RE: Secure Media Destruction

2003-07-04 Thread Trevor Fulmer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Here is the link to the US DoD guidance:https://infosec.navy.mil/ps/?t=main/main.tagbc=main/tip21.ht ml Some of the links only work from a .mil or .gov domain, - -Original Message- From: Stephen Eaton [mailto:[EMAIL PROTECTED] Sent:

RE: HPing?

2003-07-03 Thread Trevor Cushen
Any company that does these sort of tests should include recommendations within the report they produce. The last time I used hping was to do what's called an idle host ping. It requires your host to be idle! To block the pings stop ICMP type traffic, fragmented packets should be stopped. An

Legislation on employee monitoring

2003-04-02 Thread Trevor Cushen
that might give more details on these 'rumours' Many thanks Trevor Cushen ** This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed

RE: network drive port change method?

2003-03-26 Thread Trevor Cushen
then try stunnel to re-direct the port to another port but have it in place. www.stunnel.org Will have more details. I maybe able to be of more help if you had a scenerio. Trevor Cushen -Original Message- From: SB CH [mailto:[EMAIL PROTECTED] Sent: 24 March 2003 02:39 To: [EMAIL

RE: WORD to open an IE window for URLs in documents

2003-03-20 Thread Trevor Cushen
Use the Tools-Autocorrect Options and turn off the hyperlink options under auto correct as you type tag and under the auto replace tag. Also look at the options for the ctrl+click option checkbox. This will stop web addresses from automatically becoming hyperlinks. I am using Office XP by the

RE: Any good method to check network overload?

2003-03-11 Thread Trevor Cushen
://etherape.sourceforge.net/ If I have it wrong again then my apologies. Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -Original Message- From: Burton M. Strauss III [mailto:[EMAIL PROTECTED] Sent: 09 March 2003 22:09 To: swin; [EMAIL PROTECTED] Subject: RE: Any

Single Sign On

2003-03-11 Thread Trevor Cushen
and MS-SQL. Client has one logon only or single sign on. I am looking at kerberos so if I am going down the wrong track please let me know. Many thanks Trevor Cushen ** This email and any files transmitted

RE: Any good method to check network overload?

2003-03-06 Thread Trevor Cushen
Have you looked at MRTG? http://people.ee.ethz.ch/~oetiker/webtools/mrtg/ Also Etherape and NTOP work nicely for traffic monitoring. http://etherape.sourceforge.net/ http://www.ntop.org/ntop.html Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -Original

RE: tools used to examine a computer

2003-02-25 Thread Trevor Cushen
scenerio you would use this in a far as forensics is involved but a handy tool in any arsenal. No good on raided system last time I tried it. Hope this helps and sorry again for the misdirection to sysinternals. Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499

RE: tools used to examine a computer

2003-02-25 Thread Trevor Cushen
My head is clearly not right these days. I forgot to add this to my last email. HC asked about viewing binary files such as registry. What I wanted to add was this tool http://www.evadenet.com/downloads/lophtcrack.shtml Which you could use to access the sam file. Trevor Cushen Sysnet Ltd

RE: tools used to examine a computer

2003-02-24 Thread Trevor Cushen
from your NT machine. Yes inclusing the sam files etc. Would also work to clone an NT machine to another NT machine as a copy for booting etc. Just run netcat and dd on both from floppy or even a linux both floppy. Hope this helps Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax

RE: tools used to examine a computer

2003-02-22 Thread Trevor Cushen
and can quickly be ruled out if your Chain of Evidence or Chain of Custody is in doubt. Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -Original Message- From: H C [mailto:[EMAIL PROTECTED] Sent: 20 February 2003 19:28 To: [EMAIL PROTECTED] Subject: RE

RE: Strange Connection Attempts

2003-02-20 Thread Trevor Cushen
Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -Original Message- From: Charles Hamby [mailto:[EMAIL PROTECTED]] Sent: 19 February 2003 03:50 To: [EMAIL PROTECTED] Subject: Re: Strange Connection Attempts I've been seeing 17300 scans from many places outside

RE: passwords

2003-02-20 Thread Trevor Cushen
. This is not my line of thinking nor do I have a project in the working to provide more details on a possible implementation or environment, number of users, costings etc. It is the concept that I am interested in getting feedback on just out of curiosity. Many thanks Trevor Cushen Sysnet Ltd

