Re: SMTP DDoS

2003-08-14 Thread Karma
There isnt much you can do when the spammer has forged your FROM field to be from you. You can find the source of the mail from the SMTP headers, and perform a whois and put a letter of complaint to their ISP. But chances are, their ISP would just ignore you anyway. - Original Message -

Re: Anit-Virus Software

2003-08-08 Thread Karma
I disagree, Sophos had a central management console from an NT/2k/XP machine. When I was researching it over 2 years ago, it was indeed one of the most efficient and powerful at the time. Sophos has had a new development since, I think its called Enterprise Manager. So it seems even if I havent e

Fw: port 445 typical traffic

2002-07-05 Thread Karma
Greetings folks, Does anyone know what typical network traffic between a 2000/XP port 445 looks like ? I have found suggestions that it is the replacement of port 139 in NT, but I am not convinced. I do not currently have access to a 'snoop' or similar _

Re: Sendmail exploit, reconnaisance, or...

2002-07-03 Thread Karma
h Just a stab at it, it looks like your target user is no longer exists or mails are being rejected ? - Original Message - From: "A. Bluecoat" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Tuesday, July 02, 2002 4:39 AM Subject: Sendmail exploit, reconnaisance, or... > > Can

Re: Setting TCP filter access for SSH connection

2002-07-03 Thread Karma
Glad you dropped the NetCat idea. I think the authentication system on the SSH is quite good as it is. But if you are paranoid of attacks, and cannot change the OS, then it might be viable to go for some sort of personal firewall which allows certain IP's. But like the NetCat idea, its too much

Re: Wireless LAN question

2002-07-03 Thread Karma
Well since its a transmitting/receiving relationship, you need to find the carrier frequency of the WLAN and perhaps run around with a Field Strength Meter tuned to this frequency. For this to work properly of course, you'll need to be able to turn off all the other transceivers. Or else, you will

Re: Password Strength II

2002-07-03 Thread Karma
> In a brute force attack the longer password will always be better, we're > all agreed on that, however hackers are smarter than that and will try > dictionary and hybrid attacks first. So this is what I think the odds are > approximately: This is not true. For example, a password such as "Domi

Re: Solaris IDS/syslog analysis

2002-06-11 Thread Karma
Tier-3 Huntsman will so exactly what you wanted, you can also centralise all your logs into one database on a Solaris machine Take a look at www.tier-3.com Good luck - Original Message - From: "Rich Henning" <[EMAIL PROTECTED]> To: "John Horne" <[EMAIL PROTECTED]> Cc: <> Sent: Saturda

Re: windows 2000 Intrustion Detection

2002-06-04 Thread Karma
Hi Jonathan, Tier-3 has an IDS product called Hunstman. It's flexibilities allow you to detect, protect and also act, as you wish. Have a look at their website at http://www.tier-3.com HTH Karma > > > > > > > > > Could someone just outright come out a

Re: What Is hosts2-ns

2002-05-30 Thread Karma
Isnt this just a service to resolve hostname ? - Original Message - From: "SoloCDM" <[EMAIL PROTECTED]> To: "Security-Basics (Listserv)" <[EMAIL PROTECTED]> Sent: Sunday, May 26, 2002 9:06 AM Subject: What Is hosts2-ns > On Linux, what is hosts2-ns? How is it accessed from a remote h

Re: Strange situation with outlook

2002-05-21 Thread Karma
I wonder if you could register OE as a service ? - Original Message - From: "Bradley W. Footit" <[EMAIL PROTECTED]> To: "John D from Best Price Cruises" <[EMAIL PROTECTED]>; "Security-Basics Mailing List" <[EMAIL PROTECTED]> Sent: Saturday, May 18, 2002 12:23 AM Subject: RE: Strange si

Re: Log Help

2002-05-16 Thread Karma
s. Anyway, have a look at their website at http://www.tier-3.com Hope that helps. Karma > - Original Message - > From: "Matt" <[EMAIL PROTECTED]> > To: <[EMAIL PROTECTED]> > Sent: Wednesday, May 15, 2002 4:24 AM > Subject: Log Help > > &

Logs from Defcon

2002-01-22 Thread Karma
Hi This might be a simple question but I cannot find the answer. Does anyone know any online areas I can find logs from Defcon ? Thanks in advance.

Re: Remote PC Management via LAN/WAN

2002-01-18 Thread Steve, Karma Lodoe Nyima
It is as good as how you manage it. just some thoughts, don't quote me, but... I can see your AV default would have to be modified. You will need to ensure there is no way that port can be connected externally (firewalled). You would want some sort of password set on your Remote-admin program

Re: Suggested Firewall (CHEAP TO!)

2002-01-03 Thread Steve, Karma Lodoe Nyima
GNAT lite, has a console, web and an application specific interface. Supports PPPoE and runs off one measely floppy disk !yup that is right !!!