TPS is adviseable as well.
>
>Platform is not important, can be a UNIX or NT based FTP server. This
>request has obvious security issues but if you knew the client you'd
>agree this is the least of their worries.
it is. this would be a screaming horror under NT with IIS.. IMHO
St
e. (Been there, done that, and lost
>the fight so now I have to move on and implement.)
1 more option: secure ms products by using a decent linux/bsd proxy. recently i
stumbled upon "mimedefang".
this can ensure some av / quarantine capabilities and decent protocol enforcement.
a machin
register your mac address you have to be online on a lower
layer.
on that layer all data is readable. no security there, either.
this measure protects you _a little_ against data injection into your
network.
at least as long until someone sniffs one MAC address and reuses it
after the original device
common system files is important, too. most attacks
are not interactive, so there is no attacker to coordinate an attack.
so an attack makes assumptions on the location of system files like
cmd.exe etc.
Stefan Osterlitz
begin 666 ATT7.htm
M/"%$3T-465!%($A434P@4%5"3$E#("(