Hi,
It's not the biggest cert but the Security+ might be a start. There is no
experience requirement but demonstrates some basic knowledge.
You could follow this up with the TICSA which requires two years of
experience or 48 hours of classes.
The GIAC courses also do not require experience.
using some of the authentication
services offered by CheckPoint's FW-1 firewall and BlueSocket's
wireless security box. I suspect that user authentication
as a firewall feature has become fairly widespread, although
I'm not sure how common on boxes costing less than about $10K.
David Gillett
employers later, that's what I'm still
doing.)
David Gillett
-Original Message-
From: Duffy Hazelhurst [mailto:[EMAIL PROTECTED]
Sent: August 11, 2003 17:08
To: Mike West; [EMAIL PROTECTED]
Subject: RE: Getting In
I can't wait to see the reply, I'd love to know the answer myself
that works if the user ignores the
warning about an unknown host key. That is different from the bug
that allows MITM to happen on SSH1 without being noticed by the user.
FLAME ON
If you ignore the warning about the unknown host key, you have almost zero
cryptographic protection.
/FLAME OFF
David
Comcast used to have an AUP that banned VPN traffic on
their home service. Have they ever rescinded that?
David Gillett
-Original Message-
From: abe vigoda [mailto:[EMAIL PROTECTED]
Sent: August 12, 2003 14:13
To: [EMAIL PROTECTED]
Subject: comcast blocking ipsec traffic
. End of problem.
David Gillett
-Original Message-
From: none [mailto:[EMAIL PROTECTED]
Sent: August 8, 2003 21:43
To: [EMAIL PROTECTED]
Subject: Modem connection
hi, i'm a simple man, i can't affort anything faster than
56k : I'm running XP, with Forton Firewall; the problem i
Whether your VPN users need GRE or ESP+AH will depend on what
particular VPN technology they use. (In our case, some users need
one and some the other, but that's probably not typical.)
David Gillett
-Original Message-
From: stephen at unix dot za dot net [mailto:[EMAIL PROTECTED
is to
block these TCP/UDP ports at the perimeter with a firewall or
router access list. Outbound as well as inbound!
David Gillett
-Original Message-
From: Rick Kingslan [mailto:[EMAIL PROTECTED]
Sent: August 4, 2003 19:30
To: [EMAIL PROTECTED]
Subject: Re: File and Printer Sharing still
connects: well, there's something listening on that particular
port... and may even be greeting you with an identifying banner.
[...]
There may be a simple way to do this...
maybe someone's got an even simpler solution?
cu :)
David B.
--
Thank you for calling $PROVIDER helpdesk. If your
one stops talking, the other
assumes responsibility for the gateway IP and MAC addresses
that clients have been told about via DHCP (or static config)
and ARP, respectively.)
David Gillett
-Original Message-
From: White-Tiger [mailto:[EMAIL PROTECTED]
Sent: August 1, 2003 07:21
ESP is protocol 50 and AH is 51. Neither opening 52 nor
leaving 50 closed is likely to help.
David Gillett
-Original Message-
From: Douglas Gullett [mailto:[EMAIL PROTECTED]
Sent: August 2, 2003 08:49
To: Adam Overlin; [EMAIL PROTECTED]
Subject: RE: Cisco Workaround
Adam
Here is a link to trend
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_BDFR.SV
R
it lists some information and you can use their online scan.
David
-Original Message-
From: Flory D Jeffrey Contractor 59MDSS/MSISI
[mailto:[EMAIL PROTECTED]
Sent: Friday, August 01
Is there any method to eliminate all the netbios traffic,
and, at the same time, the machine can still share resources
and map drive?
Windows File Sharing uses NetBIOS as its transport. If you
need it to work, there will be NetBIOS traffic.
David Gillett
-Original Message
core competencies.
The entire banking system only works because most of the people
believe it can be trusted.
As a general rule, I think security is a very poor choice of
function to outsource. For a *bank*, I think it's just WRONG.
