in EULAs.
The only exception would be Oracle who markets itself as allegedly
bullet proof, and is now paying the price (at least PR-wise) with the
Orbitz debacle.
We can't, in the USA, even properly hold SUV makers liable for their
bugs and those cost lives.
Best Regards,
Dan Bartley
-Original
quickly if something does happen. I can guarantee that if
something happens and my CTO finds out from someone else, the first
words out of his mouth to us will be, How come you didn't know about
this?
Best Regards,
Dan Bartley
-Original Message-
From: Chris Berry [mailto:[EMAIL PROTECTED
(not to
mention huge savings in money for all those useless tools like IDS and
firewalls).
Best Regards,
Dan Bartley
-Original Message-
From: Tim Greer [mailto:[EMAIL PROTECTED]
Sent: Thursday, July 03, 2003 20:28
To: Dan Bartley; [EMAIL PROTECTED]
Subject: Re: Ten least secure programs
what I do, makes life nice.
Best Regards,
Dan Bartley
-Original Message-
From: Tim Greer [mailto:[EMAIL PROTECTED]
Sent: Thursday, July 03, 2003 20:25
To: Dan Bartley; [EMAIL PROTECTED]
Subject: Re: Ten least secure programs
- Original Message -
From: Dan Bartley [EMAIL
a little more diverse than that.
Best Regards,
Dan Bartley
-Original Message-
From: Tim Greer [mailto:[EMAIL PROTECTED]
Sent: Friday, July 04, 2003 14:32
To: Dan Bartley; [EMAIL PROTECTED]
Subject: Re: Ten least secure programs
- Original Message -
From: Dan Bartley [EMAIL
DJBDNS (http://cr.yp.to/djbdns.html). IMHO, i believe it's a _complete_
replacement to the aging beast called BIND.
tiny, secure, and unbelievably easy to setup/configure.
regards,
dan
-BEGIN PGP SIGNATURE-
Note: This signature can be verified at https://www.hushtools.com/verify
Version
among the best, or near, I believe. Windows was in the
middle.
Best Regards,
Dan Bartley
-Original Message-
From: Tim Greer [mailto:[EMAIL PROTECTED]
Sent: Wednesday, July 02, 2003 13:31
To: Vic Parat (NSS); Chris Berry; [EMAIL PROTECTED];
[EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re
that is not really feasible in most current work environments,
so probably better consider what tools are really needed and you have
the resources to properly administer and configure, take IDS and
anti-virus steps, then ban the rest.
Best Regards,
Dan Bartley
-Original Message-
From: Steve Bremer
=keywords=hackoptional=subject=l
ocation=ref=keywordf=viewid=1050058891622215212block=
We'd love to hear what the security pros think about all of this.
Regards,
Dan
CardCops.com
-Original Message-
From: Lincoln Milner [mailto:[EMAIL PROTECTED]
Sent: Monday, June 30, 2003 8:06 AM
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Chris Berry [EMAIL PROTECTED] wrote:
Subject: Ten least secure programs
I'm putting together a list of what seem to be the ten least secure computer
items in use today with the idea of having a set of things to recommend
AGAINST people using,
hours total. You can script getting the new lists from the squidguard
site pretty easily too.
HTH
Dan
-Original Message-
From: DeGennaro, Gregory [mailto:[EMAIL PROTECTED]
Sent: Monday, June 23, 2003 12:07 PM
To: [EMAIL PROTECTED]
Subject:RE: URL and Content Filtering
laws or you may find the company
on the short end of the stick.
Best Regards,
Dan Bartley
-Original Message-
From: Potter, Tim [mailto:[EMAIL PROTECTED]
Sent: Thursday, June 12, 2003 13:50
To: [EMAIL PROTECTED]
Okay - things have changed quite bit. What is a good keystroke-logger
our shop, and I sleep just fine at night :)
Dan Gallivan
PS: With thanks to Troy Larson and James N.
-Original Message-
From: Sullivan, Glenn [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, February 11, 2003 8:02 AM
To: '[EMAIL PROTECTED]'
Subject: RE: Suggestions on free XP hard drive wiping
the same special.
