Re: Cisco Pix Vs. Symantec Velociraptor

2003-03-24 Thread Cheryl Goh
A hardware firewall will typically run off an ASIC chip and will not have a hard disk. Examples of a hardware firewall would be Netscreen. Watchguard however is a hybrid firewall. It uses a combination of an ASIC chip and software. An appliance firewall is defined as a firewall that comes with an

Re: NAT and Web Server Security

2002-11-25 Thread Cheryl Goh
When NAT is configured at the firewall to allow the public to access a web server, it is a Static NAT which basically tells the firewall to forward all traffic destined to the global address of a web server to the internal address that is unknown to the public. All traffic is passed through and

Re: security question

2002-07-12 Thread Cheryl Goh
I totally agree with Jeremy. If file and print sharing is turned off and there are no other services such as an FTP or IIS Server running on the box (this would be 3rd party app in the case of win98) then the chances of hacking the box is extremely low. It is only when the user chats on IRC or

Re: security question

2002-07-12 Thread Cheryl Goh
and the time the firewall is fully loaded Correct me if I'm wrong but I've noticed that on windows 98 machines, even when the OS has not fully loaded, I am still able to derive NetBios information from the pc. - Original Message - From: Sarbjit Singh Gill [EMAIL PROTECTED] To: Cheryl Goh [EMAIL

Re: Windows 2000 Registry Monitoring

2002-07-11 Thread Cheryl Goh
Hi Chris, Regmon is a free utility that shows you what processes are accessing the registry in real time and what these processes are doing e.g reading, writing from/to the registry. You can also save the listview contents to an ASCII file. Here's the link :

Re: 3DES versus SHA-1

2002-07-11 Thread Cheryl Goh
difficult. Hope this helps - Original Message - From: Britt A. Green [EMAIL PROTECTED] To: Cheryl Goh [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Sent: Friday, July 12, 2002 1:20 AM Subject: Re: 3DES versus SHA-1 Out of curiosity, what prevents someone from intercepting this message

Re: 3DES versus SHA-1

2002-07-10 Thread Cheryl Goh
the integrity of the message and 3DES maintains the confidentiality of the message. They are both used in tandem. Cheryl Goh Security Consultant, CISSP - Original Message - From: Mario Behring [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Tuesday, July 09, 2002 3:56 AM Subject: 3DES

Re: Modems detection/ patches implementation

2002-07-07 Thread Cheryl Goh
a wardialer (but as you mentioned it is probably not practical in your environment) It would be interesting to find out from the others what other methods are available for searching for roque modems. Cheryl Goh Security Consultant, CISSP - Original Message - From: Harish Gondavale [EMAIL

Re: SSH Help

2002-07-04 Thread Cheryl Goh
Hello, You could set up an SSH server on your Oracle server and SSH clients on all applications that need to access Oracle. A product that is capable of doing this is SSH Secure Shell. These products can be found at www.ssh.com They have SSH Servers for both Windows and Unix platforms. By

Re: port mapper

2002-07-01 Thread Cheryl Goh
Hi Naveen, Yes it is called Active Ports. Cheryl - Original Message - From: Naveen Maram [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Friday, June 28, 2002 2:21 AM Subject: port mapper Hi I know this has been discussed before. I tried searching the archives for this one. I am

Re: Network Security Related Query

2002-06-21 Thread Cheryl Goh
, how the windows boxes are configured, whether they are PDC's or user desktops. There isn't quite a simple yes or no but a very likely chance of system compromise. Cheryl Goh - Original Message - From: Sumit Dhar [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Wednesday, June 19, 2002 11:25 AM

Re: Server Monitoring

2002-05-06 Thread Cheryl Goh
Hi, Check out IPSentry. It will ping servers at certain intervals and report on whether servers are up or down. You can configure it to monitor web servers and FTP servers as well. It will tell you whether these services are up and running or down. Cheryl Goh Security Consultant e-Lock

Fw: proxys

2002-03-19 Thread Cheryl Goh
- Original Message - From: Cheryl Goh [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Tuesday, March 19, 2002 10:20 AM Subject: Re: proxys Try UfaSoft's SocksChain that allows you to chain proxys together and SocksCap to route IE through SocksChain. http://www.securax.org/ZC/anon