David Gillett
-Original Message-
From: Meritt James
The horse's mouth:
http://www.iana.org/assignments/port-numbers
-Original Message-
From: stephen at unix dot za dot net [mailto:[EMAIL PROTECTED]
Sent: July 30, 2003 23:54
To: Jason Armstrong
Cc: '[EMAIL PROTECTED] '
Subject: RE: source LAN port 137 dest 169.x
cat
it for any of its space might as
well do it for all.
(*) I don't recall the exact rationale, and it has been a while
since I've seen any discussion of it.
David Gillett
-Original Message-
From: Terry [mailto:[EMAIL PROTECTED]
Sent: July 31, 2003 02:41
To: [EMAIL PROTECTED]
Subject: IP
. They'll
be dropped at the point where something recognizes that 169.254.x.x
is a bogon and not a routable destination.
David Gillett
-Original Message-
From: Darren Gragg [mailto:[EMAIL PROTECTED]
Sent: July 29, 2003 08:33
To: [EMAIL PROTECTED]
Subject: source LAN port 137 dest 169.x
on your hands, and if they don't then you can't
usefully give the same (teamed) address to multiple adapters.
David Gillett
-Original Message-
From: Jane Han [mailto:[EMAIL PROTECTED]
Sent: July 29, 2003 09:05
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: RE: 2
CAN have multiple routes pointing towards the
same network.
David Gillett
-Original Message-
From: Ansgar Wiechers [mailto:[EMAIL PROTECTED]
Sent: July 29, 2003 12:33
To: [EMAIL PROTECTED]
Subject: Re: 2 NIC's on same network, possible?
David,
On 2003-07-29 David Gillett
from.
David Nichols
Network Admin
- Original Message -
From: Darren Gragg [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Tuesday, July 29, 2003 11:33 AM
Subject: source LAN port 137 dest 169.x
I am seeing some UDP packets showing up in my logs as being dropped that
have a source of 172 my
to use IPSEC.
David Gillett
-Original Message-
From: news [mailto:[EMAIL PROTECTED] Behalf Of Michael Daigle
Sent: July 29, 2003 20:26
To: [EMAIL PROTECTED]
Subject: Encrypted file system over Internet
If I understand on-the-fly-encryption correctly, I assume that
information I read
David Gillett
---
On Mon, 28 Jul 2003, marc brown wrote:
i am new to linux but after getting my rh9 box running
welcome to linux
i have started to use nmap to do some scanning of my
networks. can someone tell me exactly what it means
when the state of a particular port is 'filtered'?
man nmap
will tell
responses
may be directed to any port, but should be coming from port 53.
David Gillett
-Original Message-
From: Glenn English [mailto:[EMAIL PROTECTED]
Sent: July 28, 2003 18:38
To: [EMAIL PROTECTED]
Subject: domain ACL?
My understanding is that UDP connects to port 53 should
Correct. Your machine can't have two routes pointing towards the same
network.
If you have a default route, you HAVE two routes pointing towards
every network for which you have an explicit route. This cannot be
a correct statement without some further qualifiers!
David Gillett
---
as a bridge. Since I don't know if you
can do that, I'd go for static NAT.
David Gillett
---
Exactly, its just cover your a** stuff. All or most of this stuff is written
by lawyers, for lawyers. You will see this on some pieces of software, and
hardware. They're not responsible for 'such and such' acts of 'blah blah and
blah'.
Unavoidable stuff, just have to deal with it.
David
Filtered == Port is blocked by a firewall. (As said below :))
If you want more information, it is available in the nmap man page (run the
command 'man nmap' at the prompt), or the nmap web site, which is at
http://www.insecure.org/nmap.
David
From: john mathew [EMAIL PROTECTED]
To: [EMAIL
I have personally rid a few 98SE and Win2k machines using spybot search and
destroy. It worked very well.
