RE: Getting In

2003-08-14 Thread David Olsen
Hi, It's not the biggest cert but the Security+ might be a start. There is no experience requirement but demonstrates some basic knowledge. You could follow this up with the TICSA which requires two years of experience or 48 hours of classes. The GIAC courses also do not require experience.

RE: Securing Web access from internet

2003-08-14 Thread David Gillett
using some of the authentication services offered by CheckPoint's FW-1 firewall and BlueSocket's wireless security box. I suspect that user authentication as a firewall feature has become fairly widespread, although I'm not sure how common on boxes costing less than about $10K. David Gillett

RE: Getting In

2003-08-14 Thread David Gillett
employers later, that's what I'm still doing.) David Gillett -Original Message- From: Duffy Hazelhurst [mailto:[EMAIL PROTECTED] Sent: August 11, 2003 17:08 To: Mike West; [EMAIL PROTECTED] Subject: RE: Getting In I can't wait to see the reply, I'd love to know the answer myself

Re: DNS, Man-in-the-middle??

2003-08-14 Thread David
that works if the user ignores the warning about an unknown host key. That is different from the bug that allows MITM to happen on SSH1 without being noticed by the user. FLAME ON If you ignore the warning about the unknown host key, you have almost zero cryptographic protection. /FLAME OFF David

RE: comcast blocking ipsec traffic?

2003-08-14 Thread David Gillett
Comcast used to have an AUP that banned VPN traffic on their home service. Have they ever rescinded that? David Gillett -Original Message- From: abe vigoda [mailto:[EMAIL PROTECTED] Sent: August 12, 2003 14:13 To: [EMAIL PROTECTED] Subject: comcast blocking ipsec traffic

RE: Modem connection

2003-08-14 Thread David Gillett
. End of problem. David Gillett -Original Message- From: none [mailto:[EMAIL PROTECTED] Sent: August 8, 2003 21:43 To: [EMAIL PROTECTED] Subject: Modem connection hi, i'm a simple man, i can't affort anything faster than 56k : I'm running XP, with Forton Firewall; the problem i

RE: Cisco Workaround

2003-08-14 Thread David Gillett
Whether your VPN users need GRE or ESP+AH will depend on what particular VPN technology they use. (In our case, some users need one and some the other, but that's probably not typical.) David Gillett -Original Message- From: stephen at unix dot za dot net [mailto:[EMAIL PROTECTED

RE: File and Printer Sharing still turned on after unchecked...confused :\

2003-08-09 Thread David Gillett
is to block these TCP/UDP ports at the perimeter with a firewall or router access list. Outbound as well as inbound! David Gillett -Original Message- From: Rick Kingslan [mailto:[EMAIL PROTECTED] Sent: August 4, 2003 19:30 To: [EMAIL PROTECTED] Subject: Re: File and Printer Sharing still

Re: verifying an open or closed port on an ip address

2003-08-07 Thread David Bettermann
connects: well, there's something listening on that particular port... and may even be greeting you with an identifying banner. [...] There may be a simple way to do this... maybe someone's got an even simpler solution? cu :) David B. -- Thank you for calling $PROVIDER helpdesk. If your

RE: 2 NIC's on same network, possible?

2003-08-04 Thread David Gillett
one stops talking, the other assumes responsibility for the gateway IP and MAC addresses that clients have been told about via DHCP (or static config) and ARP, respectively.) David Gillett -Original Message- From: White-Tiger [mailto:[EMAIL PROTECTED] Sent: August 1, 2003 07:21

RE: Cisco Workaround

2003-08-04 Thread David Gillett
ESP is protocol 50 and AH is 51. Neither opening 52 nor leaving 50 closed is likely to help. David Gillett -Original Message- From: Douglas Gullett [mailto:[EMAIL PROTECTED] Sent: August 2, 2003 08:49 To: Adam Overlin; [EMAIL PROTECTED] Subject: RE: Cisco Workaround Adam

RE: Question for all

2003-08-01 Thread McCleskey, David
Here is a link to trend http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_BDFR.SV R it lists some information and you can use their online scan. David -Original Message- From: Flory D Jeffrey Contractor 59MDSS/MSISI [mailto:[EMAIL PROTECTED] Sent: Friday, August 01

