Last I heard (heard from comcast) is that they do not block vpn traffic
but do monitor. If you do use it all the time, they request that you
purchase the business service.Not sure what they will do if you
refuse.
-Original Message-
From: David Gillett [mailto:[EMAIL PROTECTED]
Sent:
I have been evaluating a lot of data erasing tools (as of late) because
we are sending servers and workstations back to our leasing company.
One that I have been particularly looking into is Eraser:
http://sourceforge.net/project/showfiles.php?group_id=37015.
It seems to do a good job but I am
Correction: Yes, I was playing around with it. I have been testing a
lot of programs (pest control, one) and using klogger as a my test tool.
Pest control didn't pick up the presense of klogger. :( I emailed pest
control on this. Anti-keylogger doesn't detect the presense - It
actually does
Yes, I was playing around with it. I have been testing a lot of
programs (pest control, one) and using klogger as a my test tool. Pest
control didn't pick up the presense of klogger. :( I emailed pest
control on this. Anti-keylogger doesn't detect the presense, it just
stops the information
Let me get a better understanding as to what you do... So I will explain
how I do it - I set the share permissions to full for domain users
(not everyone ), add a local group to the server, add a domain global
group and add the domain global group to the local group. I, then, add
the local group
I have been asked to do a site audit for several of our branch offices
(physical/system security). I am going to create a checklist
template/report to do this easily (and for other admins) but I hate to
reinvent the wheel if templates like these already exist. Does anyone
know where I can find
I know zone-h has some: http://www.zone-h.com/en/defacements
Thank you
Jenn Fountain
-Original Message-
From: Jacob [mailto:[EMAIL PROTECTED]
Sent: Thursday, March 27, 2003 6:10 PM
To: [EMAIL PROTECTED]
Subject: Website of defaced websites
Anybody remember the website that lists
I don't know of any utility that you could use to do this; however, maybe you could
use a reverse proxy. ISA (although it is $1000 or so for the license. There are
open source proxies but I haven't tested them) works well for us. You could configure
additional security on the ISA server or
I need an opinion on a current design implementation in place. We have
an ftp server sitting in our dmz. This box has two nics - one is
plugged into the dmz hub and one is plugged into our network. I think
this is a security risk and we should just allow internal users access
to the box via