RE: Modem connection

2003-08-14 Thread Tim Donahue
before they appear! Visit www.PopSwatter.com now - It's FREE. -- - -- -- Tim Donahue ---

RE: Cisco Workaround

2003-07-28 Thread Tim Donahue
together. Tim Donahue -Original Message- From: Ghaith Nasrawi [mailto:[EMAIL PROTECTED] Sent: Friday, July 25, 2003 11:33 AM Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: RE: Cisco Workaround Well, my question is; what the hell if I was using any of these protocols?? Didn't

RE: Wireless Device Security

2003-03-25 Thread Tim Donahue
be done in the BSD's, Free Open and Net, with Orinoco and several brands of cards, but I have not had time to test it myself). You would host the VPN off this machine, and would (to some degree) secure your network. Tim Donahue PS. I'd love to hear what solution you come up

RE: Firewall recommendations?

2003-03-12 Thread Tim Donahue
) with OpenBSD to handle all my VPN applications. Eventually I plan on replacing my Watchguard with another OpenBSD box. Check out www.openbsd.com for more information. Tim Donahue -Original Message- From: Thorsten Dampf -- 7stein.net [mailto:[EMAIL PROTECTED] Sent: Friday, March 07, 2003 3

RE: Unwanted programs on Win2K

2003-02-07 Thread Tim Donahue
that you need root access for. Then you would only have to worry about your password being comprimised. Tim Donahue

RE: Unwanted programs on Win2K

2003-02-05 Thread Tim Donahue
I recommend the book Hacking Windows 2000 Exposed (ISBN 0072192623) it is an book that covers many vunerabilites on a Windows 2000 based computer. Tim Donahue -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] Sent: Saturday, February 01, 2003 6:38 PM To: [EMAIL

RE: Interesting One

2002-10-31 Thread Tim Donahue
? My guess would be we are at that point now, because we have to use so many resources to be reasonably sure that the data is unrecoverable, that is is cost effective to just destroy the drive and purchase a replacement for it. Tim Donahue -Original Message- From: Chris Chandler

RE: Allowing secure external access.

2002-10-30 Thread Tim Donahue
If it is more than one person that needs remote access, you might look into setting up a Citrix server. Citrix is capable of using SSL encryption. If it is only one person you could use VNC over a SSH connection, or even a SSH tunnel to a Win XP box's remote desktop. Tim Donahue

RE: Interesting One

2002-10-30 Thread Tim Donahue
Yes, it can be done.. it would cost about 100k per drive and the ability to access an electron scanning microscope. At 30 times I highly doubt they could recover anything of any value anyway. Using most commercially available products like Encase, you can recover files that have been

RE: SETI@Home - Safe or Exploitable?

2002-10-25 Thread Tim Donahue
theoretically be exploited. (sending a trojaned, etc program through it) Tim Donahue -Original Message- From: Trevor Cushen [mailto:Trevor.Cushen;sysnet.ie] Sent: Thursday, October 24, 2002 5:22 AM To: [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Subject: RE: SETI@Home - Safe or Exploitable

RE: How NOT to protect worker privacy

2002-10-22 Thread Tim Donahue
I don't know about anyone else, but the only people that I care if they know how to reach me get an email directly from me. -Original Message- From: Alaric Darconville [mailto:alaric;cowboy.net] Sent: Friday, October 18, 2002 4:20 PM To: [EMAIL PROTECTED] Subject: How NOT to

Smart Card logons

2002-07-18 Thread Tim Donahue
will cause any conflicts there? Thanks Tim Donahue

RE: Tracing physical machines on DHCP networks

2002-07-15 Thread Tim Donahue
Try the command nbtstat -A xxx.xxx.xxx.xxx From an 2000 box I get back the name of the computer. That might help you trace the machine that is giving you a problem. Tim Donahue -Original Message- From: Blaxes [mailto:[EMAIL PROTECTED]] Sent: Sunday, July 14, 2002 9:44 AM

RE: Personal Firewalls

2002-07-14 Thread Tim Donahue
that they use. Tim Donahue -Original Message- From: Nicole Tutt [mailto:[EMAIL PROTECTED]] Sent: Friday, July 12, 2002 1:14 PM To: [EMAIL PROTECTED] Subject: Personal Firewalls My company has a VERY distributed user base with many people working from small satellite sites and/or from