RE: To eliminate all netbios traffic without affecting Server service

2003-07-31 Thread David Gillett
Is there any method to eliminate all the netbios traffic, and, at the same time, the machine can still share resources and map drive? Windows File Sharing uses NetBIOS as its transport. If you need it to work, there will be NetBIOS traffic. David Gillett -Original Message

RE: Hosting

2003-07-31 Thread David Gillett
core competencies. The entire banking system only works because most of the people believe it can be trusted. As a general rule, I think security is a very poor choice of function to outsource. For a *bank*, I think it's just WRONG. David Gillett -Original Message- From: Meritt James

RE: source LAN port 137 dest 169.x

2003-07-31 Thread David Gillett
The horse's mouth: http://www.iana.org/assignments/port-numbers -Original Message- From: stephen at unix dot za dot net [mailto:[EMAIL PROTECTED] Sent: July 30, 2003 23:54 To: Jason Armstrong Cc: '[EMAIL PROTECTED] ' Subject: RE: source LAN port 137 dest 169.x cat

RE: IP address allocation

2003-07-31 Thread David Gillett
it for any of its space might as well do it for all. (*) I don't recall the exact rationale, and it has been a while since I've seen any discussion of it. David Gillett -Original Message- From: Terry [mailto:[EMAIL PROTECTED] Sent: July 31, 2003 02:41 To: [EMAIL PROTECTED] Subject: IP

RE: source LAN port 137 dest 169.x

2003-07-30 Thread David Gillett
. They'll be dropped at the point where something recognizes that 169.254.x.x is a bogon and not a routable destination. David Gillett -Original Message- From: Darren Gragg [mailto:[EMAIL PROTECTED] Sent: July 29, 2003 08:33 To: [EMAIL PROTECTED] Subject: source LAN port 137 dest 169.x

RE: 2 NIC's on same network, possible?

2003-07-30 Thread David Gillett
on your hands, and if they don't then you can't usefully give the same (teamed) address to multiple adapters. David Gillett -Original Message- From: Jane Han [mailto:[EMAIL PROTECTED] Sent: July 29, 2003 09:05 To: [EMAIL PROTECTED]; [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Subject: RE: 2

RE: 2 NIC's on same network, possible?

2003-07-30 Thread David Gillett
CAN have multiple routes pointing towards the same network. David Gillett -Original Message- From: Ansgar Wiechers [mailto:[EMAIL PROTECTED] Sent: July 29, 2003 12:33 To: [EMAIL PROTECTED] Subject: Re: 2 NIC's on same network, possible? David, On 2003-07-29 David Gillett

Re: source LAN port 137 dest 169.x

2003-07-30 Thread David Nichols
from. David Nichols Network Admin - Original Message - From: Darren Gragg [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Tuesday, July 29, 2003 11:33 AM Subject: source LAN port 137 dest 169.x I am seeing some UDP packets showing up in my logs as being dropped that have a source of 172 my

RE: Encrypted file system over Internet

2003-07-30 Thread David Gillett
to use IPSEC. David Gillett -Original Message- From: news [mailto:[EMAIL PROTECTED] Behalf Of Michael Daigle Sent: July 29, 2003 20:26 To: [EMAIL PROTECTED] Subject: Encrypted file system over Internet If I understand on-the-fly-encryption correctly, I assume that information I read

RE: what's the meaning of the 0.0.0.0?

2003-07-30 Thread David Gillett
David Gillett ---

Re: nmap status question

2003-07-29 Thread David
On Mon, 28 Jul 2003, marc brown wrote: i am new to linux but after getting my rh9 box running welcome to linux i have started to use nmap to do some scanning of my networks. can someone tell me exactly what it means when the state of a particular port is 'filtered'? man nmap will tell

RE: domain ACL?

2003-07-29 Thread David Gillett
responses may be directed to any port, but should be coming from port 53. David Gillett -Original Message- From: Glenn English [mailto:[EMAIL PROTECTED] Sent: July 28, 2003 18:38 To: [EMAIL PROTECTED] Subject: domain ACL? My understanding is that UDP connects to port 53 should

RE: 2 NIC's on same network, possible?

