RE: Microsot Liability for vulnerabilities

2003-07-21 Thread Dan Bartley
in EULAs. The only exception would be Oracle who markets itself as allegedly bullet proof, and is now paying the price (at least PR-wise) with the Orbitz debacle. We can't, in the USA, even properly hold SUV makers liable for their bugs and those cost lives. Best Regards, Dan Bartley -Original

RE: Ten worst programs

2003-07-08 Thread Dan Bartley
quickly if something does happen. I can guarantee that if something happens and my CTO finds out from someone else, the first words out of his mouth to us will be, How come you didn't know about this? Best Regards, Dan Bartley -Original Message- From: Chris Berry [mailto:[EMAIL PROTECTED

RE: Ten least secure programs

2003-07-04 Thread Dan Bartley
(not to mention huge savings in money for all those useless tools like IDS and firewalls). Best Regards, Dan Bartley -Original Message- From: Tim Greer [mailto:[EMAIL PROTECTED] Sent: Thursday, July 03, 2003 20:28 To: Dan Bartley; [EMAIL PROTECTED] Subject: Re: Ten least secure programs

RE: Ten least secure programs

2003-07-04 Thread Dan Bartley
what I do, makes life nice. Best Regards, Dan Bartley -Original Message- From: Tim Greer [mailto:[EMAIL PROTECTED] Sent: Thursday, July 03, 2003 20:25 To: Dan Bartley; [EMAIL PROTECTED] Subject: Re: Ten least secure programs - Original Message - From: Dan Bartley [EMAIL

RE: Ten least secure programs

2003-07-04 Thread Dan Bartley
a little more diverse than that. Best Regards, Dan Bartley -Original Message- From: Tim Greer [mailto:[EMAIL PROTECTED] Sent: Friday, July 04, 2003 14:32 To: Dan Bartley; [EMAIL PROTECTED] Subject: Re: Ten least secure programs - Original Message - From: Dan Bartley [EMAIL

Re: Ten least secure programs

2003-07-03 Thread Dan Duplito
DJBDNS (http://cr.yp.to/djbdns.html). IMHO, i believe it's a _complete_ replacement to the aging beast called BIND. tiny, secure, and unbelievably easy to setup/configure. regards, dan -BEGIN PGP SIGNATURE- Note: This signature can be verified at https://www.hushtools.com/verify Version

RE: Ten least secure programs

2003-07-03 Thread Dan Bartley
among the best, or near, I believe. Windows was in the middle. Best Regards, Dan Bartley -Original Message- From: Tim Greer [mailto:[EMAIL PROTECTED] Sent: Wednesday, July 02, 2003 13:31 To: Vic Parat (NSS); Chris Berry; [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: Re

RE: Ten least secure programs

2003-07-03 Thread Dan Bartley
that is not really feasible in most current work environments, so probably better consider what tools are really needed and you have the resources to properly administer and configure, take IDS and anti-virus steps, then ban the rest. Best Regards, Dan Bartley -Original Message- From: Steve Bremer

RE: Must read for everyone

2003-07-02 Thread Dan Clements
=keywords=hackoptional=subject=l ocation=ref=keywordf=viewid=1050058891622215212block= We'd love to hear what the security pros think about all of this. Regards, Dan CardCops.com -Original Message- From: Lincoln Milner [mailto:[EMAIL PROTECTED] Sent: Monday, June 30, 2003 8:06 AM

Re: Ten least secure programs

2003-07-02 Thread Dan Duplito
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Chris Berry [EMAIL PROTECTED] wrote: Subject: Ten least secure programs I'm putting together a list of what seem to be the ten least secure computer items in use today with the idea of having a set of things to recommend AGAINST people using,

RE: URL and Content Filtering Proxy

2003-06-24 Thread Dan Codespoti
hours total. You can script getting the new lists from the squidguard site pretty easily too. HTH Dan -Original Message- From: DeGennaro, Gregory [mailto:[EMAIL PROTECTED] Sent: Monday, June 23, 2003 12:07 PM To: [EMAIL PROTECTED] Subject:RE: URL and Content Filtering

RE: How to obtain a yahoo username off a computer

2003-06-12 Thread Dan Bartley
laws or you may find the company on the short end of the stick. Best Regards, Dan Bartley -Original Message- From: Potter, Tim [mailto:[EMAIL PROTECTED] Sent: Thursday, June 12, 2003 13:50 To: [EMAIL PROTECTED] Okay - things have changed quite bit. What is a good keystroke-logger

RE: Suggestions on free XP hard drive wiping utilities?

