On Mon, 2003-06-30 at 17:49, CreativeSell wrote:
Hi All,
Having just got off an awful php host, my partner and I have decided to get
our own redhat server. However we are slightly apprhhensive about ebing
hacked to pieces. we are keeping up to date with all bugtracks and security
Good morning Tim! Glad to see you in such a great mood. :^P
On Wed, 2003-07-02 at 13:19, Tim Greer wrote:
How is CGI an insecure program? It's an interface, and actually, I'm not
aware of any security issues with this interface. If you mean that it
allows for a means for a user on a
On Tue, 2003-07-01 at 11:29, Potter, Tim wrote:
If you were building a laptop for the purpose of network monitoring,
sniffing, forensics and security audits, what tools would you put on it?
Here's a good list to keep you busy (and your disk full):
http://www.insecure.org/tools.html
--
On Sat, 2003-06-28 at 18:08, Chris Berry wrote:
I'm putting together a list of what seem to be the ten least secure computer
items in use today with the idea of having a set of things to recommend
AGAINST people using, probably to be posted on the IT room door with a note
like NO, you
On Wed, 2003-06-25 at 02:24, Anish Basu wrote:
I am trying to set up a secure web server which will already be protected
by a dedicated harware firewall. The hardware firewall will be configured
to protect the web server as well other computers on the network. The
web server will be running
On Wed, 2003-06-25 at 11:32, David Wallraff wrote:
why is it harder to sniff over a switced network? i understand it's
becasue of the switch (natch), but what makes it more difficult?
short_answer
Because when you fire up ettercap to look around, you now have to poison
the switch* first.
On Mon, 2003-06-23 at 10:41, Keenan Smith wrote:
All,
Is anybody aware of a survey or study of some sort that details a typical
user's broadband usage relative to the size of the pipe?
Going in which direction? With your garden variety DSL line, I can get
a 512k connection downstream, and