2003-07-29 Thread David Gillett
Correct. Your machine can't have two routes pointing towards the same network. If you have a default route, you HAVE two routes pointing towards every network for which you have an explicit route. This cannot be a correct statement without some further qualifiers! David Gillett ---

RE: Security/Firewall question

2003-07-29 Thread David Gillett
as a bridge. Since I don't know if you can do that, I'd go for static NAT. David Gillett ---

Re: Privacy Policy - we don't need no 'stinking privacy

2003-07-29 Thread David Vertie
Exactly, its just cover your a** stuff. All or most of this stuff is written by lawyers, for lawyers. You will see this on some pieces of software, and hardware. They're not responsible for 'such and such' acts of 'blah blah and blah'. Unavoidable stuff, just have to deal with it. David

Re: nmap status question

2003-07-29 Thread David Vertie
Filtered == Port is blocked by a firewall. (As said below :)) If you want more information, it is available in the nmap man page (run the command 'man nmap' at the prompt), or the nmap web site, which is at http://www.insecure.org/nmap. David From: john mathew [EMAIL PROTECTED] To: [EMAIL

RE: Removing xupiter, spyware, malware

2003-07-29 Thread McCleskey, David
I have personally rid a few 98SE and Win2k machines using spybot search and destroy. It worked very well. Here is the link http://security.kolla.de/ (shareware) David -Original Message- From: Bill Hardstone [mailto:[EMAIL PROTECTED] Sent: Tuesday, July 29, 2003 4:14 AM To: [EMAIL

RE: encrypted files to ntfs

2003-07-28 Thread David Gillett
exporting a particular certificate from the local administrator account BEFORE reinstalling the OS [My recommendation to people is that they ignore EFS unless they are using domain accounts, which will survive a local OS reinstall.] David Gillett -Original Message- From: stephen

RE: Cisco Workaround

2003-07-28 Thread David Gillett
They have. They've been amazingly responsive about providing fixed code versions for some frighteningly-old equipment. The *Workaround* is just a quick and dirty fix for those who need some time to schedule the code upgrade installations. David Gillett -Original Message- From

Re: Deploying Microsoft patches

2003-07-28 Thread David
On Thu, 24 Jul 2003, D N Vaidya wrote: May I know what is SUS stands for? Also I want to know the best practice for deploying new Service Packs and Hot fixes in production environment. Because I faced some problems after installing SP4 of Win2K server on one production machin. That machine

RE: ARP Spoof Question

2003-07-28 Thread David Gillett
The application layer provides the interface between user and server processes and the network communications system. David Gillett -Original Message- From: David Wallraff [mailto:[EMAIL PROTECTED] Sent: July 28, 2003 08:42 To: David Gillett Cc: 'The Fueley'; [EMAIL PROTECTED] Subject

Can you monitor copying of files from local or mapped drives?

2003-07-28 Thread David Sherman
in that will do this, or is there a 3rd party product? Thanks, David ---

Re: Encrypted Mail

2003-07-28 Thread David
I tried to correct your top-quoting so sorry if quote looks a little untidy. On Thu, 24 Jul 2003, Stuart wrote: I'm looking for a solution to encrypt my mails and to ensure that they have not been tampered with. pgp? http://www.pgpi.org/ you can encrypt the email, and sign up. Only down

RE: where should I start? help!

2003-07-28 Thread David Gillett
away with ignoring new threats unless they actually apply to stuff your organization does, instead of constantly putting out fires each time the building catches. David Gillett -Original Message- From: Jude Naidoo [mailto:[EMAIL PROTECTED] Sent: July 26, 2003 09:06 To: Jane Han; ALLEN

RE: Trusting localhost?

2003-07-28 Thread David Gillett
effective.) David Gillett -Original Message- From: chris [mailto:[EMAIL PROTECTED] Sent: July 27, 2003 11:39 To: [EMAIL PROTECTED] Subject: Re: Trusting localhost? In-Reply-To: [EMAIL PROTECTED] Well IP spoofing is still very very effective. But the chances of someone from

RE: what's the meaning of the 0.0.0.0?

