RE: Monitoring the network: Routers

2003-07-23 Thread Hunt, Jim
MRTG is right on target and can run on Windows as well as almost every other OS. I have specifically written a beginners guide to MRTG on Windows entitled MRTG for Dummies - http://www.netmon.org Jim Hunt Network Systems Engineer Northwestern School Corporation Technology Department Network

RE: Information Needed on Malicious Traffic

2003-07-11 Thread Jim
that is created? I read that IRC Flood will send messages alerting IRC users that a computer is compromised. But to what extent is an actual backdoor created?] Jim -Original Message- From: Piyush Bhatnagar [mailto:[EMAIL PROTECTED] Sent: Wednesday, July 09, 2003 8:36 PM To: [EMAIL

RE: Questions about 192.168

2003-07-09 Thread Jim
this make sense? I am unfamiliar with nmap calling anything local or remote. Sorry about that, what it really said was: Host (192.168.1.255) seems to be a subnet broadcast address (returned 1 extra pings). Skipping host. I guess I should have read it a little slower. Jim

Questions about 192.168

2003-07-08 Thread Jim
show up in the routing table, netstat, etc.? Thanks, Jim --- Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts! The Gartner Group just put Neoteris in the top of its Magic Quadrant, while InStat has

RE: Digital Evidence Question - What is an effective Windows hard -disk search tool?

2003-06-20 Thread Jim
insert the Boot Disk, and the loader menu will appear, and you can boot as normal. Also, the boot.ini file is simply a small text file, and has nothing to do with the NIC (although an unexpected reboot may have deleted the boot.ini file somehow). Jim -Original Message- From: Ansgar Wiechers

RE: Is Citrix safe?

2003-06-05 Thread Tuttle, Jim
gateway. That's what I do. Jim Tuttle Willamette ESD Network Security Analyst -Original Message- From: Jesper Sobol [mailto:[EMAIL PROTECTED] Sent: Wednesday, June 04, 2003 6:30 AM To: [EMAIL PROTECTED] Subject: Is Citrix safe? As far as I know, Citrix is based on SSL which

RE: Free utiities

2003-06-04 Thread Hunt, Jim
all I can think of this early in the morning. Jim Hunt Network Systems Engineer Northwestern School Corporation Technology Department Network Monitoring Tools Tutorials http://www.netmon.org Featured in Network Computing Magazine -Original Message- From: Kristofer Mcconnell [mailto

Re: Hardware vs Software Firewall/Router

2003-04-04 Thread Jim Miller @ Cox
the research, send out RFPs to get vendors to respond to your needs, then decide on the best course of action. Offloading the specs to a vendor seems like a wise way to go in your case. And remember to trust but verify. Hugh [Jim] Miller 979/777-9546 [EMAIL PROTECTED] Think globally Act locally Live

RE: smtp relay tester?

2003-03-18 Thread Hunt, Jim
I have heard that testing at ORDB is not a good thing if you think you are open. They add tested systems to the blacklist which then can make life miserable in the long run. Test someplace that doesn't auto blacklist you. Jim Hunt Northwestern School Corporation Technology Department

Compromised Server Project

2003-02-10 Thread Hunt, Jim
Antivirus software on the box but did due a full scan using the online scan from Trend Micro and it came up clean so no Trojans were dropped. Please note this was not a scientific study but something born out of boredom by myself. Stay Secure! Jim Hunt Microsoft Certified Systems Engineer

RE: Monitoring office web use

2003-01-31 Thread Hunt, Jim
Network Probe is a great little tool and is available for free on almost any platform. http://www.netmon.org/tools.htm#Sniffers Jim Hunt Microsoft Certified Systems Engineer Northwestern School Corporation Kokomo, Indiana -Original Message- From: Sedat DOGRU [mailto:[EMAIL PROTECTED

