RE: Is Citrix safe?

2003-06-05 Thread Nina V. Levitin
First off Citrix is not SSL based. Citrix is a third party product that sits on top of Windows 2000 or Windows 2003 server. It can uses SSL. It provides additional functionality over and above Terminal Services. Citrix Metaframe is capable of using SSL and TLS for security. This can be done in

RE: IIS5 SSL Certs

2002-06-05 Thread Nina V. Levitin
If your cert is www.mycompany.com then you can put it on as many servers as you like so long as DNS resolves to that box with that URL. Just make certain to export the private key. If your certs is mybox.mycompany.com that cert is ONLY valid for that box. Hope this helps. -Kit

RE: NT Sam Hashes

2002-04-30 Thread Nina V. Levitin
RDISK does not automatically create a copy of the SAM files. You need to use RDISK /s. -Kit -Original Message- From: Frank Heyne [mailto:[EMAIL PROTECTED]] Sent: Thursday, April 25, 2002 10:36 PM To: [EMAIL PROTECTED] Subject: Re: NT Sam Hashes On 24 Apr 02, at 13:21, Remington

RE: Vendor Remote Access

2002-04-19 Thread Nina V. Levitin
Unfortunately most vendors want some kind of remote control tool on the server upon which their product resides.This usually means that they not only want the ability access the desktop but they want admin rights. Some of these vendors will only work with PC anywhere and only over a modem.

RE: HTTPS Question

2002-04-11 Thread Nina V. Levitin
I would suggest a content filter instead of turning off HTTPS. A content filter would allow you to either block certain websites all together or more sophisticated software will allow you to search and block certain keywords. I would suggest however that you put in place a network usage

RE: DMZ Stuff

2002-04-07 Thread Nina V. Levitin
1. DMZ stands for Demilitarized Zone. It is a network subdivision where you allow non trusted network traffic. IE. External traffic. Ideally it should have NO contact with the internal network. However that is not the case in most companies. Most companies allow very limited contacts

RE: Physical Access Control

2002-04-01 Thread Nina V. Levitin
Seimen's makes a mouse that uses finger print identification. There is a program that use the mouse and does network and application sign on. I have tested it in a lab but do not user it. Pretty cool toys but I have no idea how well it works on a day to day basis. So check out Seimen's

RE: scary site

2002-03-07 Thread Nina V. Levitin
This is yet another reason to stick with Netscape. And yet another reason why separating out Windows and Internet Explorer should be mandated. -Kit -Original Message- From: leon [mailto:[EMAIL PROTECTED]] Sent: Tuesday, March 05, 2002 9:30 AM To: [EMAIL PROTECTED] Subject: scary site

RE: logging shared folder access

2001-11-12 Thread Nina V. Levitin
Turn on auditing. It under advanced properties under permissions. -Original Message- From: Mashed Patatas [mailto:[EMAIL PROTECTED]] Sent: Sunday, November 04, 2001 11:19 AM To: [EMAIL PROTECTED] Subject: logging shared folder access Is there a way to log all access to my shared