2003-07-28 Thread David Gillett
get answered.) David Gillett -Original Message- From: Fernando Gont [mailto:[EMAIL PROTECTED] Sent: July 25, 2003 12:35 To: [EMAIL PROTECTED] Subject: RE: what's the meaning of the 0.0.0.0? At 15:42 24/07/2003 -0400, you wrote: In linux machines when you try to connect

Re: building an FAQ for Security-Basics

2003-07-24 Thread David Moisan
willing to compile the Windows tool list. David Moisan, N1KGH ARES/SKYWARN [EMAIL PROTECTED] Invisible Disability: http://www.davidmoisan.org/invisible_disability.html ATS-909 FAQ: http://www.davidmoisan.org/radio/sangean/ats909faq.html ---

RE: ARP Spoof Question

2003-07-24 Thread David Gillett
to every port and assume we'll see a packet from it soon so it will get added to my switch table. Switch table entries could get created when ARP response packets are seen -- or ARP requests, or DHCP broadcasts, or David Gillett -Original Message- From: Stuart [mailto:[EMAIL PROTECTED

RE: ARP Spoof Question

2003-07-24 Thread David Gillett
in the switch chassis.) David Gillett ---

RE: Cisco Workaround

2003-07-24 Thread David Gillett
additional protocols to cross our borders. David Gillett -Original Message- From: Kurt Seifried [mailto:[EMAIL PROTECTED] Sent: July 23, 2003 22:11 To: DOUGLAS GULLETT; Alvaro Gordon-Escobar Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: Re: Cisco Workaround No. The attack

RE: ARP Spoof Question

2003-07-24 Thread David Gillett
by shutting down just enough interfaces to make the loop go away, so odds are that one of the duplicates gets disconnected. David Gillett -Original Message- From: Stuart [mailto:[EMAIL PROTECTED] Sent: July 24, 2003 10:04 To: [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: RE: ARP Spoof

Testing for buffer overflows

2003-07-23 Thread David stout
Hello all, I would like some advice on how to go about having an application tested for buffer overflows. Are there any tools available ? Are there people who can do the testing on my behalf ? Do you need more information first ? I look forward to your replies. David Stout CCSP, CCNA, CRCP

Re: ARP Spoof Question

2003-07-23 Thread David J. Bianco
*without* waiting for a host to send an ARP request. This doesn't seem to make sense, but ARP is a stateless protocol so most implementations just believe all ARP responses they see, without trying to match them up with legit requests. David Is it first-come-first-serve methodology

RE: ARP Spoof Question

2003-07-23 Thread David Gillett
an additional response (first two lines) but the if prevents it from looping infinitely.) David Gillett -Original Message- From: Vineet Mehta [mailto:[EMAIL PROTECTED] Sent: July 22, 2003 22:22 To: [EMAIL PROTECTED] Subject: ARP Spoof Question Hi all members, I have a small question. I

RE: Wi-Fi User Authentication

2003-07-22 Thread David Gillett
Restricted budgets are something many of us are living with, but they're no excuse for trying to build your own client authentication from scratch. It's a major wheel that doesn't need reinventing. David Gillett -Original Message- From: Tiago Filipe Dias [mailto:[EMAIL PROTECTED

Re: building an FAQ for Security-Basics

2003-07-22 Thread David J. Bianco
provided). I'm willing to write up answers to some of the questions when things proceed that far. David -- David J. Bianco, GSEC GCUX [EMAIL PROTECTED] Thomas Jefferson National Accelerator Facility GPG Fingerprint: 516A B80D AAB3 1617 A340 227A 723B BFBE B395 33BA

RE: finding who has logged in on Win2k Pro

2003-07-22 Thread David Gillett
It can be logged, but it isn't by default. You need to enable auditing of login events in the security policy, and then you can see them in the Event Viewer. David Gillett -Original Message- From: Jose Guevarra [mailto:[EMAIL PROTECTED] Sent: July 22, 2003 11:03 To: [EMAIL

RE: Microsot Liability for vulnerabilities

2003-07-21 Thread David Gillett
While Microsoft's lawyers might disagree, I interpret the problematic provision of SP3 for Windows 2000 as saying that Microsoft wants to be my Security Administrator. I'm not granting them that power *UNLESS* they accept liability. DG -Original Message- From: Ronish Mehta

Re: building an FAQ for Security-Basics

2003-07-18 Thread David J. Bianco
) * I've just been hacked! Now what? I'm sure there are *many* others, but these are the biggest that spring to my mind. David -- David J. Bianco, GSEC GCUX [EMAIL PROTECTED] Thomas Jefferson National Accelerator Facility GPG Fingerprint: 516A B80D AAB3 1617 A340 227A 723B

Re: SSH port forwarding not working?

