This opens a huge risk for to viruses as it circumvents your mail server AV.
Even though Hotmail, etc. use AV, is it worth the loss of control and
increased risk?
-Original Message-
From: Innes Fisher [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, June 12, 2002 2:00 PM
To: [EMAIL PROTECTED]
Only have the modem turned on or connected to the phone lines when this
person is going to call in. Then, have it do a callback.
-Original Message-
From: Chris Berry [mailto:[EMAIL PROTECTED]]
Sent: Friday, June 07, 2002 1:08 PM
To: [EMAIL PROTECTED]
Subject: Modem Security
I thin
Look up http://www.bionetrix.com
Contact me directly if you want more info... I have very good connections
there.
-Original Message-
From: ABRAHAM AJI [mailto:[EMAIL PROTECTED]]
Sent: Sunday, May 19, 2002 1:54 PM
To: [EMAIL PROTECTED]
Subject: Biometrics used for Authentication
Hello,
You should look in the the Graham Leach Bliley Act (GLBA) -- it addresses
banking security and privacy issues
-Original Message-
From: David Cullen [mailto:[EMAIL PROTECTED]]
Sent: Monday, May 06, 2002 1:42 PM
To: Sumit Dhar; [EMAIL PROTECTED]
Subject: RE: Security Documentation related t
MS says this is beta-ware. These are all known issues. Some of the hotfixes
need to be reapplied because they have changed, others are just MSBA being
beta-ware.
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Friday, April 26, 2002 2:00 PM
To: [EMAIL PROTECTED
Start here...
http://www.bsa.org/usa/freetools/
-Original Message-
From: Tom Freeman [mailto:[EMAIL PROTECTED]]
Sent: Thursday, April 18, 2002 10:47 AM
To: '[EMAIL PROTECTED]'
Subject: Software Licensing Compliance
Hi all,
I am looking for something to monitor and or audit software
In your TCP/IP setting in Win2K, go to Advanced then Options, then TCP/IP
Filtering... you can open/close ports there. Close everything and open only
what you need.
However, you should really be doing this with a firewall in front of your
servers.
-Original Message-
From: [EMAIL PROTECTE
I'd stay away from Baltimore -- financially unstable.
Have you looked at ZixIt or Private Express?
-Original Message-
From: Habulin, Daniel (Worldcom) [mailto:[EMAIL PROTECTED]]
Sent: Monday, April 01, 2002 10:33 PM
To: '[EMAIL PROTECTED]'
Subject: Alternative to PGP solutions
Hi,
Now
The solution that I am intimately familiar with doesn't use the MSGina as
you describe. In addition, the domain password is not stored locally, but on
an authentication server. It is encrypted as you say. In addition, the
domain password can be controlled by the authentication server and is
random
I spent the last couple of years working for an advanced authentication
infrastructure company that had biometrics as part of the solution...
There are multiple options in biometrics: facial, voice, fingerprint and
iris are the most cost effective solutions AND non intrusive. Retinal scans
are ex
>From the NAI/PGP website.
Network Associates recently announced the closure of PGP Security business
unit and the integration of some of its product into other business units.
PGP encryption is retained and continues to be the encryption engine within
McAfee E-Business Server product line. PGP's
More on this...
These PGP Security products continue to be developed and sold by McAfee:
PGP E-Business Server is now McAfee E-Business Server
PGP E-Business Server Point-2-Point is now McAfee E-Business Server Partner
Edition
PGP E-Business Server for OS/390 is now McAfee E-Business Server for O
Clint,
You're approaching this from the wrong angle... Don't look at what ports you
should block, look at the ports you need open. Open only those that are
necessary. Close everything else.
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf
Of Clint Goodwin
Se
Maybe you need to tighten your firewall all the way! If all these ports are
open, you are vulnerable. Close off all ports, and open what you need from a
business standpoint - that will vary by what your organization does and what
internet access you allow. But it sounds like you are way to generou
You might find something here:
http://www.security.kirion.net/securitypolicy/
http://www.network-and-it-security-policies.com/
http://www.brown.edu/Research/Unix_Admin/cuisp/
http://iatservices.missouri.edu/security/
http://www.utoronto.ca/security/policies.html
http://irm.cit.nih.gov/security/se
For this to work, you must be logged in as the administrator.
-Original Message-
From: leon [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, March 05, 2002 11:30 AM
To: [EMAIL PROTECTED]
Subject: scary site
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
http://www.liquidwd.freeserve.co.uk/
16 matches
Mail list logo