RE: broadcast strom of netbios-dgm and netbios-ns

2003-01-23 Thread Tuttle, Jim
Turn off netbious completely. Disable Client for Microsoft Networks. INSTALL a linux distro :) --- CONFIDENTIALITY NOTICE: This email and any attachments are for the exclusive and confidential use of the intended recipient. If you are not the intended recipient, please do not read, distribute

Re: Log Analysis

2002-12-03 Thread Jim Geovedi
Are any of you aware of a tool that will allow an administrator to analyse log files and produce statistics based on the log content. I want to see what sites have been accessed, how many times etc. I want something preferably in real time with a gui/html interface. If it was

Re: Low end machines for Firewall/IDS

2002-12-02 Thread Jim Colten
Does anybody know of any good locations online to purchase old 486 machines or low end Pentium machines for use as a Firewall and/or IDS? ebay, computer office equip, search for pentium 2 finds a few Jim Colten System Technical Support Central Computing Operations Suite 660 WBOB University

Re: Internet Explorer 6 'Autocomplete settings' and username/password retention

2002-11-16 Thread Jim Markley
Steve, The following should turn this feature off: ToolsInternet OptionsContentAuto Complete Uncheck the checkboxes as desired for: Web Addresses Forms User Names Passwords Jim - Original Message - From: steve baker [EMAIL PROTECTED] To: [EMAIL

Re: Risk of using SS#s (last 4 digits) for authentication

2002-11-11 Thread Jim Clark
have ignored them. -Jim David Greenstein wrote: How legal is the use of the SSN for authentication. My understanding is that the SSN is to be used by state and federal government only Please, any legal expert, help us to understand the issue Thank you -Original Message- From: Jim

Risk of using SS#s (last 4 digits) for authentication

2002-11-04 Thread Jim Lawton
We are currently considerring the limited use of employee's Social Security numbers to authenticate them when they request a password reset from the Help Desk. We have chosen two items (in total) for authenticating them: their employee # and the last 4 digits of their SS#. Only the last 4

The Basics

2002-07-17 Thread Jim Clark
, but some of those certifications require relevant work experience. That's what I lack. What are the ways that I can get some practical experience when not directly employed by a firm doing forensic work? Any suggestions would helpful. Thanks. Jim

RE: NT/2000 vs Unix based Web Servers

2002-07-10 Thread Corio, Jim
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I would say that you should run the web server on the Operating system that you are most familiar with in an environment that you are most familiar with. If you are a Windows administrator, then you will run the risk of misconfiguring a UNIX box and

Re: MD5'ing a directory tree in Linux?

2002-06-27 Thread Jim Meier
md5sum on each one, piping the output of md5sum into a file called md5sums-for-FOODIR. This file is in the format accepted by md5sum -c, so you can now easily check FOODIR against the stored sums by doing: md5sum -c md5sums-for-FOODIR Have fun, -Jim

RE: non-privileged port selection - how is it done?

2002-05-24 Thread Jim Grossl
Hi John, Are your saying that you have or are thinking of configuring your firewall to filter out packets with non-privileged ports in the *source* address? If you could I would think this would shutdown a great deal of incoming traffic!! This is not what you want. Jim Grossl Boise, Idaho USA

RE: bandwidth monitor

2002-05-23 Thread Hunt, Jim
between Internet traffic and local traffic. But it give you some clues to follow. The other option is to use a network sniffer and filter out traffic. Sniffer Pro is very good and you can get a full 30 day version to try. Good luck! Jim Hunt Microsoft Certified Systems Engineer Northwestern

Security Suggestion (Exchange 2000) access to files

2002-05-16 Thread Hunt, Jim
the fight so now I have to move on and implement.) Jim Hunt Microsoft Certified Systems Engineer Northwestern School Corporation

Re: Sendmail

2002-05-16 Thread Jim Swanson
IIRC, it does not accept remote mail requests. It is used internally only, to mail information from crontab to root regarding errors, etc. Jim Swanson Erik Parker wrote: Perhaps it's because of old thinking. I don't run OpenBSD... so I can't say for sure, but I imagine sendmail isn't running

RE: Mail server

2002-05-12 Thread Hunt, Jim
What about end people that need web based access to their mail server such as Outlook Web Access? A simple gateway (with virus scanning) doesn't do the trick. What is the preferred way for that set up (on a limited budget)? Jim Hunt Microsoft Certified Systems Engineer Northwestern School

Re: Possible ZoneAlarm 3 Problem???

