My suggestion is as follows:
Manually test by configuring an email client (any client) in such a way as
to violate the rules you have written. Then try to send email to an account
you control on another server (I use my hotmail account for this). If it
relays, then you know you made a mistake so
If you are running Windows 2000, you can also use Kerberos, and you can
authenticate UNIX systems against ActiveDirectory.
Best Wishes,
Chris Travers
- Original Message -
From: "John O'Connor" <[EMAIL PROTECTED]>
To: "Trevor Cushen" <[EMAIL PROTEC
d I am not aware of any servers for Windows that do.
Best Wishes,
Chris Travers
David M. Fetter wrote:
Neither telnet or pcanywhere are vpn solutions at all. They are
remote access tools. However, if you are allowing telnet in from over
the internet you are already in bad shape. Telnet sends all it's
traffic including passwords in clear text. PCanywhere used to only
s
ISA's not a bad product.
That being said, it is not the end-all-and-be-all of security solutions
either. If security is important, you can run a filtering router
behind your ISA server (on a non-MS OS for added defence in depth) and
this is what I would do. You could use a Cisco solution, a
Not that I know of. However you could use an HTTP proxy and reverse
proxy the connections in.
Best Wishes,
Chris Travers
Marc Suttle wrote:
Hello list,
Real quick question. I was wondering if there are any open source
utilities that will install to apache that will allow outlook web access
und it a little
disorienting. However, now that I am used to it, I am finding it very
powerful. I recommend running it on any bastion Linux host.
Best Wishes,
Chris Travers
theog wrote:
Actually , I am quite amazed , no one mentioned iptables on linux
(http://netfilter.samba.org) , thats what I use and r
First of all, I agree that RPC is wonderfully extensible and that has been a
strong benefit of the NFS architecture, when combined with NIS, etc.
My own preference however, is to begin substituting AFS for NFS where
possible. It is more scalable, more secure, and easier to access from a
user pers
e percentage of security incidents are preventable by
good administration practices. So, the admin is more important than the
platform.
Just my 2 cents worth.
Best Wishes,
Chris Travers
BYRD,GREGORY (HP-Boise,ex1) wrote:
Everyone,
I'm looking for information comparing Windows Bastio
://sg-packetfilter.sourceforge.net)
And of course I have to suggest you look into my project too ;-)
FWReport (no web page yet, but see project page and download from
http://sourceforge.net/projects/fwreport)
Best Wishes,
Chris Travers
[EMAIL PROTECTED]
Justyn wrote:
I'm a home user rather n
offer
extremely powerful reporting capabilities without requiring access to
databases, etc. Check it out at http://sourceforge.net/projects/fwreport/
Also if there are any feature requests for fwreport, please feel free to
submit them ;^)
Best Wishes,
Chris Travers
quot;you have a
security problem." I usually say "Is this risk acceptible? How does ___
benefit your business? Whould ___ work for you as well?"
Anyway, this is my $.02 worth.
Best Wishes,
Chris Travers
Here is the solution I have been looking at for DMZ/VPN connections:
The real issue is that the VPN depending on how it is being used could
have different security implications. Here are the general guidelines I
work with--
Separate logically your security perimeters:
A: If I am allowing
Hi Aman,
You have many many options.
My personal preference is to set up an IPSec tunnel between your
external router at work and your home computer. Remember IPSec cannot
pass through a NAT, so if you have a NAT at home you would have to
tunnel nat-nat.
But SSH can also be used to do port f
You have two options-- you might want to investigate both because they
are fundamentally different in how they authenticate and encrypt.
1) Use SSH.
2) use Kerberos and Kerberized Telnet. If you truly have a VPN, maybe
you can log into the KDC and then use that to establish an encrypted
tel
Burton M. Strauss III wrote:
You can't ... well, the grub password may prevent the trivial case, but if
you have physical access to the hardware, you have the keys to the universe.
(What would stop Mr/Ms Cracker from bring his/her OWN grub floppy?)
-Burton
-Original Message-
From: c
16 matches
Mail list logo