Here is the link http://security.kolla.de/ (shareware)
David
-Original Message-
From: Bill Hardstone [mailto:[EMAIL PROTECTED]
Sent: Tuesday, July 29, 2003 4:14 AM
To: [EMAIL
exporting a particular
certificate from the local administrator account BEFORE reinstalling
the OS
[My recommendation to people is that they ignore EFS unless they are
using domain accounts, which will survive a local OS reinstall.]
David Gillett
-Original Message-
From: stephen
They have. They've been amazingly responsive about providing fixed
code versions for some frighteningly-old equipment. The *Workaround*
is just a quick and dirty fix for those who need some time to schedule
the code upgrade installations.
David Gillett
-Original Message-
From
On Thu, 24 Jul 2003, D N Vaidya wrote:
May I know what is SUS stands for? Also I want to know the best practice for
deploying new Service Packs and Hot fixes in production environment. Because
I faced some problems after installing SP4 of Win2K server on one production
machin. That machine
The application layer provides the interface between user
and server processes and the network communications system.
David Gillett
-Original Message-
From: David Wallraff [mailto:[EMAIL PROTECTED]
Sent: July 28, 2003 08:42
To: David Gillett
Cc: 'The Fueley'; [EMAIL PROTECTED]
Subject
in that will do this, or is there a 3rd party product?
Thanks,
David
---
I tried to correct your top-quoting so sorry if quote looks a little
untidy.
On Thu, 24 Jul 2003, Stuart wrote:
I'm looking for a solution to encrypt my mails and to
ensure that they have not been tampered with.
pgp? http://www.pgpi.org/
you can encrypt the email, and sign up. Only down
away with ignoring new threats unless
they actually apply to stuff your organization does, instead of
constantly putting out fires each time the building catches.
David Gillett
-Original Message-
From: Jude Naidoo [mailto:[EMAIL PROTECTED]
Sent: July 26, 2003 09:06
To: Jane Han; ALLEN
effective.)
David Gillett
-Original Message-
From: chris [mailto:[EMAIL PROTECTED]
Sent: July 27, 2003 11:39
To: [EMAIL PROTECTED]
Subject: Re: Trusting localhost?
In-Reply-To: [EMAIL PROTECTED]
Well IP spoofing is still very very effective. But the
chances of someone from
get answered.)
David Gillett
-Original Message-
From: Fernando Gont [mailto:[EMAIL PROTECTED]
Sent: July 25, 2003 12:35
To: [EMAIL PROTECTED]
Subject: RE: what's the meaning of the 0.0.0.0?
At 15:42 24/07/2003 -0400, you wrote:
In linux machines when you try to connect
willing to
compile the Windows tool list.
David Moisan, N1KGH ARES/SKYWARN [EMAIL PROTECTED]
Invisible Disability: http://www.davidmoisan.org/invisible_disability.html
ATS-909 FAQ: http://www.davidmoisan.org/radio/sangean/ats909faq.html
---
to every port and
assume we'll see a packet from it soon so it will get added to
my switch table.
Switch table entries could get created when ARP response packets
are seen -- or ARP requests, or DHCP broadcasts, or
David Gillett
-Original Message-
From: Stuart [mailto:[EMAIL PROTECTED
in
the switch chassis.)
David Gillett
---
additional protocols to cross our borders.
David Gillett
-Original Message-
From: Kurt Seifried [mailto:[EMAIL PROTECTED]
Sent: July 23, 2003 22:11
To: DOUGLAS GULLETT; Alvaro Gordon-Escobar
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: Cisco Workaround
No. The attack
by shutting down just enough interfaces to make the loop
go away, so odds are that one of the duplicates gets disconnected.
David Gillett
-Original Message-
From: Stuart [mailto:[EMAIL PROTECTED]
Sent: July 24, 2003 10:04
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: RE: ARP Spoof
Hello all,
I would like some advice on how to go about having an application
tested for buffer overflows. Are there any tools available ? Are there
people who can do the testing on my behalf ?