RE: tools used to examine a computer

2003-02-20 Thread Trevor Cushen
enforcement agencies who have the write tools and software for the job. So when running an Incident Handling operation the main thing to know is when to touch the machine at all to do anything and when to declare it serious enough for legal action to be taken. Trevor Cushen Sysnet Ltd

RE: Strange Firewall / IDS Events

2003-02-20 Thread Trevor Cushen
. Hope this helps Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -Original Message- From: Donald V. Gerkin Jr. [mailto:[EMAIL PROTECTED]] Sent: 19 February 2003 17:43 To: [EMAIL PROTECTED] Subject: Strange Firewall / IDS Events Group, I have been

RE: tools used to examine a computer

2003-02-20 Thread Trevor Cushen
http://www.crazytrain.com/seizure.html All is explained. Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -Original Message- From: H C [mailto:[EMAIL PROTECTED]] Sent: 19 February 2003 19:15 To: David J. Bianco Cc: Trevor Cushen; [EMAIL PROTECTED

RE: tools used to examine a computer

2003-02-19 Thread Trevor Cushen
the same MD5 signatures and is handy if the machine cannot be rebooted. The disk should be cloned before anything is done on the machine as in copying files or anything. The document I refered to gave a way of doing that and is accepted by law enforcement once you have the MD5 signature. Trevor

RE: tools used to examine a computer

2003-02-18 Thread Trevor Cushen
this helps By the way don't forget to note your MD5 signature before working on clones. Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -Original Message- From: H C [mailto:[EMAIL PROTECTED]] Sent: 17 February 2003 13:18 To: [EMAIL PROTECTED] Subject: re: tools

RE: tools used to examine a computer

2003-02-18 Thread Trevor Cushen
at http://www.knopper.net/knoppix/index-en.html Which might be interesting to you Hope this helps and reunites you with an excellent product Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -Original Message- From: Ivan Hernandez [mailto:[EMAIL PROTECTED

RE: Law office recommendations?

2003-02-18 Thread Trevor Cushen
to that level. I hope this helps and is relevent to you. Trevor Cushen Sysnet Ltd www.sysnet.ie -Original Message- From: Tim Heagarty [mailto:[EMAIL PROTECTED]] Sent: 17 February 2003 17:36 To: [EMAIL PROTECTED] Subject: Law office recommendations? Hello, I wish to pick the collective

RE: Win CA

2003-02-18 Thread Trevor Cushen
Does windows 2000 server not act as a CA? I'm not sure but I thought it could. www.Freeswan.org might have something Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -Original Message- From: ullmic6 [mailto:[EMAIL PROTECTED]] Sent: 16 February 2003 08

RE: security scenario

2003-02-05 Thread Trevor Cushen
Not being smart or anything but what layers in this scenerio do you see as the important ones? How would you tackle this problem? Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -Original Message- From: theog [mailto:[EMAIL PROTECTED]] Sent: 31 January

RE: Database Vulnerability Scanners

2003-02-03 Thread Trevor Cushen
I've had a lot of good experience with the ISS product and would recommend it. There are other smaller products dedicated to particular databases. MS SQL in particular. What database are you interested in if any. Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499

RE: Setting up an IDS system

2003-02-03 Thread Trevor Cushen
a pattern of the incident. I recommended two books in a previous post called 'Hacker Challenge'. These show exactly how efficent good logs can be. Good luck with all that :) Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -Original Message- From: Naman

RE: Sniffing in switched network

2003-01-31 Thread Trevor Cushen
networks. Google searches will quickly find both for you. Hope this helps. Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] Sent: 30 January 2003 12:52 To: [EMAIL PROTECTED] Subject

RE: secure vpn or telnet sessions

2003-01-31 Thread Trevor Cushen
is established. Very easy setup and very secure as really everything is encrypted and multiple authentication is used. With no hassle for the end user and easier to setup then might appear judgeing by this email. Hope this helps. Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1

RE: VNC

2003-01-31 Thread Trevor Cushen
Further Chris Berrys suggestion is the use of stunnel or tightvnc www.tightvnc.com www.stunnel.org Hope this helps Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -Original Message- From: Chris Berry [mailto:[EMAIL PROTECTED]] Sent: 30 January 2003 01

RE: Actual Security Cases

2003-01-31 Thread Trevor Cushen
Have a look at the books Hacker Challenge 1 and 2. They detail actual cases and are an excellent read. Should have what you are looking for. Details here http://www.amazon.com/exec/obidos/search-handle-form/002-0648723-3948060 Hope this helps Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353

RE: Risk analysis tools?