Cheers
Dan
-Original Message-
From: Larry Seltzer [mailto:[EMAIL PROTECTED]]
Sent: Monday, February 10, 2003 10:55 AM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: RE: Spam from Symantec
Is anyone on this e-mail continually getting spam e-mails about Norton
and use them for from/to addresses.
HTH,
Dan
mc1-f5.law16.hotmail.com with Microsoft SMTPSVC(5.0.2195.5600); Mon, 6 Jan
2003 00:36:47 -0800
Received: from Idxgvfqiv ([198.142.240.35]) by out009.verizon.net (InterMail
vM.5.01.05.20 201-253-122-126-120-20021101) with SMTP id
20030106083621.IPQL7162
to easily filter 95% of the junk mail so it doesn't get to your
users.
The upside of all of this is that you can customize it to the exact way
you want it to operate. The challenge is that you will have to learn alot
along the way.
My $.02
Good luck in whatever you choose
Dan
be appreciated, thanks in advance!
Dan Ferris - CCNA
Engineering Technician/System Administrator
-
Percept Technology Labs, inc. - Product Test and Compliance Experts
4735 Walnut #E Boulder, CO 80301
303.444.7480 Ext 106
303.444.1565 Fax
http://www.percept.com
to it. All that comes out is tiny little
tidbits... (Now that sounds like it would be kind of cool)
Cheers,
Dan Darden.
===
-Original Message-
From: Tim - IBL [mailto:timv;iceburnslair.com]
Sent: Wednesday, October 30, 2002 9:50 AM
To: 'Nero, Nick'
Cc: [EMAIL PROTECTED
.
Sincerely,
Dan Darden.
===
Email [EMAIL PROTECTED] for your security
questions and information.
Hoax Info: http://hoaxbusters.ciac.org
===
Everyday I beat my own personal record for
number of consecutive days I've stayed
Try regmon (ntregmon.zip). Get it from www.sysinternals.com.
--
Dan Irwin - Systems Administrator
Jackie's Wholesale Nurseries Pty Ltd
Email: [EMAIL PROTECTED]
Phone: 07 3888 2481
Fax: 07 3888 2530
Postal: 10 Gleeson Road Burpengary Queensland 4505
Email: [EMAIL PROTECTED]
Web: http
I've had great luck using proftpd for this. The server will use virtual
accounts (and UIDs) from an SQL table, and can create the appropriate
directories and permissions upon login. This has the advantage of being
easily automated, and in a completely seperate name space from the actual
system.
, latest engines)
Dan V.
- Original Message -
From: Harish Gondavale [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Wednesday, June 26, 2002 9:38 PM
Subject: How to find open shares on the n/w
Hi,
I am very satisfied with this mailing group as i get
new great ideas and solutions, which I
=
the flamewar.. I know biometrics can be beaten but I still plan to use a =
2nd(or 3rd) layer of a (good) password. This is all just for one host. =
So I don't want to get in to any sort of network authentication methods. =
Thanks in advance,
Dan Van Derveer
, it will gateway to all
the local pcanywhere servers on the inside network.
Dan
-Original Message-
From: Alan Blackwell [mailto:[EMAIL PROTECTED]]
Sent: Friday, June 07, 2002 7:44 AM
To: [EMAIL PROTECTED]
Subject: PC Anyhwere and IP Forwarding
Hi,
Can anyone advise me
I know I've seen this question asked before but can't seem to find the
information.
How difficult is it to Sniff Internet traffic?
If I am sitting in my home in Bug Tussell Pennsylvania, can I monitor
someones Internet connection coming from Silicon Alley California without
their
they
create trust on the internet.
Dan Van Derveer
- Original Message -
From: Stevie A. Jones [EMAIL PROTECTED]
To: 'Kristi Gilleland' [EMAIL PROTECTED]; 'Jay D. Dyson'
[EMAIL PROTECTED]
Cc: 'Security-Basics (E-mail)' [EMAIL PROTECTED]
Sent: Thursday, June 06, 2002 8:44 AM
Subject: RE
Well, I hate to say this, but its true...
Our company was going to buy one, and before doing so
our first and foremost requirement was to know for
sure that the device would support INCOMING SSL connections
and the company was unable to verify whether or not it did.
It kind of made us queasy
I have apache 1.3.19. How do I remove the os banner, so when people try to
telnet into port 80 they don't find out what type of os I am running.