Do you need more information first ?
I look forward to your replies.
David Stout
CCSP, CCNA, CRCP
*without* waiting
for a host to send an ARP request. This doesn't seem to make sense,
but ARP is a stateless protocol so most implementations just believe
all ARP responses they see, without trying to match them up with legit
requests.
David
Is it first-come-first-serve methodology
an additional response (first two lines) but the if prevents it
from looping infinitely.)
David Gillett
-Original Message-
From: Vineet Mehta [mailto:[EMAIL PROTECTED]
Sent: July 22, 2003 22:22
To: [EMAIL PROTECTED]
Subject: ARP Spoof Question
Hi all members,
I have a small question. I
Restricted budgets are something many of us are living
with, but they're no excuse for trying to build your own
client authentication from scratch. It's a major wheel
that doesn't need reinventing.
David Gillett
-Original Message-
From: Tiago Filipe Dias [mailto:[EMAIL PROTECTED
provided).
I'm willing to write up answers to some of the questions when things
proceed that far.
David
--
David J. Bianco, GSEC GCUX [EMAIL PROTECTED]
Thomas Jefferson National Accelerator Facility
GPG Fingerprint: 516A B80D AAB3 1617 A340 227A 723B BFBE B395 33BA
It can be logged, but it isn't by default. You need
to enable auditing of login events in the security
policy, and then you can see them in the Event Viewer.
David Gillett
-Original Message-
From: Jose Guevarra [mailto:[EMAIL PROTECTED]
Sent: July 22, 2003 11:03
To: [EMAIL
While Microsoft's lawyers might disagree, I interpret
the problematic provision of SP3 for Windows 2000 as
saying that Microsoft wants to be my Security Administrator.
I'm not granting them that power *UNLESS* they accept
liability.
DG
-Original Message-
From: Ronish Mehta
)
* I've just been hacked! Now what?
I'm sure there are *many* others, but these are the biggest that
spring to my mind.
David
--
David J. Bianco, GSEC GCUX [EMAIL PROTECTED]
Thomas Jefferson National Accelerator Facility
GPG Fingerprint: 516A B80D AAB3 1617 A340 227A 723B
block the URL.
For that reason I usually put URLs on a new line with no other text. But I'm
old-fashioned:-)
Cheers
David Kellaway
- Original Message -
From: Koji Nobumoto [EMAIL PROTECTED]
To: Jose Guevarra [EMAIL PROTECTED]
Cc: Security-Basics [EMAIL PROTECTED]
Sent: Tuesday, July 15
MRTG, Solarwinds, and, InterMapper.
InterMapper shows real-time traffic flows between devices as running Ants.
(It runs on a Mac,
and its worth buying one just to run the software).
- Original Message -
From: Nick Benigno [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Monday, July 14, 2003
be changed quickly (for the reasons you suggest).
David Gillett
-Original Message-
From: James [mailto:[EMAIL PROTECTED]
Sent: July 13, 2003 23:36
To: [EMAIL PROTECTED]
Subject: RE: New trojan turns home PCs into porno Web site hosts
I have a question, since I don't know as much
-Original Message-
From: Nick Benigno [mailto:[EMAIL PROTECTED]
Sent: Monday, July 14, 2003 3:10 PM
To: [EMAIL PROTECTED]
Subject: Monitoring the network: Routers
I am interesting in getting some ideas as to which packages
are out there
and recommended to monitor a router.
Because MRTG (by default?) only samples the SNMP data every 5
MINUTES, and even then it's hard to read the graph until it has
aged a little, about another 10 minutes.
David Gillett
-Original Message-
From: Nathan [mailto:[EMAIL PROTECTED]
Sent: July 16, 2003 05:46
To: 'Richard
.
You'll need to change an item in your group policy so that the update
clients go to your server instead of MS. It's off topic, but I recommend
reading the SUS Deployment Guide (from the MS web site) to get it working
with your clients.