RE: Wireless LAN question

2002-07-03 Thread Tim Donahue
I apologize for the 100 yard comment. I was basing this on personal experience, and had not thought of people using high gain antennas. Tim Donahue -Original Message- From: Robert Lupo [mailto:[EMAIL PROTECTED]] Sent: Tuesday, July 02, 2002 2:09 PM To: 'Christopher Rector'; 'Tim

RE: Wireless LAN question

2002-07-01 Thread Tim Donahue
We are talking about 2 completely unrelated technologies here. Unless there is some part of the spec that I don't know about. Besides, you can be assured that the intruder is within a 100 yards or so of the acess point. Tim Donahue -Original Message- From: David Laganière [mailto

RE: can someone decipher this?

2002-06-29 Thread Tim Donahue
Umm... I wouldn't use any tool except one that comes from a known virus authority, ie McAfee or Symantec. This is one of the ways that the Klez family of virus's is known to spread. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] Sent: Tuesday, June 25, 2002 10:17

RE: Need a Full Drive Encryption program

2002-06-01 Thread Tim Donahue
Make sure that the exec's don't keep the passwords written on a sheet of paper in the laptop. If they are anything like our exec's then the encryption won't do anything, because the key will be in the bag. Tim Donahue -Original Message- From: Trotter, Brian [mailto:[EMAIL PROTECTED

RE: Security in SOHO

2002-05-09 Thread Tim Donahue
-1421662-1296768 Tim Donahue -Original Message- From: Angelo Perniola [mailto:[EMAIL PROTECTED]] Sent: Wednesday, May 08, 2002 4:52 PM To: Alex Tarata Cc: [EMAIL PROTECTED] Subject: Re: Security in SOHO Hi Alex, I am not really the most appropriate person to answer to your questions

RE: High Energy Degaussers

2002-05-03 Thread Tim Donahue
The only way to be sure is to destroy the hard drive. The reccommended way is by fire, ie an incinerator. Tim Donahue -Original Message- From: Orlando J. Cano [mailto:[EMAIL PROTECTED]] Sent: Thursday, May 02, 2002 8:30 PM To: [EMAIL PROTECTED] Subject: High Energy Degaussers I

RE: Zonealarm log - what is this?

2002-04-19 Thread Tim Donahue
Yes, many of them continue to run in the background. Check in your system tray for icons that belong to them. Tim Donahue -Original Message- From: Thomas Madhavan [mailto:[EMAIL PROTECTED]] Sent: Wednesday, April 17, 2002 3:27 PM To: [EMAIL PROTECTED] Subject: Re: Zonealarm log - what

RE: Apple vs. MS - more secure?

2002-03-29 Thread Tim Donahue
Does anyone have any evidence to support this? Tim Donahue -Original Message- From: Ash [mailto:[EMAIL PROTECTED]] Sent: Saturday, March 30, 2002 12:37 AM To: Justin Kremer Cc: [EMAIL PROTECTED] Subject: Re: Apple vs. MS - more secure? IMHO I would say OS X is more secure

RE: Disk Wiping Utilities

2002-03-28 Thread Tim Donahue
Gdisk if you have symantec ghost. Use the command gdisk [disk number] /del /all /dodwipe This runs a DOD wipe of the specified hard drive Tim Donahue -Original Message- From: Dan Williamson [mailto:[EMAIL PROTECTED]] Sent: Tuesday, March 26, 2002 5:14 PM To: [EMAIL PROTECTED

RE: yet another link

2002-03-22 Thread Tim Donahue
I thought that the NSA key was supposed to be the encryption system that the NSA developed? Am I mistaken? Tim Donahue -Original Message- From: leon [mailto:[EMAIL PROTECTED]] Sent: Wednesday, March 20, 2002 11:10 PM To: [EMAIL PROTECTED] Subject: yet another link -BEGIN PGP

RE: PGP for XP

2002-03-20 Thread Tim Donahue
I have PGP freeware running on my XP computer. It is version 7.0.3 Tim Donahue -Original Message- From: [C] Teodorski, Chris [mailto:[EMAIL PROTECTED]] Sent: Monday, March 18, 2002 3:51 PM To: [EMAIL PROTECTED] Subject: PGP for XP From what I understand there is no PGP