Amit,
The best place I found when I started looking up common attacks was the
Hacking Exposed series. This gave me a great insight into not just the
attacks themselves, but the methods that people use. These series of books
come highly recommended by myself and my collegues, and should be
a
After extensive testing of such products I was most impressed by IPSentry.
It is fully configurable and allows you to monitor services as well.
www.ipsentry.com
Dave Stout
#**
This message is intended solely for the use of
Read the Password Recovery section on the Cisco website.
http://www.cisco.com/warp/public/474/
If you have trouble with the Break Function then read below..
Quote from http://www.cisco.com/warp/public/701/61.html
"This is useful if your terminal emulator doesn't support the break key,
Many thanks to all who gave me some good information on where to start.
I have now accomplished my main aim ,which was to save myself time,
without having to just rip-off someone else' policy.
I should now have this finished and authorized within the week.
Cheers...
David Stout
Intern
Miles,
I have had the pleasure / misfortune to have used the Pix 515 Firewalls
and there are several pro's and con's. There was some discussion on the
Security Focus mailing lists a few months ago about Cisco Pix firewalls
which I followed with a keen eye. After much debaiting the general
c
Dear All,
I have just been put in charge of network security within our company and
the first thing I need to do is define a Network Security Policy that we
can apply to our Internet Services and customer intranets.
I would like to have some input on things to add into the policy and
possibly so