Re: Common Attacks

2002-07-11 Thread D . Stout
Amit, The best place I found when I started looking up common attacks was the Hacking Exposed series. This gave me a great insight into not just the attacks themselves, but the methods that people use. These series of books come highly recommended by myself and my collegues, and should be a

Re: Server Monitoring

2002-05-03 Thread D . Stout
After extensive testing of such products I was most impressed by IPSentry. It is fully configurable and allows you to monitor services as well. www.ipsentry.com Dave Stout #** This message is intended solely for the use of

Re: cisco 2513 router

2001-12-19 Thread D . Stout
Read the Password Recovery section on the Cisco website. http://www.cisco.com/warp/public/474/ If you have trouble with the Break Function then read below.. Quote from http://www.cisco.com/warp/public/701/61.html "This is useful if your terminal emulator doesn't support the break key,

Basic Security Policy ------ THANKS!! NO MORE HELP NEEDED

2001-11-19 Thread D . Stout
Many thanks to all who gave me some good information on where to start. I have now accomplished my main aim ,which was to save myself time, without having to just rip-off someone else' policy. I should now have this finished and authorized within the week. Cheers... David Stout Intern

Re: Cisco PIX 515 Firewall

2001-11-18 Thread D . Stout
Miles, I have had the pleasure / misfortune to have used the Pix 515 Firewalls and there are several pro's and con's. There was some discussion on the Security Focus mailing lists a few months ago about Cisco Pix firewalls which I followed with a keen eye. After much debaiting the general c

Basic Security Policy

2001-11-15 Thread D . Stout
Dear All, I have just been put in charge of network security within our company and the first thing I need to do is define a Network Security Policy that we can apply to our Internet Services and customer intranets. I would like to have some input on things to add into the policy and possibly so