2003-02-12 Thread Dan Gallivan
our shop, and I sleep just fine at night :) Dan Gallivan PS: With thanks to Troy Larson and James N. -Original Message- From: Sullivan, Glenn [mailto:[EMAIL PROTECTED]] Sent: Tuesday, February 11, 2003 8:02 AM To: '[EMAIL PROTECTED]' Subject: RE: Suggestions on free XP hard drive wiping

RE: Spam from Symantec

2003-02-11 Thread Dan Harrington
the same special. Cheers Dan -Original Message- From: Larry Seltzer [mailto:[EMAIL PROTECTED]] Sent: Monday, February 10, 2003 10:55 AM To: [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: RE: Spam from Symantec Is anyone on this e-mail continually getting spam e-mails about Norton

Re: Can anybody explain this Klez Variant?

2003-02-10 Thread Dan Donkers
and use them for from/to addresses. HTH, Dan mc1-f5.law16.hotmail.com with Microsoft SMTPSVC(5.0.2195.5600); Mon, 6 Jan 2003 00:36:47 -0800 Received: from Idxgvfqiv ([198.142.240.35]) by out009.verizon.net (InterMail vM.5.01.05.20 201-253-122-126-120-20021101) with SMTP id 20030106083621.IPQL7162

Re: suggestions for blocking dangerous mail attachments?

2003-01-23 Thread Dan Donkers
to easily filter 95% of the junk mail so it doesn't get to your users. The upside of all of this is that you can customize it to the exact way you want it to operate. The challenge is that you will have to learn alot along the way. My $.02 Good luck in whatever you choose Dan

Firewall logs help

2002-12-05 Thread Dan Ferris
be appreciated, thanks in advance! Dan Ferris - CCNA Engineering Technician/System Administrator - Percept Technology Labs, inc. - Product Test and Compliance Experts 4735 Walnut #E Boulder, CO 80301 303.444.7480 Ext 106 303.444.1565 Fax http://www.percept.com

RE: Interesting One reading a 30x over-written drive

2002-10-31 Thread Dan Darden
to it. All that comes out is tiny little tidbits... (Now that sounds like it would be kind of cool) Cheers, Dan Darden. === -Original Message- From: Tim - IBL [mailto:timv;iceburnslair.com] Sent: Wednesday, October 30, 2002 9:50 AM To: 'Nero, Nick' Cc: [EMAIL PROTECTED

RE: Interesting One

2002-10-30 Thread Dan Darden
. Sincerely, Dan Darden. === Email [EMAIL PROTECTED] for your security questions and information. Hoax Info: http://hoaxbusters.ciac.org === Everyday I beat my own personal record for number of consecutive days I've stayed

RE: Windows 2000 Registry Monitoring

2002-07-11 Thread Dan Irwin
Try regmon (ntregmon.zip). Get it from www.sysinternals.com. -- Dan Irwin - Systems Administrator Jackie's Wholesale Nurseries Pty Ltd Email: [EMAIL PROTECTED] Phone: 07 3888 2481 Fax: 07 3888 2530 Postal: 10 Gleeson Road Burpengary Queensland 4505 Email: [EMAIL PROTECTED] Web: http

Re: Automatic FTP account creation

2002-07-03 Thread Dan Pinkard
I've had great luck using proftpd for this. The server will use virtual accounts (and UIDs) from an SQL table, and can create the appropriate directories and permissions upon login. This has the advantage of being easily automated, and in a completely seperate name space from the actual system.

