Re: open proxy

2003-04-01 Thread Mel
I'm not familiar with Domino so configuration may be different, but when you set up your mail server, were you not prompted to enter details about relay hosts and relay targets? - ie. specifying which IP address(es) the mail server should receive mail from (usually ONLY your firewall) and which

Re: Encrypting data on a cd

2003-03-20 Thread Mel
Kevin F-Secure do a product called FileCrypto which encrypts files, and may be the kind of thing you're looking for. The link below will give you more information: http://www.f-secure.com/products/filecrypto/desktop.shtml Mel At 02:58 PM 3/19/2003 +, Kevin Wharram wrote: All, I

RE: information security university degree

2003-03-04 Thread Mel
I'd like to add a few more English Universities to the list: South Bank in London: http://www.courses.sbu.ac.uk/postgrad/p2CourseHeaders.asp?v1=4&v2=32 Oxford Brookes: http://www.brookes.ac.uk/courses/currentpg/directory/taught/computing_it.html Cambridge: http://www.admin.cam.ac.uk/univ/gspro

Re: Checkpoint NG - SMTP Guard Features

2003-02-20 Thread Mel
Not that I'm aware of. CheckPoint NG can be configured for mail content scanning but its abilities are limited, and it is intended to be used with a dedicated content scanning product such as MailSweeper, which does comply to all SMTP RFCs. Please correct me if I'm wrong! Mel At

Re: email content monitoring / effectiveness

2003-02-13 Thread Mel
one, and I think you can also get it to send a copy of the email to the administrator if the email contains certain key words. The website is www.mimesweeper.com Mel At 09:50 PM 2/11/2003 -0800, laurence field wrote: I would like to get feedback on the quality/usefulness of email cont

RE: Need recommendations about IDS Systems

2003-01-29 Thread Mel
et/windows/filearchive/IDScenter1.0.9.html Mel At 08:18 AM 1/28/2003 -0600, Mike Heitz wrote: Chris, Just out of curiosity I've never found Snort for the Windows platform. Do you have a link for this? mike heitz ** sr it manager ** UPSHOT 312-943-0900 x5190 -Original Message- Fr

Re: Administrivia - Mea Culpa

2003-01-05 Thread Mel
regarding this, it is still not clear to me whether the attachment actually has to be run my the user in order for the computer to be infected. Advice would be greatly appreciated Thanks in advance Mel At 03:03 PM 1/3/2003 -0700, Dean Turner wrote: Folks, Earlier today I inadvertantly approved a

Re: copying a disk image to restore on linux

2002-12-27 Thread Mel
I think Mondo Rescue might be what you're looking or. It's a back-up/disaster recovery tool which creates an image of either your entire filesystem or a subset of your files, and can be found at http://www.microwerks.net/~hugo/ At 03:42 PM 24/12/2002 +0530, [EMAIL PROTECTED] wrote: hi all,

NFR Back Officer Friendly alerts

2002-05-28 Thread Mel
Hi I'm a newcomer to the Security arena and am currently trying to get to grips with honeypots, IDSs and firewalls for my dissertation. I'm running NFR's Back Officer Friendly on my home computer, configured to listen for Back Orifice, FTP, Telnet, SMTP, HTTP, POP3 and IMAP2, and something w