RE: information security university degree - Centers of Excellence

2003-03-05 Thread Tim V - DZ
Well if you're going to plug then... The University of Nebraska at Omaha is a COE also http://nucia.ist.unomaha.edu/coe.html Or for the list members wandering what other university may or may not be a COE here's a list of all 36: http://www.nsa.

RE: tools used to examine a computer

2003-02-25 Thread Tim V - DZ
Probably looking for something like http://unxutils.sourceforge.net/ -t is Disney World the only People Trap operated by a mouse? > Go to www.sysinternals.com and get the Unix Utils which > will include dd and netcat for Windows Sys

RE: Suggestions Needed

2003-02-25 Thread Tim V - DZ
I would recommend using a task-specific product like Smoothwall (www.smoothwall.org) it's designed to do just firewall-things. And if you really want a firewall, you should not use the machine for anything else, so the argument that 'using a full blown Install is preferred because you can toy aro

RE: wireless security question.

2003-02-20 Thread Tim V - DZ
Totally agreed. WEP is wired equivalency...it's just a deterrent, most don't realize that. 1) lock down the AP as tight as you can then make the AP's IP non-routable, on it's own network that can't make it past the firewall, put it in a DMZ, pick-your-poison, etc. Then use your authenticated VPN

RE: passwords

2003-02-19 Thread Tim V - DZ
Yes, no,yes...no. You definitely need 'strong' passwords. And they definitely need to be changed on some time basis. The complexity of the password and the time length and schedule of changing depends on the environment. Are you protecting Top Secret Data or a single computer containing fa

RE: Unwanted programs on Win2K

2003-02-05 Thread Tim V - DZ
s- In my experience it's the 2nd one that usually gets you. If you write and app that is for the most part self sustaining, when you create an 'installer' there is no requirement that the installer asks for a administrator password. If you have access to write and execute to any directory on th

RE: careful! (was: Re: Security+

2003-01-24 Thread Tim V - DZ
Or expulsion...for the students on the list. -t -Original Message- From: Meritt James [mailto:[EMAIL PROTECTED]] Sent: Wednesday, January 22, 2003 8:27 AM To: Shaw Kevin Cc: [EMAIL PROTECTED] Subject: careful! (was: Re: Security+ Be very, very careful. Not only do some businesses "not

RE: Outlook and Win2K

2003-01-24 Thread Tim V - DZ
Do it once and mirror it out with ghost. Or get something like RegShot and take a snapshot of the registry. Then make all your changes to that machine...software settings etc Then take the second snapshot and compare. (this shows all the registry changes that took place) Then make a .reg script th

RE: NT4 Network Neighborhood

2003-01-19 Thread Tim V - DZ
Not really, Add: Hive: HKEY_CURRENT_USER Key: Software\Microsoft\Windows\CurrentVersion\Policies\Network Name: NoEntireNetwork Type: REG_DWORD Value: 1 Change: Hive: HKEY_CURRENT_USER Key: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer Name: NoNetConnectDisconnect Type: REG_DWORD V

RE: Potetial Outpost Conflicts?

2003-01-17 Thread Tim V - DZ
Colin- Sorry for the book, but I typed a bit more on each question than I was expecting There are a multitude of things that go wrong when running multiple software firewalls. Traditionally a firewall looks something like: Internet --- firewall --- network or computer The whole idea is to

Blocking personal email

2002-11-28 Thread Tim V - DZ
In a company using the exchange / outlook combination is there any way to block users from using outlook to receive non-exchange mail? We are concerned about people adding their personal email to the Outlook accounts and subsequently being exposed to more viruses. The mail that goes through excha

RE: Registry restrict

2002-10-22 Thread Tim V - DZ
There are several programs around that can restrict use to the registry... non-administrator account have restricted access - try installing adobe acrobat or AutoCAD 2000 on a "user" computer (not "power user"). You have to edit keys to suppress warnings... But if you individually want control t

RE: how to tell when a file was last read

2002-07-24 Thread Tim V - DZ
In linux an ls -l should show you the last time a file was modified, in windows modified and accessed it's a property of the file so just right-click on it and choose properties I know it works on NTFS and FAT32. As far as I know you can't trust the dates though, there are "touch" programs that a

RE: Digital Signatures

2002-07-24 Thread Tim V - DZ
Watch out, the nice gui version the integrates with Outlook and such, does NOT play nicely with the XP TPC/IP stack. -t -Original Message- From: RUSSELL T. LEWIS [mailto:[EMAIL PROTECTED]] Sent: Tuesday, July 23, 2002 7:28 AM To: [EMAIL PROTECTED] Subject: Re: Digital Signatures I've

RE: msn messenger protocol

2002-07-24 Thread Tim V - DZ
Trillian will also let you run encrypted connections to other trillian users using the existing networks (like ICQ). $0.02 -t -Original Message- From: RUSSELL T. LEWIS [mailto:[EMAIL PROTECTED]] Sent: Tuesday, July 23, 2002 6:57 AM To: [EMAIL PROTECTED] Subject: Re: msn messenger proto