Re: How to find open shares on the n/w

2002-06-29 Thread Dan Van Derveer
, latest engines) Dan V. - Original Message - From: Harish Gondavale [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Wednesday, June 26, 2002 9:38 PM Subject: How to find open shares on the n/w Hi, I am very satisfied with this mailing group as i get new great ideas and solutions, which I

Additional authentication devices

2002-06-20 Thread Dan Van Derveer
= the flamewar.. I know biometrics can be beaten but I still plan to use a = 2nd(or 3rd) layer of a (good) password. This is all just for one host. = So I don't want to get in to any sort of network authentication methods. = Thanks in advance, Dan Van Derveer

RE: PC Anyhwere and IP Forwarding

2002-06-11 Thread Dan Harrington
, it will gateway to all the local pcanywhere servers on the inside network. Dan -Original Message- From: Alan Blackwell [mailto:[EMAIL PROTECTED]] Sent: Friday, June 07, 2002 7:44 AM To: [EMAIL PROTECTED] Subject: PC Anyhwere and IP Forwarding Hi, Can anyone advise me

Sniffing Internet Traffic

2002-06-11 Thread Dan Williamson
I know I've seen this question asked before but can't seem to find the information. How difficult is it to Sniff Internet traffic? If I am sitting in my home in Bug Tussell Pennsylvania, can I monitor someone’s Internet connection coming from Silicon Alley California without their

Re: (Verisign) Misleading mailing is not a good way to get customers.

2002-06-07 Thread Dan Van Derveer
they create trust on the internet. Dan Van Derveer - Original Message - From: Stevie A. Jones [EMAIL PROTECTED] To: 'Kristi Gilleland' [EMAIL PROTECTED]; 'Jay D. Dyson' [EMAIL PROTECTED] Cc: 'Security-Basics (E-mail)' [EMAIL PROTECTED] Sent: Thursday, June 06, 2002 8:44 AM Subject: RE

RE: FatPipe?

2002-06-07 Thread Dan Harrington
Well, I hate to say this, but its true... Our company was going to buy one, and before doing so our first and foremost requirement was to know for sure that the device would support INCOMING SSL connections and the company was unable to verify whether or not it did. It kind of made us queasy

remove apache os banner

2002-06-03 Thread Pinsky, Dan
I have apache 1.3.19. How do I remove the os banner, so when people try to telnet into port 80 they don't find out what type of os I am running. Daniel Pinsky, CNA, CCNA Security/Network Administrator mailto:[EMAIL PROTECTED]

Re: Need Help Securing XP

2002-05-29 Thread Dan Van Derveer
buggy and insecure. Dan - Original Message - From: Matt [EMAIL PROTECTED] To: Security-Basics [EMAIL PROTECTED] Sent: Monday, May 27, 2002 2:52 AM Subject: Need Help Securing XP Hi all Here's my story: I wanted to see how XP looked and decided to give it a test run I managed to get

Re: Trojan Programs from web site link in Security_Wire_Digest@bdcimail.com newsletter

2002-05-22 Thread Dan Van Derveer
Perhaps you ought to read Mcafee's complete description of that trojan http://vil.mcafee.com/dispVirus.asp?virus_k=99467 . According to that page thier scanner has flaged on travelocity as well. You may be overreacting. In fact the description goes as far as them saying the virus may not even

Secure Infrastructure

2002-05-20 Thread Dan Williamson
I currently am faced with a troublesome infrastructure dilemma. We have some real-time data that resides on an SQL server in our intranet. This data is queried and updated by users via a web server that is in our DMZ. Queries are sent from the web server in the DMZ to the SQL server

Re: AUDITING LICENSES

2002-05-20 Thread Dan Van Derveer
Why not ask the BSA? Im sure they would LOVE to help you out ;-) Dan - Original Message - From: PEPE TECATE [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Friday, May 17, 2002 10:25 PM Subject: AUDITING LICENSES Hello all, do you know some auditing sw tool, free if possible? I am

Re: Slackware or Redhat?

