you can't determine conclusively whether a port is 'open' from a remote
location. what actions does your CPU take when bits arrive on an exposed
network interface? If you don't know, then you can't tell whether a port is
open. judging a port to be 'open' because it responds to the TCP 3-way
handsha
update and the client-side code that talks to
windowsupdate.com are still present when SUS is used.
Jason Coombs
[EMAIL PROTECTED]
-Original Message-
From: Jed Needle [mailto:[EMAIL PROTECTED]
Sent: Tuesday, March 11, 2003 12:24 PM
To: [EMAIL PROTECTED]
Subject: RE: Critical/Security
can't expect an
infosec novice to do security work and get it right the first time."
-Original Message-----
From: Jason Coombs [mailto:[EMAIL PROTECTED]]
Sent: Friday, November 15, 2002 10:11 AM
To: RD D; [EMAIL PROTECTED]
Subject: RE: PATRIOT Act IT Security guidelines
My bank recently i
rate their patriotism, and the way they
finance it.
Sincerely,
Jason Coombs
[EMAIL PROTECTED]
-Original Message-
From: RD D [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, November 12, 2002 8:15 AM
To: [EMAIL PROTECTED]
Subject: PATRIOT Act IT Security guidelines
Hello All --
I have been resea
> That prohibits government agencies from requiring that a person give
his/her
> SSN as a condition of receiving the agency's services
The U.S. Supreme Court rejected this assertion in BOWEN v. ROY, 476 U.S. 693
(1986)
-Original Message-
From: Griff Palmer [mailto:gpalmer@;palmermania.com
serve to "rob the spirit" of his daughter and
prevent her from attaining greater spiritual power.'
http://caselaw.lp.findlaw.com/cgi-bin/getcase.pl?court=us&vol=476&invol=693
If you listen carefully, you can almost hear your spirit being robbed every
moment of every day by the m
For #1 you make a large assumption: that routes between you and the attacker
have all implemented source address filtering of RFC 1918 local network
addresses. Chances are they have not. See
http://online.securityfocus.com/archive/1/287129
Also, what about this:
From: Graham, Randy (RAW) [mailto:
ses represent a security risk.
Individual nodes that don't route traffic for a LAN over the link should
block all traffic to and from these addresses.
Sincerely,
Jason Coombs
[EMAIL PROTECTED]
-Original Message-
From: Burton M. Strauss III [mailto:[EMAIL PROTECTED]]
Sent: Monday, July
Aloha,
I suggest you start with a review of the basics. Read about RSA and DSS.
Here's a link to DSS:
Digital Signature Standard
http://csrc.nist.gov/publications/fips/fips186-2/fips186-2.pdf
Sincerely,
Jason Coombs
[EMAIL PROTECTED]
-Original Message-
From: [EMAIL PROT
rensically makes a big difference. What
forensics tools are you using? How do you know the tool has not
itself been compromised? Perhaps more importantly, how do you
know, and how can you PROVE, that the tool has no open ports?
Sincerely,
Jason Coombs
[EMAIL PROTECTED]
-Original Message-
F
olicited packets from the outside world, connected to
another network or subnet protected by a firewall configured to deny all
inbound traffic except for TCP packets that pertain to stateful sessions
initiated by hosts inside the protected LAN.
Sincerely,
Jason Coombs
[EMAIL PROTECTED]
-Original
- argument seem more informed
than the pro- argument. The debate about "strong"
encryption must include a discussion of what
"strong" means, for strong is relative and even
subjective.
Sincerely,
Jason Coombs
[EMAIL PROTECTED]
-Original Message-
From: Jay D. Dy
bility to
eavesdrop or masquerade so there is no damage done.
Aloha & Mahalo,
Jason Coombs
[EMAIL PROTECTED]
-Original Message-
From: Jason Coombs [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, April 24, 2002 9:56 AM
To: Thad Horak
Cc: [EMAIL PROTECTED]
Subject: RE: Session Hijacking
lays
the SSL-secured MITM.
Good luck. We all need it.
Jason Coombs
[EMAIL PROTECTED]
-Original Message-
From: Thad Horak [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, April 23, 2002 1:08 PM
To: [EMAIL PROTECTED]
Subject: Session Hijacking
All,
A peer recently told me that the a netwo
14 matches
Mail list logo