2002-05-10 Thread Jim Markley
anything that stood out as an obvious problem. What were the values of the numbers? Best of luck in figuring this out, Jim - Original Message - From: Nathan Anderson [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Thursday, May 09, 2002 2:01 AM Subject: Possible ZoneAlarm 3 Problem??? I

Re: Dictionary Word List

2002-05-09 Thread Jim Markley
Craig, Try the following: Carnegie Mellon Pronouncing Dictionary http://www.speech.cs.cmu.edu/cgi-bin/cmudict This is basically a delimited list of 100,000+ mainly-English words followed by the phonic representation of those words. Hope this helps, Jim - Original Message

RE: Server Monitoring

2002-05-02 Thread Hunt, Jim
alerts. This is great if your e-mail server goes down. I like the Hermes server which is free. (http://www.alixoft.com/Software/hermes.htm) Jim Hunt Microsoft Certified Systems Engineer Northwestern School Corporation -Original Message- From: Robert Bailey [mailto:[EMAIL PROTECTED]] Sent

Re: Windows 98 lockdown

2002-04-05 Thread Jim Swanson
IIRC, my MCSE instructor did this (as in, removed the start button) to my class during the Windows 95 class, using policies. Seeing how most people took the NT Workstation class/test, and not the 95 class/test, you wouldn't know it, but it can be done. Jim Swanson Dennis Bauer wrote

RE: IM Programs

2002-03-14 Thread Jim Popovitch
Craig, why? Why are you going through so much work to do this? Is there some compelling or underlying security concern? (any more so that java enabled browsers?) -Jim P. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] Sent: Monday, March 11, 2002 2:25 PM

RE: pegasus mail v eudora

2002-03-14 Thread Jim Grossl
pretty sure Pegasus does not. Jim Grossl Boise, Idaho USA -Original Message- From: Enquiries [mailto:[EMAIL PROTECTED]] Sent: Sunday, March 10, 2002 12:12 PM To: [EMAIL PROTECTED] Subject: pegasus mail v eudora Could you please advise what security issues I should watch out for and which

RE: Security Engineers Field Tool Kit

2002-03-07 Thread Jim Popovitch
Don't forget dig, host, and ssh -Jim P. -Original Message- From: Bejon Parsinia [mailto:[EMAIL PROTECTED]] Sent: Tuesday, March 05, 2002 6:46 PM To: 'Pradeep Pillai'; [EMAIL PROTECTED] Subject: RE: Security Engineers Field Tool Kit I'd add the following: -ListServ

RE: Cisco security

2002-03-03 Thread Jim Murray
security process. Jim -Original Message- From: leon [mailto:[EMAIL PROTECTED]] Sent: Monday, February 25, 2002 1:18 PM To: 'Dave Mee'; [EMAIL PROTECTED] Subject: RE: Cisco security -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I would like to point out that the certification is valid for only

Re: Backup tools

2002-02-22 Thread Jim Boyer
. Domingos Costa Jim Boyer Systems Programming Professional College of Agriculture and Home Economics Washington State University

RE: Server IDS?

2002-02-06 Thread jim patterson
Get the Entercept/Cisco Host based IDS. Excellent product. -Original Message- From: jason [mailto:[EMAIL PROTECTED]] Sent: Monday, February 04, 2002 11:05 AM To: [EMAIL PROTECTED] Subject: Server IDS? Does anyone know of any server level IDS products, such as tripwire, that exist for

PortSentry entries on RH 7.2 server

2002-02-02 Thread Jim Swanson
been trying to get a hold of UUNet/Worldcom, who is our ISP, to no avail. Thanks for any advice. Jim Swanson

RE: VPN Security Products?