Daniel Pinsky, CNA, CCNA
Security/Network Administrator
mailto:[EMAIL PROTECTED]
buggy and insecure.
Dan
- Original Message -
From: Matt [EMAIL PROTECTED]
To: Security-Basics [EMAIL PROTECTED]
Sent: Monday, May 27, 2002 2:52 AM
Subject: Need Help Securing XP
Hi all
Here's my story:
I wanted to see how XP looked and decided to give it a test run
I managed to get
Perhaps you ought to read Mcafee's complete description of that trojan
http://vil.mcafee.com/dispVirus.asp?virus_k=99467 . According to that page
thier scanner has flaged on travelocity as well. You may be overreacting. In
fact the description goes as far as them saying the virus may not even
I currently am faced with a troublesome infrastructure
dilemma.
We have some real-time data that resides on an SQL server
in our intranet. This data is queried and updated by users
via a web server that is in our DMZ. Queries are sent from
the web server in the DMZ to the SQL server
Why not ask the BSA? Im sure they would LOVE to help you out ;-)
Dan
- Original Message -
From: PEPE TECATE [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Friday, May 17, 2002 10:25 PM
Subject: AUDITING LICENSES
Hello all, do you know some auditing sw tool, free if possible? I am
the
packages as fast as Redhat/Debian/everyone else which avoids releasing
packages with vulnerabilities. I still recommend Debian because its makes
maintenence easy(most of the time).
Dan V
- Original Message -
From: Security [EMAIL PROTECTED]
To: Thomas Madhavan [EMAIL PROTECTED]
Cc
Another plus for Apache is that there are Win32 versions of it. You do not
need any version of *NIX to run it so you can keep your windows gui AND have
Apache.
Dan V.
- Original Message -
From: [EMAIL PROTECTED]
To: Robert Buel [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Thursday, May
.
Today I obtained a copy of Internet Scanner from Internet
Security Systems (ISS) and will be testing it out as well.
Will also look at the Pentasafe products.
Are there any others that I might try? I am searching for
the best bang for the buck that I can get.
Dan
-Original
I would like to be able to scan *NIX machines for
vulnerabilities from a WIN 2K Pro machine VIA the internet
or a network. Are there any tools capable of doing this?
Dan
script kiddie type. (Note i said vast, not ALL).
You may also want to look for some smaller or underground IRC servers or
networks. These too can be inhabited by the kinds of people you wish to
monitor.
Hope This Helps.
Dan.
--
Dan Irwin - Systems Administrator
Jackie's Wholesale Nurseries
I have been reading this list (along with other security, incident, and
bugtraq lists) in the shadows for quite awhile now. It's such a great
resource and there is just so much to take in.
It's good to see things from the 'good-guy' or 'whitehat' point of view,
but does anyone know where one
need a tool that will wipe EVERYTHING !
TIA
Dan
Hey all -
This might be a bit off subject, but here goes
To all the heavy readers out there I have stumbled upon one of the
greatest books about cryptography and cryptographic analysis that I have
ever read Granted, I haven't read a lot on the subject, but it's still
a great read The book is
appear offline, but at least your T1 is useable again. A small price to pay,
i think.
You could install another T1 line, but if you use BGP4 routing, it is
possible the attack could saturate both lines, which would be totally
pointless.
Hope this helps.
Dan.
--
Dan Irwin - Systems Administrator
It could be beneficial to name them incorrectly, but could also be a
logistical nightmare. Naming an Exchange server FTP1, for example, could
really through a hacker for a loop after he enumerates the resources.
I would say it's not recommended unless the organization is extremely small.
, but http://grcsucks.com/grcdos.htm is
the ultimate companion to http://grc.com/dos/grcdos.htm. It sure puts an
interesting slant on everything Steve Gibson wrote.
My 2 cents.
Dan
--
Dan Irwin - Systems Administrator
Jackie's Wholesale Nurseries Pty Ltd
Email: [EMAIL PROTECTED]
Phone: 07 3888 2481
What happens if you lose the private key, and from there copy the files to a
FAT or NTFS4 partition?
Do they remain encrypted?
