when the user chats on IRC or
and the
time the firewall is fully loaded
Correct me if I'm wrong but I've noticed that on windows 98 machines, even
when the OS has not fully loaded, I am still able to derive NetBios
information from the pc.
- Original Message -
From: Sarbjit Singh Gill [EMAIL PROTECTED]
To: Cheryl Goh [EMAIL
Hi Chris,
Regmon is a free utility that shows you what processes are accessing the
registry in real time and what these processes are doing e.g reading,
writing from/to the registry.
You can also save the listview contents to an ASCII file.
Here's the link :
difficult.
Hope this helps
- Original Message -
From: Britt A. Green [EMAIL PROTECTED]
To: Cheryl Goh [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Friday, July 12, 2002 1:20 AM
Subject: Re: 3DES versus SHA-1
Out of curiosity, what prevents someone from intercepting this message
the integrity of the message and 3DES maintains
the confidentiality of the message. They are both used in tandem.
Cheryl Goh
Security Consultant, CISSP
- Original Message -
From: Mario Behring [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Tuesday, July 09, 2002 3:56 AM
Subject: 3DES
a wardialer (but as you mentioned it is probably not practical
in your environment)
It would be interesting to find out from the others what other methods are
available for searching for roque modems.
Cheryl Goh
Security Consultant, CISSP
- Original Message -
From: Harish Gondavale [EMAIL
Hello,
You could set up an SSH server on your Oracle server and SSH clients on all
applications that need to access Oracle. A product that is capable of doing
this is SSH Secure Shell. These products can be found at www.ssh.com
They have SSH Servers for both Windows and Unix platforms. By
Hi Naveen,
Yes it is called Active Ports.
Cheryl
- Original Message -
From: Naveen Maram [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Friday, June 28, 2002 2:21 AM
Subject: port mapper
Hi
I know this has been discussed before. I tried
searching the archives for this one. I am
, how the windows boxes are
configured, whether they are PDC's or user desktops. There isn't quite a
simple yes or no but a very likely chance of system compromise.
Cheryl Goh
- Original Message -
From: Sumit Dhar [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Wednesday, June 19, 2002 11:25 AM
Hi,
Check out IPSentry. It will ping servers at certain intervals and report on
whether servers are up or down. You can configure it to monitor web servers
and FTP servers as well. It will tell you whether these services are up and
running or down.
Cheryl Goh
Security Consultant
e-Lock
- Original Message -
From: Cheryl Goh [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Tuesday, March 19, 2002 10:20 AM
Subject: Re: proxys
Try UfaSoft's SocksChain that allows you to chain proxys together and
SocksCap to route IE through SocksChain.
http://www.securax.org/ZC/anon
13 matches
Mail list logo