NOPE, sorry, but, most stores do not allow the return of software, where in
your example, i have already purchased the software, and agreed to the terms
and conditions on the back of that receipt you metnioned, (which, of course,
i only get the receipt AFTER i complete the transaction, at which po
take a look at the MS knowledgebase articles, there has been known issues
with win2k pro connecting to nt4 servers, and i seem to recall a few of
those issues had to do with account lockouts.
Don
> >-Original Message-
> >From: Lists [mailto:[EMAIL PROTECTED]]
> >Sent: Monday, June 24, 2
need more info, first, do you run a dhcp server, if so, you can set rules
for which it follows for assigning ip addresses, in some cases you can
require specific MAC addresses be assigned specific IP's, all others would
be denied, then, when just any old laptop connects to network it doesnt get
an
the snort "dropping" of packets, is meant in the sense that snort does no
further inspecting of the packet, not literally drop it from the system, its
just allowed to continue on thru snorts little hallway without further
interruption by any more rules or inspections
-Original Message-
Fr
I agree, now lets have a cup of coffee
Don
-Original Message-
From: Jay D. Dyson [mailto:[EMAIL PROTECTED]]
Sent: Thursday, May 30, 2002 1:15 PM
To: Security-Basics List
Subject: RE: Reacting to IDS alerts
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Thu, 30 May 2002, Matthew F.
dont install it 3 times, install ONE time, and all those programs work from
it.
steps
install WinPcap
install Snort -skip the section of any instructions that say install winpcap
install Ethereal -skip the section of any instructions that say install
winpcap
install nmapnt -skip the section of any
this was an explanation i sent someone in an email a while back, they never called me
saying it didn't work so hopefully
that is good news. so i was kind of explaining step by step sorta
one-way receive only ehternet cable, this is a good way to make a cable, the reason
the pins 1/2 from
hub p
1. I wouldn't trust yahoo mail for security, but that's up to you
2. I guess it depends on his positioning between yourself and yahoo, if he can sniff
traffic traversing the network you
are on or not
3. Doesn't matter if you never get it. otherwise, exactly what would you encrypt, the
fact that
if anyone thinks this should go to another list, feel free, i didn't want to
x-post,
http:// www dot msnbc dot com/news/660096.asp?cp1=1
and of course remove the spaces and replace the word dot with a period for
the complete link
I thought this might be of interest to these groups,
Aris analyser, dshield
with one of those i forget which at the mo,
if there are others whom have posted the same ip source it has a little box
in the report area that states, ""reported by x address"" x being number of
other sources reporting the same..
Don
-Original Message-
From: Jaso
for all of you that suggested ssh/ssl for outlook/email secure passwords, i
can find all of the sites mentioned, and browsed thru them, yet i can't seem
to find a good set of documentation to use for an all windows environments,
2k server for mail, and 2k workstations. any recommendations out here
actually, your partly correct, what surf control does is, when it see's the
ip address x.x.x.x requesting page from site xxx, it doesn't actually block
it, it interjects, and replies to the workstation before the actual site
does, this works pretty well, and since workstation thinks it already got
you need to put a hub between the switch and router, just any old hub will
do fine, plug the switch into the hub, then uplink the hub to the router,
plug your surf control machine into the hub as well. it can't see anything
on the switch except it's own port, which is why it's not working. by
forc
this is the only thing i've found so far for windows, if you find anything
else let me know i'd like other options myself. not sure if you can use this
to report to unix tho
I placed a space after the www. below to break the link
http://www. winsyslog.com/en/
-Original Message-
From: Al
OK, i've taken a little advice from each response i got, i now have the Kiwi
syslog server installed on a win2kPro system, and running/logging, I started
logging on the router and added the word log to the end of each line i
wanted to log events from. I set
logging trap debugging
logging my.ip.ad
I'd like to log all of my Access lists in my cisco 2600 series router, I
currently am blocking most of the current active attacks on the internet and
found that it has logged around 300,000 rejections on the codered worm
alone, however it is not actually logging those, it just performs the action
16 matches
Mail list logo