> -Original Message-
> From: Ozgur C. Demir [mailto:[EMAIL PROTECTED]
> Sent: Tuesday, August 05, 2003 3:30 PM
> To: [EMAIL PROTECTED]
> Subject: User Tracking & Audit on Unix Systems
>
> Hello people,
> I would like to learn if is there a tool to track a user when he/she logs
> on
man l
Alec Muffett Crack :: http://www.crypticide.org/users/alecm/
> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
> Sent: Monday, August 04, 2003 4:39 PM
> To: [EMAIL PROTECTED]
> Subject: UNIX password auditing tool
>
>
>
> I have tried searches for UNIX password cr
If 2 IP addresses are needed on the same network, why not just use IP
aliasing instead?
> -Original Message-
> From: Vineet Mehta [mailto:[EMAIL PROTECTED]
> Sent: Sunday, July 27, 2003 9:49 AM
> To: [EMAIL PROTECTED]
> Subject: 2 NIC's on same network, possible?
>
> Hi all,
>
> My coll
How about people posting their favorite secure programs for email,
etc... :-)
---
Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts!
The Gartner Group just put Neoteris in the top of its Magic Quadr
Use the 'find' command [man find]
> -Original Message-
> From: Matthew Sallee [mailto:[EMAIL PROTECTED]
> Sent: Monday, June 16, 2003 6:31 PM
> To: security-basics
> Subject: redhat audit
>
> recently my redhat box was compromised and i'm auditing changes that were
> made
> (i didn't noti
Why not try Blowfish Advanced CS , available at http://come.to/hahn
This should do exactally what you want.
-Original Message-
From: Tony - CIA;CISA;CDP;CPA;MBA [mailto:[EMAIL PROTECTED]]
Sent: November 18, 2002 8:00 PM
To: [EMAIL PROTECTED]
Subject: Protect folder data.
Hi,
I have s