RE: comcast blocking ipsec traffic?

2003-08-14 Thread Jennifer Fountain
Last I heard (heard from comcast) is that they do not block vpn traffic but do monitor. If you do use it all the time, they request that you purchase the business service.Not sure what they will do if you refuse. -Original Message- From: David Gillett [mailto:[EMAIL PROTECTED] Sent:

RE: Data erasing tool

2003-07-07 Thread Jennifer Fountain
I have been evaluating a lot of data erasing tools (as of late) because we are sending servers and workstations back to our leasing company. One that I have been particularly looking into is Eraser: http://sourceforge.net/project/showfiles.php?group_id=37015. It seems to do a good job but I am

RE: Anti-Keylogger

2003-06-24 Thread Jennifer Fountain
Correction: Yes, I was playing around with it. I have been testing a lot of programs (pest control, one) and using klogger as a my test tool. Pest control didn't pick up the presense of klogger. :( I emailed pest control on this. Anti-keylogger doesn't detect the presense - It actually does

RE: Anti-Keylogger

2003-06-24 Thread Jennifer Fountain
Yes, I was playing around with it. I have been testing a lot of programs (pest control, one) and using klogger as a my test tool. Pest control didn't pick up the presense of klogger. :( I emailed pest control on this. Anti-keylogger doesn't detect the presense, it just stops the information

RE: Share Permissions

2003-06-09 Thread Jennifer Fountain
Let me get a better understanding as to what you do... So I will explain how I do it - I set the share permissions to full for domain users (not everyone ), add a local group to the server, add a domain global group and add the domain global group to the local group. I, then, add the local group

Site audit template

2003-05-27 Thread Jennifer Fountain
I have been asked to do a site audit for several of our branch offices (physical/system security). I am going to create a checklist template/report to do this easily (and for other admins) but I hate to reinvent the wheel if templates like these already exist. Does anyone know where I can find

RE: Website of defaced websites

2003-03-29 Thread Jennifer Fountain
I know zone-h has some: http://www.zone-h.com/en/defacements Thank you Jenn Fountain -Original Message- From: Jacob [mailto:[EMAIL PROTECTED] Sent: Thursday, March 27, 2003 6:10 PM To: [EMAIL PROTECTED] Subject: Website of defaced websites Anybody remember the website that lists

RE: Outlook web access

2003-03-03 Thread Jennifer Fountain
I don't know of any utility that you could use to do this; however, maybe you could use a reverse proxy. ISA (although it is $1000 or so for the license. There are open source proxies but I haven't tested them) works well for us. You could configure additional security on the ISA server or

Question about dmz security

2003-02-14 Thread Jennifer Fountain
I need an opinion on a current design implementation in place. We have an ftp server sitting in our dmz. This box has two nics - one is plugged into the dmz hub and one is plugged into our network. I think this is a security risk and we should just allow internal users access to the box via