Take care,
Dave
David Moisan, N1KGH ARES/SKYWARN
There are third party programs but many of them are very expensive.
The benefit is the third party can help update microsoft patches along
with a long list of other popular programs.
Here is a link to one.
http://www.patchlink.com
David
-Original Message-
From: Jack Foust [mailto
At 11:50 AM 7/11/2003 -0700, Kevin Ashurst wrote:
You can't use a domain controller (DC) as a SUS server, but you can use a DC
as a client.
The latest version of SUS (SP1) will run on a DC.
Take care,
Dave
David Moisan, N1KGH ARES/SKYWARN [EMAIL PROTECTED]
Invisible Disability
the
ISPs of the home IPs being used and see if they will help out. That is about
all that I can add to ge's post.
David
From: ge [EMAIL PROTECTED]
To: '[EMAIL PROTECTED] COM' [EMAIL PROTECTED]
Subject: RE: New trojan turns home PCs into porno Web site hosts
Date: Fri, 11 Jul 2003 22:05:33 -0700
I highly doubt sometimes that an attacker would waste time trying to decrypt
an HTTPS stream, it would be better just to attack the databases that hold
all this login information, socially engineer it out of a person, install a
keylogger while nobody is looking, or shoulder surf somebody who
Ahno sorry. If I can figure out your MAC address on the network which takes about
3 minutes, I can spoof your MAC and I'm now allowed on your AP. Keep in mind like
everyone else saidWEP can easily be cracked...and MAC filtering is even easier to
blow by.
-Original Message-
servers on the list. Well-run lists include
directions for how to get your server taken off the list, and these
will usually include similar links to instructions for limiting
relaying.
David Gillett
-Original Message-
From: JasonTay [mailto:[EMAIL PROTECTED]
Sent: July 8, 2003 19:20
-Original Message-
From: Jim [mailto:[EMAIL PROTECTED]
Sent: July 7, 2003 17:27
To: [EMAIL PROTECTED]
Subject: Questions about 192.168
Hi,
I've been following some of the conversations about 192.168 networks,
and tried some experimentation, and came up with a few questions:
to go on to another one that
works better.)
David
---
Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts!
The Gartner Group just put Neoteris in the top of its Magic Quadrant,
while InStat has confirmed
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Sent: Thursday, July 03, 2003 8:31 AM
We are looking for a tool that will erase all data beyond recovery from a
hard drive. We going to get rid of few computers and do not want data to get
into anyone's hand. Both freeware and commercial
On Wed, 02 Jul 2003, Tim Greer wrote:
FLAME WAR SNIPPED
My whole point was that this top ten list was highly subjective and that
insecure programs were really in the hands of the beholder /*again my
opinion*/.
In a way, that's correct. However, in other ways it's not anything that
.
David
---
Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts!
The Gartner Group just put Neoteris in the top of its Magic Quadrant,
while InStat has confirmed Neoteris as the leader in marketshare
On Sun, 06 Jul 2003, David Corking wrote:
On Wed, 02 Jul 2003, Chris Berry wrote:
From: Roger A. Grimes [EMAIL PROTECTED]
It won't load Flash, RealPlayer, Windows Media Player, or most other
plug-ins or Helper
Applications.
Good, 95% of these have no legitimate business
. It supports TCP, UDP,
ICMP and RAW-IP protocols, has a traceroute mode, the ability to
send files between a covered channel, and many other features.
(I assume it's inspired *BY* ping, and sends files through covert
channels)
David Gillett
-Original Message-
From: [EMAIL
other people on
this..just hope you make a good selection :)
David
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Data erasing tool
Date: Thu, 3 Jul 2003 08:31:01 -0400
We are looking for a tool that will erase all data beyond recovery from a
hard drive. We going to get rid of few
before writing such nonsense.
Root login was disabled out of the box when I put openssh on my Debian box
a year or so ago.