-Original Message-
From: Kevin Crichton [mailto:[EMAIL PROTECTED]]
Sent: Monday, January 14, 2002 12:06 PM
To: Rob Weiss
Cc: 'leon'; [EMAIL PROTECTED]
Subject:
How would you go about detecting what NIC's are in promiscuous mode? Is
there some sort of mass ping to find such a thing out?
-Original Message-
From: Craig Van Tassle [mailto:[EMAIL PROTECTED]]
Sent: Friday, January 11, 2002 3:09 AM
To: secuirty-basics
Subject: Re: How can I detect
/howipmcworks.html
Dan M.
This is from the Sybase firewall log, (thanks to whomever
recomended trying it , sorry I am a newbie this is proably normal
but i am curious why this is being done by Windows.
Thanks in advance,
Dan
File Version :4.10.
File Description
ranges for timeouts.
Dan
I was wondering what everyone else is using as timeouts for the
following configurations:
Internal systems?
Web based applications?
Is the timeout configuration different between your external customers
and internal users?
Could I get any feedback on this issue?
It's nice.
Also check out http://www.smoothwall.org
-Original Message-
From: Benjamin [mailto:[EMAIL PROTECTED]]
Sent: Monday, December 31, 2001 4:10 AM
To: [EMAIL PROTECTED]
Subject: Suggested Firewall (CHEAP TO!)
Hi all,
Just thought I would suggest a firewall that I just got
Even better is Bulletproof FTP, formerly known as G6.
http://www.bpftpserver.com
-Original Message-
From: Adolfson, Lee [mailto:[EMAIL PROTECTED]]
Sent: Thursday, December 27, 2001 12:28 PM
To: '[EMAIL PROTECTED]'
Subject: RE: which ftp-server?
Try warftp at
http://www.warftp.org/
ports then get your favorite windows
based sniffer and go to town.
Dan.
These are ports that are open in one of my w2k [ntfs] professionals
machines. this pc runs 2 firewalls and an ids with a real time
virus guard. I want to make some sense out of this and want to
know how to close
Harro -
A couple books that I have in my library...
The Design of the Unix Operating System, by Maurice J. Bach. I believe
by running through a book of this detail, one can piece together how a
UNIX box is secured, by understanding how it is constructed. I know
that helped me a lot.
use it for other stuff.
Hogwash is an interesting yet young tool that is aimed at doing different
things. Just stick to snort is pretty easy to learn the basics and is very
flexible.
dan.
I'm a pretty new user to Linux, and I want to set up some sort of protection
for my box. I have snort
Open Protocol 50 and UDP port 500. That should be all you need.
Dan Reynolds
Sr. Technical Specialist
Network Services Group
[EMAIL PROTECTED]
V:631.951.5447 F:631.951.5225
George Weston Bakeries, Inc.
55 Paradise Lane
Bay Shore, NY 11706
-Original Message-
From: Al Miller [mailto
, is to call Compaq
and ask them for the backdoor password if one even exists for that machine.
-Dan
-Original Message-
From: sari sari [mailto:[EMAIL PROTECTED]]
Sent: Thursday, November 01, 2001 7:13 PM
To: [EMAIL PROTECTED]
Subject: power password prank
hey all,
I have a little
Unless of course, there is no floppy drive in said system.
-Original Message-
From: Gordon McKinnon [mailto:[EMAIL PROTECTED]]
Sent: Monday, October 29, 2001 4:30 PM
To: [EMAIL PROTECTED]
Subject: Re: W2k Blues
Basic comment: anyone who has physical access to the system will be able to
net time can still accomplish that goal easily. Simply use the at command
and schedule it, which fits outside the realm of a login script and manual
use as well.
-Original Message-
From: Mervin, Chris [mailto:[EMAIL PROTECTED]]
Sent: Monday, October 22, 2001 6:06 PM
To: '[EMAIL
Hi all,
I have been tasked with finding and implementing solutions to provide
payroll vendors/401k vendors and health care providers with methods our
company can use to transmit encrypted files via Website (IIS), FTP, and
E-mail (Exchange). We are a total MS shop. I thought of looking to Verisign
Hi,
I was wondering how most of yall distribute your ssh fingerprints?
I'm thinking through as many vectors as possible but not finding
much supporting documentation on that. Signed email, web page under
tripwire, motd (after the fact), or even snail mail? Others?
Dan
58 matches
Mail list logo