2003-07-18 Thread David Kellaway
block the URL. For that reason I usually put URLs on a new line with no other text. But I'm old-fashioned:-) Cheers David Kellaway - Original Message - From: Koji Nobumoto [EMAIL PROTECTED] To: Jose Guevarra [EMAIL PROTECTED] Cc: Security-Basics [EMAIL PROTECTED] Sent: Tuesday, July 15

Re: Monitoring the network: Routers

2003-07-17 Thread David Glosser
MRTG, Solarwinds, and, InterMapper. InterMapper shows real-time traffic flows between devices as running Ants. (It runs on a Mac, and its worth buying one just to run the software). - Original Message - From: Nick Benigno [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Monday, July 14, 2003

RE: New trojan turns home PCs into porno Web site hosts

2003-07-16 Thread David Gillett
be changed quickly (for the reasons you suggest). David Gillett -Original Message- From: James [mailto:[EMAIL PROTECTED] Sent: July 13, 2003 23:36 To: [EMAIL PROTECTED] Subject: RE: New trojan turns home PCs into porno Web site hosts I have a question, since I don't know as much

RE: Monitoring the network: Routers

2003-07-16 Thread Grabowski, David
-Original Message- From: Nick Benigno [mailto:[EMAIL PROTECTED] Sent: Monday, July 14, 2003 3:10 PM To: [EMAIL PROTECTED] Subject: Monitoring the network: Routers I am interesting in getting some ideas as to which packages are out there and recommended to monitor a router.

RE: Monitoring the network: Routers

2003-07-16 Thread David Gillett
Because MRTG (by default?) only samples the SNMP data every 5 MINUTES, and even then it's hard to read the graph until it has aged a little, about another 10 minutes. David Gillett -Original Message- From: Nathan [mailto:[EMAIL PROTECTED] Sent: July 16, 2003 05:46 To: 'Richard

RE: Deploying Microsoft patches

2003-07-15 Thread David Moisan
. You'll need to change an item in your group policy so that the update clients go to your server instead of MS. It's off topic, but I recommend reading the SUS Deployment Guide (from the MS web site) to get it working with your clients. Take care, Dave David Moisan, N1KGH ARES/SKYWARN

FW: Deploying Microsoft patches

2003-07-14 Thread McCleskey, David
There are third party programs but many of them are very expensive. The benefit is the third party can help update microsoft patches along with a long list of other popular programs. Here is a link to one. http://www.patchlink.com David -Original Message- From: Jack Foust [mailto

RE: Deploying Microsoft patches

2003-07-14 Thread David Moisan
At 11:50 AM 7/11/2003 -0700, Kevin Ashurst wrote: You can't use a domain controller (DC) as a SUS server, but you can use a DC as a client. The latest version of SUS (SP1) will run on a DC. Take care, Dave David Moisan, N1KGH ARES/SKYWARN [EMAIL PROTECTED] Invisible Disability

RE: New trojan turns home PCs into porno Web site hosts

2003-07-14 Thread David Vertie
the ISPs of the home IPs being used and see if they will help out. That is about all that I can add to ge's post. David From: ge [EMAIL PROTECTED] To: '[EMAIL PROTECTED] COM' [EMAIL PROTECTED] Subject: RE: New trojan turns home PCs into porno Web site hosts Date: Fri, 11 Jul 2003 22:05:33 -0700

Re: HTTPS - How hard to decrypt?

