does anyone have a recommendation for open source network
stress tool, specifically on a cisco switch? tia
--
gyoo [at] attbi [dot] com
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.0 (GNU/Linux)
JM wrote:
As the subject says, this is what I have got to do.
But does anyone have any thoughts to share, on how I can
successfully convince my management that the spend on a
vulnerability scanner is worthwhile.
Thanks in advance
JM
first thing i had done was get numerous (nessus, saint,
David Gillett wrote:
I use MRTG for the boxes I have working/usable SNMP
implementations on.
It doesn't handle outages/crashes very well. it just
treats the last successfully retrieved data volume as
continuing until new data becomes available.
There are some boxes I need to monitor, on
Craig Brauckmiller wrote:
Hello all. I'm looking for a log analyzer for Ethereal. I downloaded the
Win32 version of Ethereal and want to run some basic analysis on my
network traffic. I have Google'd for some utils and tried SawMill but it
doesn't seem to recognize the tcpdump log format
Chris Berry wrote:
Prior to my taking over here the previous admin had not bothered to
write any policy. To try and increase professionalism and to get up to
speed with HIPPA compliance I'm putting together a policy and
proceedures manual. Here is a list of some of the documents I'm going
to
Duane H. Hesser wrote:
On 19-Feb-2003 John Brightwell wrote:
Are there any sites out there with the facts and
figures about internal exploits and cautionary tales
about disgruntled employees or IT savvy nighttime cleaners?
It's hard to find such information, since companies are reluctant
to
Peet Grobler wrote:
I've been wondering about this for a while now...
Everybody knows NFS is insecure. Right. So no-one uses it. Why not simply modify NFS to use encryption? Why not?
Not tunneling, modify the source to either (a) establish ssl connections, or (b)
manually encrypt all traffic (I
Chris Berry wrote:
From: Jason Hastain [EMAIL PROTECTED]
I have a few clients who are doctors running small practices. They have
small LAN's and DSL connectinos behind a simple NAT router/firewall in
one
case and persoanl FW's in the other (unfortunatly not my decision in
either
case).
Each
Naman Latif wrote:
Hi,
I am in the process of setting up and IDS system using Linux\Snort in
DMZ. A couple of questions regarding this
1. Is it a safe practice to have access to this system from Inside
Network (for retrieving log files etc) from 1-2 Stations ? Ofcourse IDS
won't have access to
Sakhartov, Eliot wrote:
There appears to be some confusion ( I read my e-mail and got confused), let me clarify.
Basically I have 21 people on 7 seperate machines, and at any one time any of the 21 people will need to gain access to their e-mail, with our without re-logging in. So I need to
tony tony wrote:
Hi,
Anybody know of a good IDS Managed Service Organization that they could
recommend to me? Our current security staff is just too small and overwelmed
with other security projects to install/monitor/followup on IDS findings. We
also lack the technical expertise to do this.
encryptinator wrote:
I am looking for a 'template' to track System outages
so management can see VPN, network, and system uptime
as well as problem tracking. If there is a problem
that keeps happening all time, you can see a pattern
develop.
Any freeware/software ideas???
Thanks in advance.
Richard H. Cotterell wrote:
Ref: David Simcik [EMAIL PROTECTED]'s
message dated 08 January 2003, 9:51 hours.
Hiya,
Anyone know of a tool that can map TCP/UDP ports to a specific process in
Windows (NT/2000)? My apologies if this is a naive question.
Do a *google* search for NPORT and
David Andersson wrote:
Greetings,
We're experiencing an upsurge in computer forensics queries.
Can anyone suggest any links to relevant information, certifications, etc.?
Dave Andersson
MCT, CIW Security Analyst, CCNA
http://www.giac.org/subject_certs.php#GCFA
--
gyoo [at] attbi [dot] com
You may want to search the list... there was alot of comparison done
between N/H-IDS'
[EMAIL PROTECTED] wrote:
Hi everyone!!!, I'm an EDP auditor and I want to know some commentaries
about the use of Snort IDS...I'de like to know if anyone recommend it and
if it's a good choice to install in
15 matches
Mail list logo