are using hubs, it might be a good idea to switch to switches.
If you are interested, there is a brief document I had written on topic of
Sniffers that might be of use to you. It is available at
http://www.rootshell.be/~dhar/downloads/Sniffers.pdf
Hope this helps!!
With Regards,
Sumit Dhar
http
,
Sumit Dhar
http://www.rootshell.be/~dhar
you will then need to specify the server port on the clients login
interface. Clients you can try are Winjab and Gabber.
As regards to clients supporting proxying, I am unfortunately, not very sure
at this point of time.
With Regards,
Sumit Dhar
http://www.rootshell.be/~dhar
.
With Regards,
Sumit Dhar
http://www.rootshell.be/~dhar
a password to decrypt
his/her stuff.
-The root can delete the users files, but not read them.
-The whole process should ideally be completely transparent to the user.
Any pointers to programs that can do this on Linux??
With Regards,
Sumit Dhar
http://www.rootshell.be/~dhar
. For example, if only the http
port is open such a user might not be able to use an exploit for ssh against
an external host.
Lots of small reasons like this why opening *ALL* outbound ports might not
be a great idea.
With Regards,
Sumit Dhar
http://www.rootshell.be/~dhar
.
With Regards,
Sumit Dhar
http://www.rootshell.be/~dhar
of the better books on this topic. The other book that you
might want to try is:
Maximum Linux Security
Cheers
Sumit Dhar [http://dhar.homelinux.com/dhar/]
Manager [Research and Product Development]
SLMsoft.com
--
pub 1024D/7AB2D05A 2002-02-24 Sumit Dhar (Sumit Dhar
these IPs.
Hope this helps.
Sumit Dhar [ http://dhar.homelinux.com/dhar ]
Manager [Research and Product Development]
SLMsoft.com
excels at it. If you have the budget you can always go
for a commerical program, but before you do that, give this little angel
a shot.. you might be surprised at what all it does.
Cheers
a href=http://dhar.homelinux.com/dhar/Sumit Dhar/a
Manager, Research and Product Development,
SLMsoft.com
security related documentation.
I would prefer some kind of online documentation, white papers on these
topics.
With Regards,
a href=http://dhar.homelinux.com/dhar/Sumit Dhar/a
Manager, Research and Product Development,
SLMsoft.com
is the size of the network and the platform on
which you will install.
Somehow I have a feeling you are not looking for such a large scale
solution, are you??
a href=http://dhar.homelinux.com/dhar/Sumit Dhar/a
Manager, Research and Product Development,
SLMsoft.com
://dhar.homelinux.com/dhar/Sumit Dhar/a
Manager, Research and Product Development,
SLMsoft.com
.
a href=http://dhar.homelinux.com/dhar/Sumit Dhar/a
Manager, Business Development and Products,
SLMsoft.com
,
but specifically books on Mathematics which might have the required
information.
Cheers and Regards,
Sumit Dhar [ http://dhar.homelinux.com/dhar/ ]
Manager, Research and Product Development,
SLMsoft.com
here:
http://www.redbooks.ibm.com/pubs/pdfs/redbooks/sg245512.pdf
Anyone aware of any similar online books?
Cheers,
a href=http://dhar.homelinux.com/dhar/Sumit Dhar/a
Manager, Research and Products,
SLMsoft.com
/HOWTO/
http://developer.netscape.com/docs/manuals/security/sslin/contents.htm
And if you are looking to set up Apache+SSL, the SSL+Redhat howto might
help you...
Cheers,
a href=http://dhar.homelinux.com/dhar/Sumit Dhar/a
Manager, Business Development and Products,
SLMsoft.com
a good starting point.
Hope this helps..
Regards
a href=http://dhar.homelinux.com/dhar/Sumit Dhar/a
Manager, Business Development and Products,
SLMsoft.com
--
Key fingerprint = 1C7E AACF 1EFC 1592 F18F 5121 AB9E 9995 E45B 7464
Many that live deserve death. And some that die deserve life. Can you
it to a dictionary program for
a password cracker.
Cheers,
a href=http://dhar.homelinux.com/dhar/Sumit Dhar/a
Manager, Business Development and Products,
SLMsoft.com
from the ping program.
Can you post the output of ls -la /bin/ping ??
