Well if you're going to plug then...
The University of Nebraska at Omaha is a COE also
http://nucia.ist.unomaha.edu/coe.html
Or for the list members wandering what other university may or may not
be a COE here's a list of all 36:
http://www.nsa.
Probably looking for something like
http://unxutils.sourceforge.net/
-t
is Disney World the only People Trap operated by a mouse?
> Go to www.sysinternals.com and get the Unix Utils
which
> will include dd and netcat for Windows
Sys
I would recommend using a task-specific product like Smoothwall
(www.smoothwall.org) it's designed to do just firewall-things. And if
you really want a firewall, you should not use the machine for anything
else, so the argument that 'using a full blown Install is preferred because you can toy aro
Totally agreed. WEP is wired equivalency...it's just a deterrent, most
don't realize that.
1) lock down the AP as tight as you can then make the AP's IP
non-routable, on it's own network that can't make it past the firewall,
put it in a DMZ, pick-your-poison, etc. Then use your authenticated VPN
Yes, no,yes...no.
You definitely need 'strong' passwords. And they definitely need to be
changed on some time basis. The complexity of the password and the time
length and schedule of changing depends on the environment. Are you
protecting Top Secret Data or a single computer containing fa
s-
In my experience it's the 2nd one that usually gets you. If you write
and app that is for the most part self sustaining, when you create an
'installer' there is no requirement that the installer asks for a
administrator password.
If you have access to write and execute to any directory on th
Or expulsion...for the students on the list.
-t
-Original Message-
From: Meritt James [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, January 22, 2003 8:27 AM
To: Shaw Kevin
Cc: [EMAIL PROTECTED]
Subject: careful! (was: Re: Security+
Be very, very careful. Not only do some businesses "not
Do it once and mirror it out with ghost.
Or get something like RegShot and take a snapshot of the registry.
Then make all your changes to that machine...software settings etc
Then take the second snapshot and compare. (this shows all the registry
changes that took place)
Then make a .reg script th
Not really,
Add:
Hive: HKEY_CURRENT_USER
Key: Software\Microsoft\Windows\CurrentVersion\Policies\Network
Name: NoEntireNetwork
Type: REG_DWORD
Value: 1
Change:
Hive: HKEY_CURRENT_USER
Key: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Name: NoNetConnectDisconnect
Type: REG_DWORD
V
Colin-
Sorry for the book, but I typed a bit more on each question than I was
expecting
There are a multitude of things that go wrong when running multiple
software firewalls. Traditionally a firewall looks something like:
Internet --- firewall --- network or computer
The whole idea is to
In a company using the exchange / outlook combination is there any way
to block users from using outlook to receive non-exchange mail? We are
concerned about people adding their personal email to the Outlook
accounts and subsequently being exposed to more viruses. The mail that
goes through excha
There are several programs around that can restrict use to the
registry...
non-administrator account have restricted access - try installing adobe
acrobat or AutoCAD 2000 on a "user" computer (not "power user"). You
have to edit keys to suppress warnings...
But if you individually want control t
In linux an ls -l should show you the last time a file was modified, in
windows modified and accessed it's a property of the file so just
right-click on it and choose properties I know it works on NTFS and
FAT32.
As far as I know you can't trust the dates though, there are "touch"
programs that a
Watch out, the nice gui version the integrates with Outlook and such,
does NOT play nicely with the XP TPC/IP stack.
-t
-Original Message-
From: RUSSELL T. LEWIS [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, July 23, 2002 7:28 AM
To: [EMAIL PROTECTED]
Subject: Re: Digital Signatures
I've
Trillian will also let you run encrypted connections to other trillian
users using the existing networks (like ICQ).
$0.02
-t
-Original Message-
From: RUSSELL T. LEWIS [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, July 23, 2002 6:57 AM
To: [EMAIL PROTECTED]
Subject: Re: msn messenger proto
That's been around a while
http://www.oreillynet.com/lpt/wlg/448
Gooling for wireless + antenna + pringles will probably get you a
couple other versions to help with the actually making also.
-t
-Original Message-
From: jmiller [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, July 02,
I concur, at least for version's 2.0 and 2.1 Radmin should default to using TCP 4899
but can be configured to use any TCP port under Radmin Settings or at the command
prompt using the /port: switch (ie r_server.exe /port:5001 ). If you do change your
port don't forget to change it on both comp
There is actually a thread going on right now in the Security-Basics
list that is very similar to this...
Basically this is an issue of keyspace, for example if you're password
is only one letter and you can only choose from lowercase letters, a
cracking program (like L0phtcrack or whatever) woul
In addition to the personal firewall consider a "Call-Back." Where the
users home phone is statically entered and when the a call is placed
into the modem, the connection is terminated and the modem automatically
calls the users home computer back to establish the connection.
-Original Mes
Going to Native Mode from Mixed Mode on a smaller network will basically
just add the "Universal Group". Native mode is actually where the 2-way
transitive trusts that Win2K has that is touted as a huge improvement
over NT's 1-way trusts. (ie if Domian A trusts B and B trusts C then in
Win2K A a
Actually no, the GPL version is designed to only allow VPN from
Smoothwall to Smoothwall, but if you browse the web and info lists
enough (or just know enough about linux) you can get other things going.
SmoothTunnel, SmoothHost, and the other modules are for the Corp
version, which has some bene
Does anyone know of group policies, software, configurations that will
automatically log a user off after a specific amount of time?
Basically, people staying logged in is bad for a whole slew of privacy
and security reasons (as you all know). My users seem to have trouble
understanding this. I
Or the original: www.smoothwall.org
-t
-Original Message-
From: Adam Shephard [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, May 08, 2002 4:32 PM
To: '[EMAIL PROTECTED]';
[EMAIL PROTECTED]
Subject: RE: Low budget VPN?
Check out http://www.ipcop.org
-Original Message-
From
Does anyone know if this is possible with a 3COM SuperStack
Switch?...the particular models I have are 3000 series. It appears to
me that you can only mirror the traffic of one specified physical port
to another specified physical port. I'm pretty sure that setting up
trunks or VLANs would not c
I know some resellers of the old @home ISP service had terrible
hierarchies will regaurd to support phone calls. In my opinion if you
aren't talking to somebody that actually had the capability of
increasing CPE or in some other way releasing the MAC of your Ethernet
card in about 20 minutes or s
I haven't been on this list too long, but I've been seen various emails
on all kinds of policy and lockdown and closing ports and limiting
physical access etc
How can a 1.5 MB piece of software that costs $60 secure Windows 9x?
For that matter how can that software work for Windows 9x, NT, and 20
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Smoothwall. www.smoothwall.org it's free. It's a striped down
linux kernel that you install from a bootable CD you download. So you
need a computer that will be used for just this - nothing else. The
good news is that the computer can be puny.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Office password protection is basically a joke. Especially the
earlier stuff. If you really want to protect something you need to
PGP it or the like. This link should get you started:
http://www.password-crackers.com/crack1.html
Obviously, not
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Raymond:
If you are going to use a software firewall, personally I feel you
should invest in zonealarm or at least use some other third party
solution like zonealarm or tiny. To me, A) anything by MS is subject
to scrutiny and B) anything that dis
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
The NSA will actually pay for some or all of your higher education if
you stick with computer security. The catch is you have to go to one
of the approved schools. The only one I remember from the list was
ISU. Then you are required to work for t
30 matches
Mail list logo