Re: hidden processes

2003-07-31 Thread Erik Vincent
You can try to use the lsof command and check between your ps output. You cant also check in your /proc filesystem. If you have another server with the same OS version, you can try to do an md5sum on your ps and netstat command. This will show you if those command have been modify by the hacker...

DMZ, Tape Backup and Security

2003-06-18 Thread Erik Vincent
Hello to all, I would like to have comment on how to setup a backup strategie regarding a DMZ. Scenario 1: Put a tape unit/software in the DMZ and another one on the LAN to have everything separate. Plus side: No hole in DMZ Firewall Down Side: Cost (2 unit/software), 2 sofware to manage Senar

Re: Firewall and DMZ topology

2003-06-10 Thread Erik Vincent
a read-only media (read LRP). In my point of view, it is a good setup...(On course if you have the money to afford CISCO or other thing may be different...) Zach Crowell wrote: Erik Vincent wrote: I think there is a major difference between: 1:internet --> Outer Firew

Re: Firewall and DMZ topology

2003-06-10 Thread Erik Vincent
Lets put it in ASCII. Internet <-> Firewall <-> LAN <-> DMZ (MAIL server) If the MAIL server is in the DMZ. You still will have the same problem. If the MAIL server is crack, since your LAN user need access to your MAIL server in the DMZ, password will stil

Re: Firewall and DMZ topology

2003-06-10 Thread Erik Vincent
I think there is a major difference between: 1:internet --> Outer Firewall --> DMZ --> Inner Firewall --> LAN If your Outer Firewall is crack, only the DMZ computer will be unprotected but the LAN portion still protected. I

Re: Firewall and DMZ topology

2003-06-09 Thread Erik Vincent
So according to your answer, Internet | -->| Firewall |-->| DMZ |-->| Firewall |-->| Internal network Should be a more secure option. Is it good enough for a corporate LAN? Christopher Ingram wrote: On Saturday, June 7, 2003, at 10:06 AM, William J. Burgos wrote: Greetings list, I wo