David Moisan, N1KGH ARES/SKYWARN [EMAIL PROTECTED]
Invisible Disability: http://www.davidmoisan.org/invisible_disability.html
ATS-909 FAQ: http
probably better to do a DoD spec overwrite :) (3x overwrite)
David
From: Brad Bemis [EMAIL PROTECTED]
To: Stephen Eaton
[EMAIL PROTECTED],[EMAIL PROTECTED]
Subject: RE: Secure Media Destruction
Date: Thu, 3 Jul 2003 14:59:45 -0700
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
That largely
You should be able to see this in your firewall logs --
a series of blocked connection attempts to unused ports
on your servers, usually followed by a similar set of
attempts on the next server address.
David Gillett
-Original Message-
From: Thom Larner [mailto:[EMAIL PROTECTED
On Tue, 01 Jul 2003, Devdas Bhagat wrote:
On 27/06/03 18:01 -0500, Dagmar d'Surreal wrote:
snip
I have a requirement were I need to connect to a remote machine and
get a command prompt. We all know how to do this via netcat by
setting up a listening port. My concern is that I do not
a
strong opinion about that.
David
---
Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts!
The Gartner Group just put Neoteris in the top of its Magic Quadrant,
while InStat has confirmed Neoteris
.
David Gillett
---
Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts!
The Gartner Group just put Neoteris in the top of its Magic Quadrant,
while InStat has confirmed Neoteris as the leader in marketshare
Hi hong!
On Wed, 02 Jul 2003, hong li wrote:
If you use the same password for the local
administrator on workstations
as all other servers's local administrator, (even
domain administrator),the local administrator can gain
full access to any servers without asking
domain info if you
not as trivial for ISPs as it sounds.
Many also carry traffic for third parties, and would be in big trouble
if they accidentally blocked that)
David Gillett
-Original Message-
From: Hanuska Ivo [mailto:[EMAIL PROTECTED]
Sent: July 1, 2003 23:27
To: [EMAIL PROTECTED]
Subject: IP address
One question, end-user type programs or server programs as well? And how
about more secure alternatives?
I'd have to add BIND rather high up on the list, with djbdns as a logical
alternative.
It's smaller, less resource intensive, and easier to setup. (See
Hi,
you can find a free linux AV for personal use on http://www.hbedv.com
But I don't realy know howto use it with squid.
If you know more post it.
Regrads,
David Kaluza
On Fri, 2003-06-27 at 10:03, Nhadie wrote:
Hi,
I am running Squid and would like to know some ways i can intergrate
of the traffic -- not necessarily the one you've chosen
to traceroute. On the other hand, diversion might be mistaken for
normal asymmetry)
David Gillett
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Sent: June 26, 2003 10:08
To: [EMAIL PROTECTED]
Subject: Re: AW
an hour, with no client, server changes, or ongoing
maintenance.
Visit us at: http://www.neoteris.com/promos/sf-6-9.htm
--
--
--
David Ziggy Lubowa
Network Engineer
One2net
---
A Network
why is it harder to sniff over a switced network? i understand it's
becasue of the switch (natch), but what makes it more difficult?
dave
On Wed, 25 Jun 2003, Meidinger Christopher wrote:
Hello Hilal,
Yes, there are many tools that will do that. dsniff, ettercap, ethereal and
MANY others
such as ARP poisoning. All are exceptions
to the *normal* in the previous paragraph.
David Gillett
-Original Message-
From: David Wallraff [mailto:[EMAIL PROTECTED]
Sent: June 25, 2003 08:33
To: Meidinger Christopher
Cc: 'Hilal Hussein'; [EMAIL PROTECTED] Com (E-Mail)
Subject: Re: AW
please email me and the list with
corrections.
badenIT GmbH
System Support Workstation
Chris Meidinger
Tullastrasse 70
79108 Freiburg
-Ursprüngliche Nachricht-
Von: David Wallraff [mailto:[EMAIL PROTECTED]
Gesendet: Wednesday, June 25, 2003 5:33 PM
An: Meidinger Christopher
Cc
in order to give enough.