2002-05-17 Thread Dan Van Derveer
the packages as fast as Redhat/Debian/everyone else which avoids releasing packages with vulnerabilities. I still recommend Debian because its makes maintenence easy(most of the time). Dan V - Original Message - From: Security [EMAIL PROTECTED] To: Thomas Madhavan [EMAIL PROTECTED] Cc

Re: Webservers

2002-05-17 Thread Dan Van Derveer
Another plus for Apache is that there are Win32 versions of it. You do not need any version of *NIX to run it so you can keep your windows gui AND have Apache. Dan V. - Original Message - From: [EMAIL PROTECTED] To: Robert Buel [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Sent: Thursday, May

Re: WIN 2K to *NIX Scanner

2002-04-25 Thread Dan Williamson
. Today I obtained a copy of Internet Scanner from Internet Security Systems (ISS) and will be testing it out as well. Will also look at the Pentasafe products. Are there any others that I might try? I am searching for the best bang for the buck that I can get. Dan -Original

WIN 2K to *NIX Scanner

2002-04-24 Thread Dan Williamson
I would like to be able to scan *NIX machines for vulnerabilities from a WIN 2K Pro machine VIA the internet or a network. Are there any tools capable of doing this? Dan

RE: Other side of the coin

2002-04-03 Thread Dan Irwin
script kiddie type. (Note i said vast, not ALL). You may also want to look for some smaller or underground IRC servers or networks. These too can be inhabited by the kinds of people you wish to monitor. Hope This Helps. Dan. -- Dan Irwin - Systems Administrator Jackie's Wholesale Nurseries

Other side of the coin

2002-04-01 Thread Dan Bingham
I have been reading this list (along with other security, incident, and bugtraq lists) in the shadows for quite awhile now. It's such a great resource and there is just so much to take in. It's good to see things from the 'good-guy' or 'whitehat' point of view, but does anyone know where one

Disk Wiping Utilities

2002-03-27 Thread Dan Williamson
need a tool that will wipe EVERYTHING ! TIA Dan

A new book that I have found

2002-03-01 Thread Dan Trainor
Hey all - This might be a bit off subject, but here goes To all the heavy readers out there I have stumbled upon one of the greatest books about cryptography and cryptographic analysis that I have ever read Granted, I haven't read a lot on the subject, but it's still a great read The book is

RE: Denial of service question.

2002-02-13 Thread Dan Irwin
appear offline, but at least your T1 is useable again. A small price to pay, i think. You could install another T1 line, but if you use BGP4 routing, it is possible the attack could saturate both lines, which would be totally pointless. Hope this helps. Dan. -- Dan Irwin - Systems Administrator

RE: Naming Conventions of Servers and Security

2002-02-08 Thread Dan . Hemphill
It could be beneficial to name them incorrectly, but could also be a logistical nightmare. Naming an Exchange server FTP1, for example, could really through a hacker for a loop after he enumerates the resources. I would say it's not recommended unless the organization is extremely small.

RE: Feedback on BlackICE...

2002-01-31 Thread Dan Irwin
, but http://grcsucks.com/grcdos.htm is the ultimate companion to http://grc.com/dos/grcdos.htm. It sure puts an interesting slant on everything Steve Gibson wrote. My 2 cents. Dan -- Dan Irwin - Systems Administrator Jackie's Wholesale Nurseries Pty Ltd Email: [EMAIL PROTECTED] Phone: 07 3888 2481

RE: MS EFS Question

2002-01-16 Thread Dan . Hemphill
What happens if you lose the private key, and from there copy the files to a FAT or NTFS4 partition? Do they remain encrypted? -Original Message- From: Kevin Crichton [mailto:[EMAIL PROTECTED]] Sent: Monday, January 14, 2002 12:06 PM To: Rob Weiss Cc: 'leon'; [EMAIL PROTECTED] Subject:

RE: How can I detect someone sniffing my network?

2002-01-15 Thread Dan . Hemphill
How would you go about detecting what NIC's are in promiscuous mode? Is there some sort of mass ping to find such a thing out? -Original Message- From: Craig Van Tassle [mailto:[EMAIL PROTECTED]] Sent: Friday, January 11, 2002 3:09 AM To: secuirty-basics Subject: Re: How can I detect

Re: firewall log-Kernel32.dll to IANA

2002-01-14 Thread Dan
/howipmcworks.html Dan M. This is from the Sybase firewall log, (thanks to whomever recomended trying it , sorry I am a newbie this is proably normal but i am curious why this is being done by Windows. Thanks in advance, Dan File Version :4.10. File Description

Re: Timeout -Inactivity

2002-01-10 Thread Dan
ranges for timeouts. Dan I was wondering what everyone else is using as timeouts for the following configurations: Internal systems? Web based applications? Is the timeout configuration different between your external customers and internal users? Could I get any feedback on this issue?