2003-07-10 Thread David Vertie
I highly doubt sometimes that an attacker would waste time trying to decrypt an HTTPS stream, it would be better just to attack the databases that hold all this login information, socially engineer it out of a person, install a keylogger while nobody is looking, or shoulder surf somebody who

RE: Wireless Networking

2003-07-09 Thread David J. Jackson
Ahno sorry. If I can figure out your MAC address on the network which takes about 3 minutes, I can spoof your MAC and I'm now allowed on your AP. Keep in mind like everyone else saidWEP can easily be cracked...and MAC filtering is even easier to blow by. -Original Message-

RE: Mail relay

2003-07-09 Thread David Gillett
servers on the list. Well-run lists include directions for how to get your server taken off the list, and these will usually include similar links to instructions for limiting relaying. David Gillett -Original Message- From: JasonTay [mailto:[EMAIL PROTECTED] Sent: July 8, 2003 19:20

RE: Questions about 192.168

2003-07-08 Thread David Gillett
-Original Message- From: Jim [mailto:[EMAIL PROTECTED] Sent: July 7, 2003 17:27 To: [EMAIL PROTECTED] Subject: Questions about 192.168 Hi, I've been following some of the conversations about 192.168 networks, and tried some experimentation, and came up with a few questions:

Re: Ten least secure programs

2003-07-07 Thread David
to go on to another one that works better.) David --- Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts! The Gartner Group just put Neoteris in the top of its Magic Quadrant, while InStat has confirmed

Re: Data erasing tool

2003-07-07 Thread David
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Sent: Thursday, July 03, 2003 8:31 AM We are looking for a tool that will erase all data beyond recovery from a hard drive. We going to get rid of few computers and do not want data to get into anyone's hand. Both freeware and commercial

Re: Ten least secure programs

2003-07-07 Thread David
On Wed, 02 Jul 2003, Tim Greer wrote: FLAME WAR SNIPPED My whole point was that this top ten list was highly subjective and that insecure programs were really in the hands of the beholder /*again my opinion*/. In a way, that's correct. However, in other ways it's not anything that

Least secure OSes was Re: Ten least secure programs

2003-07-07 Thread David
. David --- Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts! The Gartner Group just put Neoteris in the top of its Magic Quadrant, while InStat has confirmed Neoteris as the leader in marketshare

Re: Ten least secure programs

2003-07-07 Thread David
On Sun, 06 Jul 2003, David Corking wrote: On Wed, 02 Jul 2003, Chris Berry wrote: From: Roger A. Grimes [EMAIL PROTECTED] It won't load Flash, RealPlayer, Windows Media Player, or most other plug-ins or Helper Applications. Good, 95% of these have no legitimate business

RE: HPing?

2003-07-04 Thread David Gillett
. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features. (I assume it's inspired *BY* ping, and sends files through covert channels) David Gillett -Original Message- From: [EMAIL

Re: Data erasing tool

2003-07-04 Thread David Vertie
other people on this..just hope you make a good selection :) David From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: Data erasing tool Date: Thu, 3 Jul 2003 08:31:01 -0400 We are looking for a tool that will erase all data beyond recovery from a hard drive. We going to get rid of few

Re: Ten least secure programs

2003-07-04 Thread David Moisan
before writing such nonsense. Root login was disabled out of the box when I put openssh on my Debian box a year or so ago. David Moisan, N1KGH ARES/SKYWARN [EMAIL PROTECTED] Invisible Disability: http://www.davidmoisan.org/invisible_disability.html ATS-909 FAQ: http

RE: Secure Media Destruction

2003-07-04 Thread David Vertie
probably better to do a DoD spec overwrite :) (3x overwrite) David From: Brad Bemis [EMAIL PROTECTED] To: Stephen Eaton [EMAIL PROTECTED],[EMAIL PROTECTED] Subject: RE: Secure Media Destruction Date: Thu, 3 Jul 2003 14:59:45 -0700 -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 That largely

RE: Port scanning question

2003-07-03 Thread David Gillett
You should be able to see this in your firewall logs -- a series of blocked connection attempts to unused ports on your servers, usually followed by a similar set of attempts on the next server address. David Gillett -Original Message- From: Thom Larner [mailto:[EMAIL PROTECTED

Re: Netcat (NC) Secure Remote Connections via authenication

2003-07-03 Thread David
On Tue, 01 Jul 2003, Devdas Bhagat wrote: On 27/06/03 18:01 -0500, Dagmar d'Surreal wrote: snip I have a requirement were I need to connect to a remote machine and get a command prompt. We all know how to do this via netcat by setting up a listening port. My concern is that I do not

Re: Ten least secure programs

2003-07-03 Thread David Corking
a strong opinion about that. David --- Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts! The Gartner Group just put Neoteris in the top of its Magic Quadrant, while InStat has confirmed Neoteris

RE: Ten least secure programs

2003-07-03 Thread David Gillett
. David Gillett --- Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts! The Gartner Group just put Neoteris in the top of its Magic Quadrant, while InStat has confirmed Neoteris as the leader in marketshare

Re: Security issue in Windows 2000?