David Gillett
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Sent: June 24, 2003 13:04
To: [EMAIL PROTECTED]
Subject: RE: NTFS Permissions (was Share Permissions)
This is interesting because our system (NT 4.0) has been set
up exactly
As a general security policy, I do not visit random URLs
just because somebody thinks I should. If you want to send me
a URL to something you think I should see, please include *at
least* a sentence or two explaining what I should expect to
see when I get there.
David Gillett
-Original
is in the DNS server
software config, not the firewall.
David Gillett
-Original Message-
From: Charlie Winckless [mailto:[EMAIL PROTECTED]
Sent: June 18, 2003 16:27
To: [EMAIL PROTECTED]
Subject: RE: DNS Records
Zone transfers happen on 53/TCP, rather than the 53/UDP that
is used
,
and expect your core inter-VLAN routing access lists to do all policy
enforcement...
[I'd prefer not to name names, but watch for boxes that boast how
many VLANs they allow. Oh, and note that on some boxes, roaming *may*
require proprietary APs made by the switch manufacturer.]
David Gillett
destination
means I've already spent CPU to route packets that I'm now going to
consider throwing away]
David Gillett
---
Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts!
The Gartner Group just put
Well if your looking to backup event logs to a central database you can give
the program Event Archiver Enterprise a try, I don't have the url, but I'm
sure you can find it on www.download.com
-Original Message-
From: Stephen Gay [mailto:[EMAIL PROTECTED]
Sent: 19 June 2003 01:25
To:
Well as far as I know, once you visit windows update, it will only have you
install patches that you don't have installed. So I assume once installing
SP3 and doing Windows Update, you should have everything.
-Original Message-
From: phil groner [mailto:[EMAIL PROTECTED]
Sent: 19 June
You can also just make an NTFS boot disk, and then try and copy a new
boot.ini over. If your looking for a program to make an NTFS boot disk just
search on google for NTFS Boot Disk :p
-Original Message-
From: Dana Epp [mailto:[EMAIL PROTECTED]
Sent: 19 June 2003 02:33
To: Gene LeDuc;
Use openssh with Cygwin. Works great and it is free!!!
-Original Message-
From: Derek Perry [mailto:[EMAIL PROTECTED]
Sent: Monday, June 16, 2003 9:30 PM
To: [EMAIL PROTECTED]
Is there a sshd for Windows (W2K Server is the actual OS) that is freely
available? I am doing a senior design
blocked by my firewall. (Linux /
iptables)
2) Does anyone know if I can write a rule chain in IP tables that will allow
me to pass the packet through but still log its presence?
Thanks in Advance
David Nichols
---
Evaluating SSL
why, and see how you can get plug-n-play secure remote access in
about an hour, with no client, server changes, or ongoing maintenance.
Visit us at: http://www.neoteris.com/promos/sf-6-9.htm
--
David M
http://uptime.netcraft.com/up/accuracy.html#impossible
this faq should answer that. :)
-Original Message-
From: Rohit [mailto:[EMAIL PROTECTED]
Sent: Monday, June 16, 2003 10:28 AM
To: [EMAIL PROTECTED]
Subject: Netcraft shows ministryofsound is running IIS 5.0 on LINUX ???
, is well known for
their computer crime task force (mainly due to their carnivore
project). ;-)
Dave
--
David M. Fetter - http://www.fetterconsulting.com/
The world is full of power and energy and a person can go far by just
skimming off a tiny bit of it. Neal Stephenson - Snow Crash
.
Explaining to management why you need three boxes
where one can do the job is left as a career-limiting
exercise.
David Gillett
-Original Message-
From: Aaron Fisher [mailto:[EMAIL PROTECTED]
Sent: June 11, 2003 23:38
To: [EMAIL PROTECTED]
Subject: RE:Firewall and DMZ
After
1 - 100 of 335 matches
Mail list logo