to
improve there services and software.
Just my opinion, and you know what they say about those eg
Patrick S. Harper | CISSP MCSE
[EMAIL PROTECTED]
www.InternetSecurityGuru.com
Facts are stubborn things; and whatever may be our wishes, our inclination, or the
dictates of our passions
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
If you have already bought Win2K then I would go with L2TP
If you want cheap (free, are doing this for an entire network, and are not apposed to
Linux then check out http://www.freeswan.org/
Patrick S. Harper | CISSP MCSE
[EMAIL PROTECTED
When you make a change to a windows 2000 servers auditing and log
rotation where is that info stored? I have looked all through the
registry and searched all over the HDD and found nothing but a few
.dll's and .inf files. If I make changes to the .inf files directly it
does not affect the
of securing an IIS box except to use obscure
patches is like saying there is no way to stop a car except to run it in
to a tree. It is just plain wrong!
Patrick S. Harper | MCSE ISS
mailto:[EMAIL PROTECTED]
http://www.internetsecurityguru.com
How do I set a laser printer to stun
http://www.eeye.com/html/Research/Tools/nmapnt.html
Patrick S. Harper | MCSE ISS
mailto:[EMAIL PROTECTED]
http://www.internetsecurityguru.com
How do I set a laser printer to stun?
-Original Message-
From: Philip Wagenaar [mailto:[EMAIL PROTECTED]]
Sent: Sunday, January 06, 2002 5:29
If you can write the batch files and edit the conf files then there is
no problem. I am talking about companies and individuals that slap a
Linux box up as a webserver and think there safe just because they are
using Linux. I had a client, a local ISP that did that. Every box they
had was
on clients. Most of the time I get I didn't know
that box had IIS on it or even worse yes that's my IP, but I have no
idea where or what it is
A system is only as secure as the sysadmin is competent and dedicated.
And sometimes they still get hacked.
Patrick S. Harper | MCSE ISS
mailto:[EMAIL
through to get it changed.
Patrick S. Harper | MCSE
mailto:[EMAIL PROTECTED]
http://www.internetsecurityguru.com
-Original Message-
From: George Barnett [mailto:[EMAIL PROTECTED]]
Sent: Monday, December 17, 2001 7:41 AM
To: gminick; [EMAIL PROTECTED]
Subject: Re: Passwords On Paper
More
If you are the recipient or the CC you can see the headers if they came
in from the internet. If you are the BCC or they came through your
organizational exchange server you will not be able to.
Patrick S. Harper | MCSE ISS
mailto:[EMAIL PROTECTED]
http://www.internetsecurityguru.com
I use www.bookpool.com
-Original Message-
From: Kudulis, Christopher [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, October 31, 2001 10:34 AM
To: [EMAIL PROTECTED]
Subject: Cheap Tech Manuals
Hey All,
Anybody got a good site for cheap tech. books?? Thanks in advance...
Christopher J.
Here is the arin whois results for the three reserved ip ranges. These
will not route on the internet.
IANA (RESERVED-6)
Internet Assigned Numbers Authority
4676 Admiralty Way, Suite 330
Marina del Rey, CA 90292-6695
US
Netname: RESERVED-10
Netblock: 10.0.0.0 -
I scanned on a clients network and got reports of both vulnerable and
infected.
Peace, commerce, and honest friendship with all nations -- entangling
alliances with none.
--Thomas Jefferson (1743-1826)
From every mountainside let freedom ring.
--Samuel Francis Smith, from the anthem America,
12 matches
Mail list logo