RE: Wireless LAN question

2002-07-07 Thread Tim V - DZ
That's been around a while http://www.oreillynet.com/lpt/wlg/448 Gooling for wireless + antenna + pringles will probably get you a couple other versions to help with the actually making also. -t -Original Message- From: jmiller [mailto:[EMAIL PROTECTED]] Sent: Tuesday, July 02,

RE: Remote control

2002-07-01 Thread Tim V - DZ
I concur, at least for version's 2.0 and 2.1 Radmin should default to using TCP 4899 but can be configured to use any TCP port under Radmin Settings or at the command prompt using the /port: switch (ie r_server.exe /port:5001 ). If you do change your port don't forget to change it on both comp

RE: Password strength

2002-06-29 Thread Tim V - DZ
There is actually a thread going on right now in the Security-Basics list that is very similar to this... Basically this is an issue of keyspace, for example if you're password is only one letter and you can only choose from lowercase letters, a cracking program (like L0phtcrack or whatever) woul

RE: Modem Security

2002-06-11 Thread Tim V - DZ
In addition to the personal firewall consider a "Call-Back." Where the users home phone is statically entered and when the a call is placed into the modem, the connection is terminated and the modem automatically calls the users home computer back to establish the connection. -Original Mes

RE: Active Directory Security Migration Questions:

2002-05-14 Thread Tim V(@DZ)
Going to Native Mode from Mixed Mode on a smaller network will basically just add the "Universal Group". Native mode is actually where the 2-way transitive trusts that Win2K has that is touted as a huge improvement over NT's 1-way trusts. (ie if Domian A trusts B and B trusts C then in Win2K A a

RE: low budget vpn

2002-05-14 Thread Tim V(@DZ)
Actually no, the GPL version is designed to only allow VPN from Smoothwall to Smoothwall, but if you browse the web and info lists enough (or just know enough about linux) you can get other things going. SmoothTunnel, SmoothHost, and the other modules are for the Corp version, which has some bene

User Log off

2002-05-14 Thread Tim V(@DZ)
Does anyone know of group policies, software, configurations that will automatically log a user off after a specific amount of time? Basically, people staying logged in is bad for a whole slew of privacy and security reasons (as you all know). My users seem to have trouble understanding this. I

RE: Low budget VPN?????

2002-05-13 Thread Tim V(@DZ)
Or the original: www.smoothwall.org -t -Original Message- From: Adam Shephard [mailto:[EMAIL PROTECTED]] Sent: Wednesday, May 08, 2002 4:32 PM To: '[EMAIL PROTECTED]'; [EMAIL PROTECTED] Subject: RE: Low budget VPN? Check out http://www.ipcop.org -Original Message- From

RE: IDS

2002-05-01 Thread Tim V(@DZ)
Does anyone know if this is possible with a 3COM SuperStack Switch?...the particular models I have are 3000 series. It appears to me that you can only mirror the traffic of one specified physical port to another specified physical port. I'm pretty sure that setting up trunks or VLANs would not c

RE: Question on broadband IP routers using NAT

2002-04-23 Thread Tim V(@DZ)
I know some resellers of the old @home ISP service had terrible hierarchies will regaurd to support phone calls. In my opinion if you aren't talking to somebody that actually had the capability of increasing CPE or in some other way releasing the MAC of your Ethernet card in about 20 minutes or s

RE: Windows 98 lockdown

2002-04-05 Thread Tim V(@DZ)
I haven't been on this list too long, but I've been seen various emails on all kinds of policy and lockdown and closing ports and limiting physical access etc How can a 1.5 MB piece of software that costs $60 secure Windows 9x? For that matter how can that software work for Windows 9x, NT, and 20

RE: Hardware Firewall ??? choose one !

2002-03-22 Thread Tim V(@DZ)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Smoothwall. www.smoothwall.org it's free. It's a striped down linux kernel that you install from a bootable CD you download. So you need a computer that will be used for just this - nothing else. The good news is that the computer can be puny.

RE: Excel File

2002-03-01 Thread Tim V(@DZ)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Office password protection is basically a joke. Especially the earlier stuff. If you really want to protect something you need to PGP it or the like. This link should get you started: http://www.password-crackers.com/crack1.html Obviously, not

RE: Windows XP Firewall

2002-02-21 Thread Tim V(@DZ)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Raymond: If you are going to use a software firewall, personally I feel you should invest in zonealarm or at least use some other third party solution like zonealarm or tiny. To me, A) anything by MS is subject to scrutiny and B) anything that dis

College advice

2002-02-21 Thread Tim V(@DZ)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 The NSA will actually pay for some or all of your higher education if you stick with computer security. The catch is you have to go to one of the approved schools. The only one I remember from the list was ISU. Then you are required to work for t