It could be beneficial to name them incorrectly, but could also be a
logistical nightmare. Naming an Exchange server FTP1, for example, could
really through a hacker for a loop after he enumerates the resources.
I would say it's not recommended unless the organization is extremely small.
What happens if you lose the private key, and from there copy the files to a
FAT or NTFS4 partition?
Do they remain encrypted?
-Original Message-
From: Kevin Crichton [mailto:[EMAIL PROTECTED]]
Sent: Monday, January 14, 2002 12:06 PM
To: Rob Weiss
Cc: 'leon'; [EMAIL PROTECTED]
Subject: R
How would you go about detecting what NIC's are in promiscuous mode? Is
there some sort of mass ping to find such a thing out?
-Original Message-
From: Craig Van Tassle [mailto:[EMAIL PROTECTED]]
Sent: Friday, January 11, 2002 3:09 AM
To: secuirty-basics
Subject: Re: How can I detect som
It's nice.
Also check out http://www.smoothwall.org
-Original Message-
From: Benjamin [mailto:[EMAIL PROTECTED]]
Sent: Monday, December 31, 2001 4:10 AM
To: [EMAIL PROTECTED]
Subject: Suggested Firewall (CHEAP TO!)
Hi all,
Just thought I would suggest a firewall that I just got done
Even better is Bulletproof FTP, formerly known as G6.
http://www.bpftpserver.com
-Original Message-
From: Adolfson, Lee [mailto:[EMAIL PROTECTED]]
Sent: Thursday, December 27, 2001 12:28 PM
To: '[EMAIL PROTECTED]'
Subject: RE: which ftp-server?
Try warftp at
http://www.warftp.org/
i
It's possible that you can reset the password with a jumper setting on the
motherboard.
Consult your manual for further details on how to accomplish this. Also, on
some BIOS's, there are backdoor passwords installed from the factory. Your
best bet if you can't figure out how to reset the BIOS,
Unless of course, there is no floppy drive in said system.
-Original Message-
From: Gordon McKinnon [mailto:[EMAIL PROTECTED]]
Sent: Monday, October 29, 2001 4:30 PM
To: [EMAIL PROTECTED]
Subject: Re: W2k Blues
Basic comment: anyone who has physical access to the system will be able to
net time can still accomplish that goal easily. Simply use the "at" command
and schedule it, which fits outside the realm of a login script and manual
use as well.
-Original Message-
From: Mervin, Chris [mailto:[EMAIL PROTECTED]]
Sent: Monday, October 22, 2001 6:06 PM
To: '[EMAIL PROTECT