2003-07-03 Thread David Corking
Hi hong! On Wed, 02 Jul 2003, hong li wrote: If you use the same password for the local administrator on workstations as all other servers's local administrator, (even domain administrator),the local administrator can gain full access to any servers without asking domain info if you

RE: IP address forging

2003-07-03 Thread David Gillett
not as trivial for ISPs as it sounds. Many also carry traffic for third parties, and would be in big trouble if they accidentally blocked that) David Gillett -Original Message- From: Hanuska Ivo [mailto:[EMAIL PROTECTED] Sent: July 1, 2003 23:27 To: [EMAIL PROTECTED] Subject: IP address

Re: Ten least secure programs

2003-07-02 Thread David Nichols
One question, end-user type programs or server programs as well? And how about more secure alternatives? I'd have to add BIND rather high up on the list, with djbdns as a logical alternative. It's smaller, less resource intensive, and easier to setup. (See

Re: Antivirus on SQUID

2003-06-30 Thread David Kaluza
Hi, you can find a free linux AV for personal use on http://www.hbedv.com But I don't realy know howto use it with squid. If you know more post it. Regrads, David Kaluza On Fri, 2003-06-27 at 10:03, Nhadie wrote: Hi, I am running Squid and would like to know some ways i can intergrate

RE: AW: AW: security-basics Digest 18 Jun 2003 22:09:15 -0000 Issue 6 18

2003-06-27 Thread David Gillett
of the traffic -- not necessarily the one you've chosen to traceroute. On the other hand, diversion might be mistaken for normal asymmetry) David Gillett -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Sent: June 26, 2003 10:08 To: [EMAIL PROTECTED] Subject: Re: AW

Re: Antivirus on SQUID

2003-06-27 Thread David Ziggy Lubowa
an hour, with no client, server changes, or ongoing maintenance. Visit us at: http://www.neoteris.com/promos/sf-6-9.htm -- -- -- David Ziggy Lubowa Network Engineer One2net --- A Network

Re: AW: security-basics Digest 18 Jun 2003 22:09:15 -0000 Issue 618

2003-06-26 Thread David Wallraff
why is it harder to sniff over a switced network? i understand it's becasue of the switch (natch), but what makes it more difficult? dave On Wed, 25 Jun 2003, Meidinger Christopher wrote: Hello Hilal, Yes, there are many tools that will do that. dsniff, ettercap, ethereal and MANY others

RE: AW: security-basics Digest 18 Jun 2003 22:09:15 -0000 Issue 618

2003-06-26 Thread David Gillett
such as ARP poisoning. All are exceptions to the *normal* in the previous paragraph. David Gillett -Original Message- From: David Wallraff [mailto:[EMAIL PROTECTED] Sent: June 25, 2003 08:33 To: Meidinger Christopher Cc: 'Hilal Hussein'; [EMAIL PROTECTED] Com (E-Mail) Subject: Re: AW

Re: AW: AW: security-basics Digest 18 Jun 2003 22:09:15 -0000 Issue6 18

2003-06-26 Thread David Wallraff
please email me and the list with corrections. badenIT GmbH System Support Workstation Chris Meidinger Tullastrasse 70 79108 Freiburg -Ursprüngliche Nachricht- Von: David Wallraff [mailto:[EMAIL PROTECTED] Gesendet: Wednesday, June 25, 2003 5:33 PM An: Meidinger Christopher Cc

RE: NTFS Permissions (was Share Permissions)

2003-06-25 Thread David Gillett
in order to give enough. David Gillett -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Sent: June 24, 2003 13:04 To: [EMAIL PROTECTED] Subject: RE: NTFS Permissions (was Share Permissions) This is interesting because our system (NT 4.0) has been set up exactly

RE: Must read for everyone

2003-06-25 Thread David Gillett
As a general security policy, I do not visit random URLs just because somebody thinks I should. If you want to send me a URL to something you think I should see, please include *at least* a sentence or two explaining what I should expect to see when I get there. David Gillett -Original