RE: Suggested Firewall (CHEAP TO!)

2002-01-03 Thread Dan . Hemphill
It's nice. Also check out http://www.smoothwall.org -Original Message- From: Benjamin [mailto:[EMAIL PROTECTED]] Sent: Monday, December 31, 2001 4:10 AM To: [EMAIL PROTECTED] Subject: Suggested Firewall (CHEAP TO!) Hi all, Just thought I would suggest a firewall that I just got

RE: which ftp-server?

2001-12-29 Thread Dan . Hemphill
Even better is Bulletproof FTP, formerly known as G6. http://www.bpftpserver.com -Original Message- From: Adolfson, Lee [mailto:[EMAIL PROTECTED]] Sent: Thursday, December 27, 2001 12:28 PM To: '[EMAIL PROTECTED]' Subject: RE: which ftp-server? Try warftp at http://www.warftp.org/

Re: Closing open ports

2001-12-14 Thread Dan
ports then get your favorite windows based sniffer and go to town. Dan. These are ports that are open in one of my w2k [ntfs] professionals machines. this pc runs 2 firewalls and an ids with a real time virus guard. I want to make some sense out of this and want to know how to close

RE: Unix Security Standards, books, tools...

2001-12-03 Thread Dan Trainor
Harro - A couple books that I have in my library... The Design of the Unix Operating System, by Maurice J. Bach. I believe by running through a book of this detail, one can piece together how a UNIX box is secured, by understanding how it is constructed. I know that helped me a lot.

Re: Snort/Hogwash help

2001-11-29 Thread Dan
use it for other stuff. Hogwash is an interesting yet young tool that is aimed at doing different things. Just stick to snort is pretty easy to learn the basics and is very flexible. dan. I'm a pretty new user to Linux, and I want to set up some sort of protection for my box. I have snort

RE: Cisco VPN client

2001-11-18 Thread Dan Reynolds (GWB)
Open Protocol 50 and UDP port 500. That should be all you need. Dan Reynolds Sr. Technical Specialist Network Services Group [EMAIL PROTECTED] V:631.951.5447 F:631.951.5225 George Weston Bakeries, Inc. 55 Paradise Lane Bay Shore, NY 11706 -Original Message- From: Al Miller [mailto

RE: power password prank

2001-11-08 Thread Dan . Hemphill
, is to call Compaq and ask them for the backdoor password if one even exists for that machine. -Dan -Original Message- From: sari sari [mailto:[EMAIL PROTECTED]] Sent: Thursday, November 01, 2001 7:13 PM To: [EMAIL PROTECTED] Subject: power password prank hey all, I have a little

RE: W2k Blues

2001-10-31 Thread Dan . Hemphill
Unless of course, there is no floppy drive in said system. -Original Message- From: Gordon McKinnon [mailto:[EMAIL PROTECTED]] Sent: Monday, October 29, 2001 4:30 PM To: [EMAIL PROTECTED] Subject: Re: W2k Blues Basic comment: anyone who has physical access to the system will be able to

RE: Sharing Folders

2001-10-24 Thread Dan . Hemphill
net time can still accomplish that goal easily. Simply use the at command and schedule it, which fits outside the realm of a login script and manual use as well. -Original Message- From: Mervin, Chris [mailto:[EMAIL PROTECTED]] Sent: Monday, October 22, 2001 6:06 PM To: '[EMAIL

Encryption for FTP/MAil/Web

2001-10-19 Thread Benjamin, Dan
Hi all, I have been tasked with finding and implementing solutions to provide payroll vendors/401k vendors and health care providers with methods our company can use to transmit encrypted files via Website (IIS), FTP, and E-mail (Exchange). We are a total MS shop. I thought of looking to Verisign

where to put ssh fingerprints

2001-10-05 Thread Dan
Hi, I was wondering how most of yall distribute your ssh fingerprints? I'm thinking through as many vectors as possible but not finding much supporting documentation on that. Signed email, web page under tripwire, motd (after the fact), or even snail mail? Others? Dan