before they appear!
Visit www.PopSwatter.com now - It's FREE.
--
-
--
--
Tim Donahue
---
together.
Tim Donahue
-Original Message-
From: Ghaith Nasrawi [mailto:[EMAIL PROTECTED]
Sent: Friday, July 25, 2003 11:33 AM
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: RE: Cisco Workaround
Well, my question is; what the hell if I was using any of
these protocols?? Didn't
be done in the BSD's, Free Open and Net, with
Orinoco and several brands of cards, but I have not had time to test it
myself). You would host the VPN off this machine, and would (to some
degree) secure your network.
Tim Donahue
PS. I'd love to hear what solution you come up
) with OpenBSD
to handle all my VPN applications. Eventually I plan on replacing my
Watchguard with another OpenBSD box. Check out www.openbsd.com for more
information.
Tim Donahue
-Original Message-
From: Thorsten Dampf -- 7stein.net [mailto:[EMAIL PROTECTED]
Sent: Friday, March 07, 2003 3
that you need root access for. Then you
would only have to worry about your password being comprimised.
Tim Donahue
I recommend the book Hacking Windows 2000 Exposed (ISBN 0072192623) it is an
book that covers many vunerabilites on a Windows 2000 based computer.
Tim Donahue
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Saturday, February 01, 2003 6:38 PM
To: [EMAIL
? My guess would be we are at that point now, because
we have to use so many resources to be reasonably sure that the data is
unrecoverable, that is is cost effective to just destroy the drive and
purchase a replacement for it.
Tim Donahue
-Original Message-
From: Chris Chandler
If it is more than one person that needs remote access, you might look into
setting up a Citrix server. Citrix is capable of using SSL encryption.
If it is only one person you could use VNC over a SSH connection, or even a
SSH tunnel to a Win XP box's remote desktop.
Tim Donahue
Yes, it can be done.. it would cost about 100k per drive and
the ability to access an electron scanning microscope. At 30
times I highly doubt they could recover anything of any value
anyway. Using most commercially available products like
Encase, you can recover files that have been
theoretically be exploited. (sending a trojaned, etc program through it)
Tim Donahue
-Original Message-
From: Trevor Cushen [mailto:Trevor.Cushen;sysnet.ie]
Sent: Thursday, October 24, 2002 5:22 AM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: RE: SETI@Home - Safe or Exploitable
I don't know about anyone else, but the only people that I care if they know
how to reach me get an email directly from me.
-Original Message-
From: Alaric Darconville [mailto:alaric;cowboy.net]
Sent: Friday, October 18, 2002 4:20 PM
To: [EMAIL PROTECTED]
Subject: How NOT to
will cause any conflicts there?
Thanks
Tim Donahue
Try the command
nbtstat -A xxx.xxx.xxx.xxx
From an 2000 box I get back the name of the computer. That might help you
trace the machine that is giving you a problem.
Tim Donahue
-Original Message-
From: Blaxes [mailto:[EMAIL PROTECTED]]
Sent: Sunday, July 14, 2002 9:44 AM
that they use.
Tim Donahue
-Original Message-
From: Nicole Tutt [mailto:[EMAIL PROTECTED]]
Sent: Friday, July 12, 2002 1:14 PM
To: [EMAIL PROTECTED]
Subject: Personal Firewalls
My company has a VERY distributed user base with many people working from
small satellite sites and/or from
I apologize for the 100 yard comment. I was basing this on personal
experience, and had not thought of people using high gain antennas.
Tim Donahue
-Original Message-
From: Robert Lupo [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, July 02, 2002 2:09 PM
To: 'Christopher Rector'; 'Tim
We are talking about 2 completely unrelated technologies here. Unless there
is some part of the spec that I don't know about. Besides, you can be
assured that the intruder is within a 100 yards or so of the acess point.
Tim Donahue
-Original Message-
From: David Laganière [mailto
Umm... I wouldn't use any tool except one that comes from a known virus
authority, ie McAfee or Symantec. This is one of the ways that the Klez
family of virus's is known to spread.
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, June 25, 2002 10:17
Make sure that the exec's don't keep the passwords written on a sheet of
paper in the laptop. If they are anything like our exec's then the
encryption won't do anything, because the key will be in the bag.
Tim Donahue
-Original Message-
From: Trotter, Brian [mailto:[EMAIL PROTECTED
-1421662-1296768
Tim Donahue
-Original Message-
From: Angelo Perniola [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, May 08, 2002 4:52 PM
To: Alex Tarata
Cc: [EMAIL PROTECTED]
Subject: Re: Security in SOHO
Hi Alex,
I am not really the most appropriate person to answer to your questions
The only way to be sure is to destroy the hard drive. The reccommended way
is by fire, ie an incinerator.
Tim Donahue
-Original Message-
From: Orlando J. Cano [mailto:[EMAIL PROTECTED]]
Sent: Thursday, May 02, 2002 8:30 PM
To: [EMAIL PROTECTED]
Subject: High Energy Degaussers
I
Yes, many of them continue to run in the background. Check in your system
tray for icons that belong to them.
Tim Donahue
-Original Message-
From: Thomas Madhavan [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, April 17, 2002 3:27 PM
To: [EMAIL PROTECTED]
Subject: Re: Zonealarm log - what
Does anyone have any evidence to support this?
Tim Donahue
-Original Message-
From: Ash [mailto:[EMAIL PROTECTED]]
Sent: Saturday, March 30, 2002 12:37 AM
To: Justin Kremer
Cc: [EMAIL PROTECTED]
Subject: Re: Apple vs. MS - more secure?
IMHO I would say OS X is more secure
Gdisk if you have symantec ghost. Use the command
gdisk [disk number] /del /all /dodwipe
This runs a DOD wipe of the specified hard drive
Tim Donahue
-Original Message-
From: Dan Williamson [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, March 26, 2002 5:14 PM
To: [EMAIL PROTECTED
I thought that the NSA key was supposed to be the encryption system that the
NSA developed? Am I mistaken?
Tim Donahue
-Original Message-
From: leon [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, March 20, 2002 11:10 PM
To: [EMAIL PROTECTED]
Subject: yet another link
-BEGIN PGP
I have PGP freeware running on my XP computer. It is version 7.0.3
Tim Donahue
-Original Message-
From: [C] Teodorski, Chris [mailto:[EMAIL PROTECTED]]
Sent: Monday, March 18, 2002 3:51 PM
To: [EMAIL PROTECTED]
Subject: PGP for XP
From what I understand there is no PGP
25 matches
Mail list logo