Regards
a href=http://dhar.homelinux.com/dhar/Sumit Dhar/a
Manager, Business Development and Products,
SLMsoft.com
--
Key fingerprint = 1C7E AACF 1EFC 1592 F18F 5121 AB9E 9995 E45B 7464
Many that live deserve death
be just the webserver couldn't it?
Or am I missing something here. Is there some way to detect proxy
servers using Nmap?
With Regards,
a href=http://dhar.homelinux.com/dhar/Sumit Dhar/a
Manager, Business Development and Products,
SLMsoft.com
--
Key fingerprint = 1C7E AACF 1EFC 1592 F18F 5121
, World Comm etc.
With Regards
a href=http://dhar.homelinux.com/dhar/Sumit Dhar/a
--
Key fingerprint = 1C7E AACF 1EFC 1592 F18F 5121 AB9E 9995 E45B 7464
Many that live deserve death. And some that die deserve life. Can you give it to them?
Then do not be too eager to deal out death in judgement
.
pub 1024D/7AB2D05A 2002-02-24 Sumit Dhar (Sumit Dhar, SLMSoft.com) [EMAIL PROTECTED]
Key fingerprint = 4A18 D20D 3D15 6C5B CD2F 8E45 B903 0C29 7AB2 D05A
... like an
indulgent teacher teaching a bunch of lil children :))
Regards
Dhar
--
Smith Wesson: The original point and click interface.
pub 1024D/7AB2D05A 2002-02-24 Sumit Dhar (Sumit Dhar, SLMSoft.com) [EMAIL PROTECTED]
Key fingerprint = 4A18 D20D 3D15 6C5B CD2F 8E45 B903 0C29 7AB2 D05A
into?
Regards
Dhar
--
Smith Wesson: The original point and click interface.
pub 1024D/7AB2D05A 2002-02-24 Sumit Dhar (Sumit Dhar, SLMSoft.com) [EMAIL PROTECTED]
Key fingerprint = 4A18 D20D 3D15 6C5B CD2F 8E45 B903 0C29 7AB2 D05A
and click interface.
pub 1024D/7AB2D05A 2002-02-24 Sumit Dhar (Sumit Dhar, SLMSoft.com) [EMAIL PROTECTED]
Key fingerprint = 4A18 D20D 3D15 6C5B CD2F 8E45 B903 0C29 7AB2 D05A
trying out Mark Horowitz's pks and openkeyserver Now,
just wondering if anyone here knows how this certifying could be done
on these keyservers??
Regards
Sumit Dhar
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Tue, 26 Feb 2002, Cflynn Tech wrote:
Recommending a book like applied cryptography to a beginner is like giving a 3 year
old a car and telling them to drive, that book is okay I have a copy but you best
know lots and lots of calculus cause
that [EMAIL PROTECTED] is really X and not some
impersonator?? Or is that beyond the jurisdiction of the key server?
Does the key server also act as some sort of Certification Authority??
If no, how can I integrate these two functions?
With Regards
Sumit Dhar
- --
pub 1024D/7AB2D05A 2002-02-24 Sumit
Hello Everyone,
Thanks for your replies. Pretty educative, though they dont exactly solve the
problems.. Let me clarify a lil bit futher..
1. Tod, your suggestion though ideal, cannot be implemented. All developers need to be
given the root account.
2. Daniel and others who suggested I
I used samspade.org trying to know what (or where) it is ..but I couldn't
figure it out ...
that IP is 208.255.95.117 ...
Here is what I got using checkdomain.com. Hope this helps.
208.255.95.117 (IP Address)
Registrant:
UUNET Technologies, Inc.
Hello All,
I was wondering the other day as to how one could go about detecting a
sniffer on the network. If it is a Shared Ethernet, I wouldn't even
try... but on a Switched Ethernet, I feel there still is a chance.
Specifically,
1. What would be the best method to see if someone is
On Mon, 11 Feb 2002 [EMAIL PROTECTED] wrote:
I tried the dsniff RPM's (no go) and now the source (ver 2.3) and am having
no luck.
Specifically I tried a configure --without-db (which works), but the make
command fails.
Try the patches available at : www.groar.org/patch/english.shtml
That
33 matches
Mail list logo