On Tuesday 31 December 2002 4:54 pm, Don Phillipe wrote:
> I have a small server I use for my home business and use it mainly for
> anyone who needs to send a large file that will not go through email. I
> have an anonymous UPLOAD FTP account that I open up to receive these. From
> time to time I
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Tuesday 15 Oct 2002 5:45 pm, Benoît Gauthier wrote:
> (2002.10.15, 12:44)
>
> >> Why? How can I circumvent this behaviour?
> >
> > Possibly by doing this.
> >
> >
> > AuthType Basic
> > AuthName "Please enter your user id and password."
> > AuthDB
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Friday 11 Oct 2002 12:23 am, "Benoît" Gauthier wrote:
> However, if the same page (and directory) is accessed via
> http://blabla.ca/~user, then NO authentification is done! NONE!
Because if you look closely the documents protected are under
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
> The questions is this;
>
> On an internal network that is switched (making sniffing harder) is it
> worth going to SSH and SCP??
You already seem to know the basic fact a lot of people get confused with...
sniffing switched networks is possib
On Friday 20 Sep 2002 1:05 am, Nikolai wrote:
> I have setup the following rules for my ipchains:
> :input ACCEPT
> :forward DENY
> :output ACCEPT
I like to do
:input DENY
:forward DENY
:output DENY
and then add rules for legitimate traffic, but pros and cons have been
discussed before I'm su
On Wednesday 18 Sep 2002 7:37 am, Greg van der Gaast wrote:
> CD-based?
>
> As in software on a CD? (like all other software)
No, as in boots from a CD, making it a more "secure" firewall. Boot media =
read only. Therefore compromised server = reboot.
> Greg
> Sirs, I am looking for a cd-based