Re: Is SSH worth it??

2002-10-08 Thread Peter Kristolaitis
that you're considering, you may want to rethink your security procedures in general before worrying about anything specific like SSH. > All opinions welcome, > thanks > > Trevor Cushen > Sysnet Ltd > > www.sysnet.ie > Tel: +353 1 2983000 > Fax: +353 1 2960499 Peter Kristolaitis

RE: Authenticating mixed clients for Internet Access

2002-07-16 Thread Peter Kristolaitis
er Joe Q. User's name! In theory, a good idea. It would also work if you had a small, TRUSTED group of employees. But unfortunately, one can never rule out the possibility of an insider attack... running a proxy server which requires authentication would be a superior method in this case (among other possibilities). Just my thoughts... - Peter Kristolaitis

Re: How to use tcpdump

2002-07-09 Thread Peter Kristolaitis
uld always write a Perl script that pipes in the output of tcpdump and filters that; even plain old grep and a regular expression could do the job. But why bother? tcpdump has the (very powerful) functionality built right in. - Peter Kristolaitis

Re: Protocol 88

2002-07-07 Thread Peter Kristolaitis
ble... but VERY, VERY slow (a 100baseT section was reduced to a few kilobytes/sec of available bandwidth). It turned out to be a configuration problem with a switch or something (I forget exactly what caused it now). May be something similar in your case... Just a thought. - Peter Kristolaitis

Re: App to send abnormal Ethernet/IP packets

2002-07-03 Thread Peter Kristolaitis
ets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris. This archive contains Lcrzo and Lcrzoex." I've never used it, but it sounds like exactly what you're looking for. - Peter Kristolaitis

Re: Database Encryption

2002-07-01 Thread Peter Kristolaitis
his likely isn't an option (unless you can sweet talk the vendor :) I think that the list needs a little more info before we can really recommend anything. - Peter Kristolaitis

Re: Netcat (NC) Secure Remote Connections via authenication

2002-07-01 Thread Peter Kristolaitis
ompt, if netcat >cannot do this, does anyone know any other peice of software (not >NetBIOS or SMB)? Why don't you set up SSH on the machine in question? It'll give you a true command prompt, plus it has the added benefit of encrypting all traffic. - Peter Kristolaitis

Re: Firewall Message

2002-06-20 Thread Peter Kristolaitis
"%PIX-3-211003: CPU utilization for 10 seconds = 76695845%" That's some serious overclocking you've done to your PIX. :) To me, it seems like a firmware hiccup, but I'd look over the rest of the logs to see if anything else seems weird or out of place. - Peter Kristola

Re: High Energy Degaussers

2002-05-03 Thread Peter Kristolaitis
700 degree fire (see http://www.drivesavers.com/museum/museuma.html ). A degausser would probably render data 99.9% unrecoverable, but if you want to be absolutely sure, destroy the media. Just my $0.02. ;) Peter Kristolaitis