Re: Basically Lazy - Email Header Analysis

2003-05-31 Thread Jeremy Anderson
Hi Andy, First, as tempting as it is to write a tool, my advice is to get one off-the-shelf. My email at work gets stunning quantities of spam. Somewhere around 500 messages per day, plus another 1000 or so bounce messages from whomever is pummeling our system with dictionary attacks. (in case

Re: Configuring OpenSSH-3.5p1 on Tru64

2003-03-11 Thread Jeremy Anderson
On Sat, 8 Mar 2003, Asif Munir wrote: > Hi, > > I am currently in the process of configuring OpenSSH-3.5p1 on a number of > Tru64 Unix machines. The versions vary from 4.0d all the way to 5.1a. I > set up OpenSSH on my local workstation running Tru64 5.1a the problem I seem > to be facing is wit

Re: Telnet Security Question for a Router.

2002-12-11 Thread Jeremy Anderson
I may not completely understand the last part of your message. You say: > The Network > Services Group is adamant that neither SSH or CISCO TACACS+ will work on a > router to correct the security issue. If they mean ssh is not available on Cisco routers, this is incorrect. http://www.cisco.com/

Re: Is SSH worth it??

2002-10-08 Thread Jeremy Anderson
In general, I would say, yes, it's worth it. However, here are the questions I would be asking: 1) You mention that not many people have access to the machines. How many is not many? What is the turnover among the people who have access? Is key control important to you? 2) Do you foresee a s

Re: security question

2002-07-11 Thread Jeremy Anderson
On Thu, 11 Jul 2002, Enquiries wrote: > Dear All > > I have been wondering for quite some time since I got broadband a few weeks > ago whether the followign is a security risk: the time between opening up > the pc and the anti-virus and firewall to boot up takes about 2 minutes in > total... Is t

Re: can someone decipher this?

2002-06-27 Thread Jeremy Anderson
Well, there's not a lot to go on, but here's what I can tell you by looking at the headers: 1) The subject looks a lot like someone is sending you the W32.KlezE worm. See here for more information: http:[EMAIL PROTECTED] 2) The From: (J.MARSHAK) is irrelevant. Forging this is trivial. If t

Re: How to encrypt all network traffic

2002-06-26 Thread Jeremy Anderson
I was asked to configure a group of systems to do exactly this a few years back. The infosec group of the company directed that all network traffic had to be encrypted. The (software-only) solution we used was to put as many services as possible on to native encypted channels. i.e. using htt