RE: DNS Records

2003-06-24 Thread David Gillett
is in the DNS server software config, not the firewall. David Gillett -Original Message- From: Charlie Winckless [mailto:[EMAIL PROTECTED] Sent: June 18, 2003 16:27 To: [EMAIL PROTECTED] Subject: RE: DNS Records Zone transfers happen on 53/TCP, rather than the 53/UDP that is used

RE: Wirless LAN

2003-06-24 Thread David Gillett
, and expect your core inter-VLAN routing access lists to do all policy enforcement... [I'd prefer not to name names, but watch for boxes that boast how many VLANs they allow. Oh, and note that on some boxes, roaming *may* require proprietary APs made by the switch manufacturer.] David Gillett

RE: about access-list location?

2003-06-24 Thread David Gillett
destination means I've already spent CPU to route packets that I'm now going to consider throwing away] David Gillett --- Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts! The Gartner Group just put

FW: Central Win2000 auditing logs

2003-06-19 Thread David Olivier
Well if your looking to backup event logs to a central database you can give the program Event Archiver Enterprise a try, I don't have the url, but I'm sure you can find it on www.download.com -Original Message- From: Stephen Gay [mailto:[EMAIL PROTECTED] Sent: 19 June 2003 01:25 To:

RE: MS Service Packs

2003-06-19 Thread David Olivier
Well as far as I know, once you visit windows update, it will only have you install patches that you don't have installed. So I assume once installing SP3 and doing Windows Update, you should have everything. -Original Message- From: phil groner [mailto:[EMAIL PROTECTED] Sent: 19 June

RE: Digital Evidence Question - What is an effective Windows hard -disk search tool?

2003-06-19 Thread David Olivier
You can also just make an NTFS boot disk, and then try and copy a new boot.ini over. If your looking for a program to make an NTFS boot disk just search on google for NTFS Boot Disk :p -Original Message- From: Dana Epp [mailto:[EMAIL PROTECTED] Sent: 19 June 2003 02:33 To: Gene LeDuc;

RE: sshd for windows

2003-06-17 Thread David Ellis
Use openssh with Cygwin. Works great and it is free!!! -Original Message- From: Derek Perry [mailto:[EMAIL PROTECTED] Sent: Monday, June 16, 2003 9:30 PM To: [EMAIL PROTECTED] Is there a sshd for Windows (W2K Server is the actual OS) that is freely available? I am doing a senior design

Mahogany Row Questions

2003-06-17 Thread David Nichols
blocked by my firewall. (Linux / iptables) 2) Does anyone know if I can write a rule chain in IP tables that will allow me to pass the packet through but still log its presence? Thanks in Advance David Nichols --- Evaluating SSL

Re: sshd for windows

2003-06-17 Thread David Fetter
why, and see how you can get plug-n-play secure remote access in about an hour, with no client, server changes, or ongoing maintenance. Visit us at: http://www.neoteris.com/promos/sf-6-9.htm -- David M

RE: Netcraft shows ministryofsound is running IIS 5.0 on LINUX ???

2003-06-16 Thread McCleskey, David
http://uptime.netcraft.com/up/accuracy.html#impossible this faq should answer that. :) -Original Message- From: Rohit [mailto:[EMAIL PROTECTED] Sent: Monday, June 16, 2003 10:28 AM To: [EMAIL PROTECTED] Subject: Netcraft shows ministryofsound is running IIS 5.0 on LINUX ???

Re: Public IP information

2003-06-12 Thread David M. Fetter
, is well known for their computer crime task force (mainly due to their carnivore project). ;-) Dave -- David M. Fetter - http://www.fetterconsulting.com/ The world is full of power and energy and a person can go far by just skimming off a tiny bit of it. Neal Stephenson - Snow Crash

RE: Firewall and DMZ

2003-06-12 Thread David Gillett
. Explaining to management why you need three boxes where one can do the job is left as a career-limiting exercise. David Gillett -Original Message- From: Aaron Fisher [mailto:[EMAIL PROTECTED] Sent: June 11, 2003 23:38 To: [EMAIL PROTECTED] Subject: RE:Firewall and DMZ After

  1   2   3   4   >