a look at the ports which are open on your OS. Compare the
open ports to the needed ones and close the ones which you don't need. So
the danger of getting penetrated is more less.
Sincerely
Dominik Birk
--
http://www.code-foundation.de
217.229.69.207 - - [14/Oct/2001:02:29:41 +0200] GET
I think, the main problem is, that a CSS-Attack contains HTML and
Javascipt. So it is code, inside the body. Do you see my point? :-)) It is
very hard to explain. I mean, the www consists of HTML pages. All PHP and
CGI scripts disgorge HTML Pages. And so you cannot filter these syntax
because
At 01:46 280202 +0200, LS wrote:
Hi all,
Good morning Eli
I was sent the following address:
http://wwwsecurity7chvu/
When entering, it claims that you are exposed and tracked and a lot of
information
is stored on your computer (dohaltho i dont keep names on it etc)
What caught my attention
At 22:00 23.02.02 +, [EMAIL PROTECTED] wrote:
My users want me to to give them POP3 access via
the firewall. We have an Exchange Server runnig with
a Checkpoint Firewall. Are there any security issues
that I need to watch out
I'm not an expert in Checkpoint Firewalls, but the problem is,
At 17:34 21.02.02 +0200, Bassam ALHUSSEIN wrote:
Hello all ...
Hello Bassam
Every time I make a dial-up connection to the internet I see an unknown (for
me) IP address that I am connected on port 80, in the out put of
netstat -an on a win98SE box.
The thing that I don't understand is that this
At 07:38 21.02.02 -0500, [EMAIL PROTECTED] wrote:
What sources would you suggest for getting basic info on encryption? (How
it works, software sources, best practices in business settings, etc.)
First I would try to consult a search engine like www.google.com or so.
After that I would consult a