2002-01-28 Thread Jim Murray
You might want to take a look at Tiny Software's enterprise solution, Securitae. http://www.securitae.com/home/securitae?s=1791383710291873314A0la=ENva=pg =prod_home -Original Message- From: Lariviere, Stephen [mailto:[EMAIL PROTECTED]] Sent: Thursday, January 24, 2002 10:00 AM To:

RE: I've been hurt by an e-mail virus ! What virus is it ?

2002-01-24 Thread Jim O'Donald
go to http://housecall.antivirus.com and scan your computer. it will tell you what the virus is and will clean it if possible. -Original Message- From: Daniel Pope [mailto:[EMAIL PROTECTED]] Sent: Tuesday, January 22, 2002 5:49 PM To: [EMAIL PROTECTED] Subject: I've been hurt by an

RE: IIS log files, can I have your take on these attacks?

2002-01-18 Thread Jim Grossl
murder, because of 15 or so .ida Attempted Administrator Privilege Gain attacks, so the fun never ends. Grep, hmmm, seems I've heard that apps name before... :) Jim Grossl Lee Pesky Learning Center Boise, Idaho USA -Original Message- From: Bill Walls [mailto:[EMAIL PROTECTED

RE: IIS log files, can I have your take on these attacks?

2002-01-17 Thread Jim Grossl
security patches (all patches period for that matter, I'm paranoid). Jim Grossl Lee Pesky Learning Center Boise, Idaho USA -Original Message- From: Andrew Blevins [mailto:[EMAIL PROTECTED]] Sent: Wednesday, January 16, 2002 11:14 AM To: Jim Grossl Subject: RE: IIS log files, can I have

RE: IIS log files, can I have your take on these attacks?

2002-01-17 Thread Jim Grossl
know what a buffer overflow is. It was my impression that a file traversal was a flaw in the way IIS dealt with strings representing directory paths. Jim Grossl Lee Pesky Learning Center Boise, Idaho USA -Original Message- From: Ravila White [mailto:[EMAIL PROTECTED]] Sent: Wednesday

RE: IIS log files, can I have your take on these attacks?

2002-01-17 Thread Jim Grossl
Hi Todd, the machine is patched. I am not however running the URL Scan filter. But the server is issuing 400 level error messages, and I cannot find any abnormal processes or open ports (using fport). BTW, I see allot of these also, but last weekend was the pits! Jim Grossl Lee Pesky Learning

Re: Outgoing connection to port 6000 from port 25...

2001-12-06 Thread Jim Meier
server would attempt to make such a connection. Have I been rooted? Source ports do not map the destination ports - they are selected at random from any available. There is no reason think you've been hacked, on this evidence. Do your logs show the originating ip? -Jim

SonicWall XPRS2 identifies attacks just by the port accessed?

2001-11-27 Thread Jim Grossl
by most firewalls? I guess I had not thought much about it, but had I, I would have assumed that there was a more sophisticated method being used; although I do realize that there is probably no way to know just what program is probing a given port. Jim Grossl Lee Pesky Learning Center Boise, Idaho

Re: outlook 2002 is a security freak

2001-10-05 Thread Jim
Microsoft just can't win... They get so much flak from people for having an insecure product that lets users choose to run trojaned .EXE files, so they grudgingly make the change, and they are suddenly big brother. Oy! Where was Outlook was blamed for allowing someone to manually execute an

Re: Windows 98 Sniffer

2001-09-21 Thread Jim Gaudet, MCSE
Thanks everone for your help. I think I will be trying out Ethereal. It looks real good. Quick question: Does anyone have a website that lists a few standard, or newbie filters? This would really help. Thanks again Jim - Original Message - From: Jim Gaudet, MCSE [EMAIL PROTECTED