On Sat, 9 Aug 2003, Tomas Wolf wrote:
I would like to note a little about the security of 4 digit pin... I
believe that author wanted to point out that thanks to the fact, that
you can't try the 4 digit number more than three times at a time - which
makes it a pretty strong system, not that
On 14 Jul 2003, Jose Guevarra wrote:
$ ssh -2C -L 5801:vncserver:5801 localhost
this opens a port on my machine ( port 5801) to the vnc port on the
vncserver. I try to connect to it via vncviewer
$ vncviewer localhost:1
That doesn't work.
Try 5901, as the servers listen at 5900 +
On Wed, 11 Jun 2003, Potter, Tim wrote:
Hello! We have a security issue and need to know who is using a
particular Yahoo user ID from within our company. We are about 90%
certain of the person's identity. This user has been deleting his
cookies and temp Internet files. We want to search
On 17 Mar 2003, ullmic wrote:
Today at the Cebit I saw a product by a company called airzip called
document secure that let's you contol the access rights on a document
level. You can allow a person to only view a document. The person then
will not be possible to print it or save it somewhere
On Thu, 6 Mar 2003, David Gillett wrote:
I use MRTG for the boxes I have working/usable SNMP
implementations on.
It doesn't handle outages/crashes very well. it just
treats the last successfully retrieved data volume as
continuing until new data becomes available.
There are some
On Tue, 11 Feb 2003, [iso-8859-1] Harish Gondavale wrote:
Hi all,
We are having two NT 4 domain controller servers, PDC
BDC. Both are used as resource domain controllers,
print and file servers. Same applications like quota
manager, hp jet direct software, are installed on both
the
On Fri, 31 Jan 2003 [EMAIL PROTECTED] wrote:
heard that they had no plans for VNC. Did some former employees take it
over to continue development? There is a Windows-only product that we use
www.realvnc.com
Yes. :)
On Wed, 27 Nov 2002, Rick Darsey wrote:
Any software that he may use to lock the files can be broken by a person
with enough knowledge. I hardly think that a local sys admin will have
access to the brute force type that the FBI used. There is no completely
secure method of protecting data
-Original Message-
From: Frank Cheong [mailto:[EMAIL PROTECTED]]
Sent: Sunday, November 24, 2002 11:37 PM
To: [EMAIL PROTECTED]
Subject: Part of the web page being MODIFIED !
I got one serious question that is I received complains regarding one of
the image on my web site has
On Tue, 26 Nov 2002, Rick Darsey wrote:
What format is the data in? Excel will let you password protect a workbook.
Trivial to crack, like all Office products.
Mike
On Tue, 12 Nov 2002, n0rb wrote:
service pack = tons of hotfixes
check this ftp: hotfix.microsoft.com
Looks pretty broken to me
ftp dir
200 PORT command successful.
150 Opening ASCII mode data connection for /bin/ls.
ftp: get :10054
and from a different ftp client
ftp dir
200 PORT command
On Tue, 12 Nov 2002, tony tony wrote:
I was doing security research on the internet at work yesterdaywhen all of
a sudden I got a pop up advertisement that stated that I was broadcasting my IP
address to the entire internet. It then showed a screen with my IP address
which was the the
On Sat, 9 Nov 2002, Stephen C. Gay wrote:
Let the research begin! If anyone knows of any pitfalls or points I need to
look at for SUS, please let me know.
Lack of Win98 client support, if I remember correctly.
On Tue, 29 Oct 2002, ANDRIEU Sebastien (Neuilly Gestion) wrote:
Totally agree.
if you begin by rename the first account, it doesn't exist anymore...
You can't have two accounts with the same login name.
It's not a hole for me.
Sebastien
But the original problem was that both users are
On Thu, 24 Oct 2002, Mark Kahn - Lists wrote:
seems like a bug to me, even if the security risk isn't huge. windows xp
doesn't allow you to create a _new_ user with a name that already exists,
why should it allow you to rename a user to one that already exists?
Rename user account user1 to
On Sat, 12 Oct 2002, SB CH wrote:
Hello, all.
As you know, basic tcp/ip based service is throught plain text.
So I use ssh instead telnet, and sslwrap with pop3 etc.
But I have no idea about ftp encryption method.
using sslwrap, I can't use ftp service because ftp use two port.
Do you
I would suggest using something like Ad-ware to remove the spyware
features of the program, keeping the functionality, and simply do not
download anything you don't know what it is. Even the best firewall
cannot protect you from yourself.
Kazaa Lite(www.kazaalite.com) doesn't have the
On Tue, 8 Oct 2002, Nick FitzGerald wrote:
Update NAV so it has current DEFs, set it to update daily, upgrade
your copy of IE to 5.5SP2 plus all post-SP2 security hotfixes or to
IE6.0SP1, and then visit Windows Update regularly (say once a month).
Seems that 5.5SP2 isn't supported by MS
On Sun, 6 Oct 2002, Bassam ALHUSSEIN wrote:
Hello ..
Well, I have some basic concepts about viruses and security. I am using NAV
2001 with the virus definitions of 16/09/2002 and it generally scans the
incoming emails. but after reading that email I noticed that NAV is not
running
I've done some looking around on the web, and haven't really found an
answer to the following question.
How do you securely handle syslogging when you have servers in the DMZ,
and then the servers that are inside on the internal network? Seems that
the fundamental rule is never allow internal
On Thu, 2 May 2002, Radoslav [iso-8859-2] Dejanoviæ wrote:
What servers do you have? Unix boxes, Windows boxes?
If you just need to know if the hardware is up and running, make a simple
script that will periodically ping all the machines, and if they don't
respond, send an alert. That is as
3) I need a remote control program. pcanyware10.5? ( I know it'll cost
me,
but i think i can make him buy this one too)
How about VNC (http://www.uk.research.att.com/vnc/)
Free as in beer AND speech, source is available, clients are available for
a _lot_ of different OS's/architectures, even
On Wed, 21 Nov 2001, Ben Setnick wrote:
The Matrix port on 3com switches is a special high-speed port for stacking
switches. Can it also the used as a monitor port to a sniffer?
Ben Setnick
-Original Message-
From: Matt Hemingway [mailto:[EMAIL PROTECTED]]
Sent: Tuesday,
23 matches
Mail list logo