>I need to encrypt confidential data on a CD.
>What would be the best way of doing it, i.e. which software?
GPG, PGP, PGPdisk,...
http://www.gnupg.org
http://www.pgpi.org
http://www.pgp.com
Joris
t with carefully
selected patterns.
The program is free software, which means that everyone has
access to the source code,..."
Joris De Donder
>are there any windows utility that allows listing of all processes running
>on the machine on the command line? is it possible to kill a process through
>the command line?
tlist.exe, kill.exe, pslist.exe, pskill.exe,...
http://www.google.com
http://www.sysinternals.com/ntw2k/freeware/pstools.sh
>Are the out of office messages inviting hackers to attack your
>corporate network? Is this a risk to your company if employees
>start using the Out of Office feature?
If your admins start sending Out of Office messages to adresses
outside your organisation, an attacker could use that info in so
>The logs are following,
>and with the timestamps, they
>appear to be undeniably priduced by some sort of scanner.
Ping Companion (http://grimsping.cjb.net)
Joris
> I've noticed recently on a few different machines entries like this:
> GET /.hash=8148dd8cd5c884d62cab26ccfa1aeaa045eab116
> GET /.hash=6baa50082310ba631358f57c8fb7eaadf752e055
> Any idea what is going on here?
> Is this some 0day exploit? Something old that is going round again?
Looks like Kaz
>> What you're going to have the most difficulty with
>> however, are likely to be newer tunneling trojans,
>and
>> the like.
>
>Such as? Can you name a few
I think he means 'Institution FWB', 'Assasin', 'OL Firewall Bypass SE',...