There isnt much you can do when the spammer has forged your FROM field to be
from you.
You can find the source of the mail from the SMTP headers, and perform a
whois and put a letter of complaint to their ISP. But chances are, their ISP
would just ignore you anyway.
- Original Message -
I disagree,
Sophos had a central management console from an NT/2k/XP machine. When I was
researching it over 2 years ago, it was indeed one of the most efficient and
powerful at the time.
Sophos has had a new development since, I think its called Enterprise
Manager. So it seems even if I havent e
Greetings folks,
Does anyone know what typical network traffic between a 2000/XP port 445
looks like ?
I have found suggestions that it is the replacement of port 139 in NT, but I
am not convinced.
I do not currently have access to a 'snoop' or similar
_
h
Just a stab at it, it looks like your target user is no longer exists or
mails are being rejected ?
- Original Message -
From: "A. Bluecoat" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Tuesday, July 02, 2002 4:39 AM
Subject: Sendmail exploit, reconnaisance, or...
>
> Can
Glad you dropped the NetCat idea. I think the authentication system on the
SSH is quite good as it is. But if you are paranoid of attacks, and cannot
change the OS, then it might be viable to go for some sort of personal
firewall which allows certain IP's. But like the NetCat idea, its too much
Well since its a transmitting/receiving relationship, you need to find the
carrier frequency of the WLAN and perhaps run around with a Field Strength
Meter tuned to this frequency. For this to work properly of course, you'll
need to be able to turn off all the other transceivers. Or else, you will
> In a brute force attack the longer password will always be better, we're
> all agreed on that, however hackers are smarter than that and will try
> dictionary and hybrid attacks first. So this is what I think the odds are
> approximately:
This is not true. For example, a password such as "Domi
Tier-3 Huntsman will so exactly what you wanted, you can also centralise all
your logs into one database on a Solaris machine
Take a look at www.tier-3.com
Good luck
- Original Message -
From: "Rich Henning" <[EMAIL PROTECTED]>
To: "John Horne" <[EMAIL PROTECTED]>
Cc: <>
Sent: Saturda
Hi Jonathan,
Tier-3 has an IDS product called Hunstman. It's flexibilities allow you to
detect, protect and also act, as you wish.
Have a look at their website at http://www.tier-3.com
HTH
Karma
> > >
> > >
> > > Could someone just outright come out a
Isnt this just a service to resolve hostname ?
- Original Message -
From: "SoloCDM" <[EMAIL PROTECTED]>
To: "Security-Basics (Listserv)" <[EMAIL PROTECTED]>
Sent: Sunday, May 26, 2002 9:06 AM
Subject: What Is hosts2-ns
> On Linux, what is hosts2-ns? How is it accessed from a remote h
I wonder if you could register OE as a service ?
- Original Message -
From: "Bradley W. Footit" <[EMAIL PROTECTED]>
To: "John D from Best Price Cruises" <[EMAIL PROTECTED]>;
"Security-Basics Mailing List" <[EMAIL PROTECTED]>
Sent: Saturday, May 18, 2002 12:23 AM
Subject: RE: Strange si
s.
Anyway, have a look at their website at http://www.tier-3.com
Hope that helps.
Karma
> - Original Message -
> From: "Matt" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Sent: Wednesday, May 15, 2002 4:24 AM
> Subject: Log Help
>
>
&
Hi
This might be a simple question but I cannot find the answer.
Does anyone know any online areas I can find logs from Defcon ?
Thanks in advance.
It is as good as how you manage it.
just some thoughts, don't quote me, but...
I can see your AV default would have to be modified.
You will need to ensure there is no way that port can be connected
externally (firewalled).
You would want some sort of password set on your Remote-admin program
GNAT lite,
has a console, web and an application specific interface. Supports PPPoE and
runs off one measely floppy disk !yup that is right !!!
15 matches
Mail list logo