2003-01-31 Thread Trevor Cushen
recommended) The list goes on. Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -Original Message- From: David Gillett [mailto:[EMAIL PROTECTED]] Sent: 30 January 2003 16:55 To: [EMAIL PROTECTED] Subject: RE: Risk analysis tools? The last time I looked

RE: Router Packet Filtering and Firewalls

2003-01-31 Thread Trevor Cushen
what level of security you want and they must provide it to their customer (ie you). The customer is always right after all and yes two layers of security is always better then one. Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -Original Message- From

RE: Router Packet Filtering and Firewalls

2003-01-31 Thread Trevor Cushen
rules in my very humble oppion are needed and I certainly advise anyone who cares to listen (they are few and far between) that the router should be very secure and well hardened. I would never consider a router a firewall alternative however. Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1

RE: security scenario

2003-01-31 Thread Trevor Cushen
because all environments are different. Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -Original Message- From: theog [mailto:[EMAIL PROTECTED]] Sent: 31 January 2003 00:23 To: Chris Berry; [EMAIL PROTECTED] Subject: Re: security scenario Well , I think

RE: Monitoring office web use

2003-01-31 Thread Trevor Cushen
Etherpeek will do this too by sniffing the network. It is not free but the eval limited functionality does what you want. Runs on Windows http://www.wildpackets.com/ Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -Original Message- From: Hunt, Jim

RE: Need recommendations about IDS Systems

2003-01-29 Thread Trevor Cushen
being introduced to your network. Put the whole lot on a single linux machine with a web interface and you have a very nice solution. Google searches will find you everything you need to know on the above. Hope this helps Trevor Cushen -Original Message- From: Ivan Coric [mailto:[EMAIL

RE: any VPN program at linux?

2002-11-25 Thread Trevor Cushen
http://www.heise.de/ct/english/99/16/180/ There is a webmin module for frees/wan as well making if very easy to adminstrate. Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -Original Message- From: SB CH [mailto:[EMAIL PROTECTED]] Sent: 20 November

NFS with IPSec

2002-11-11 Thread Trevor Cushen
and encryption is a lot higher and better (imho). All is flying along very nicely but the NFS traffic, well authentication anyway won't work. I bypass the IPSec machine it all works fine. Introduce IPSec and nothing. Any ideas Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1

RE: Other way to view PIX syslog ?

2002-11-11 Thread Trevor Cushen
logging server with a nice web front end to view all the logs. Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -Original Message- From: Chris Berry [mailto:compjma;hotmail.com] Sent: 08 November 2002 19:42 To: [EMAIL PROTECTED] Subject: Re: Other way to view

RE: ARP Poisoning

2002-11-08 Thread Trevor Cushen
was added to the network then I will detect that too because it will be an unknown MAC address. I am nearly finished developing this but if anyone knows of a utility that already does this well then please let me know. Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499

Interesting one

2002-10-31 Thread Trevor Cushen
I was sent this which seemed quite a coinicence as I am eagerly following the thread on disk forensics etc. I though the rest of you would see the humour. http://w1.270.telia.com/%7Eu27007970/ghetto.htm Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499

RE: Interesting One

2002-10-31 Thread Trevor Cushen
Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -Original Message- From: maillist [mailto:maillist;avoiderman.com] Sent: 30 October 2002 06:45 To: [EMAIL PROTECTED] Subject: RE: Interesting One I disagree with you both - the NSA standard for a drive

RE: Interesting One

2002-10-31 Thread Trevor Cushen
of some disk wiping software package they just happen to sell. Do they sell something like this??? Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -Original Message- From: James Taylor [mailto:james_n_taylor;yahoo.com] Sent: 30 October 2002 04:50

RE: Interesting One

2002-10-30 Thread Trevor Cushen
on the market. If you are really unsure try posting your query to the people at Vogon. www.vogon.co.uk They are the best at this stuff bar none. Read some of their news stories for just how realistic computer forensics is. Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1

RE: WIRELESS THEFT

2002-10-17 Thread Trevor Cushen
). Your not parked in the parking lot or anything are you, or hanging of the roof with a pringles tin attached to your laptop to improve the signal Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -Original Message- From: Amit P. Gandre [mailto:agandre

RE: for help on steganography projects

2002-10-17 Thread Trevor Cushen
programs from it before that were infected. Run a virus scan before doing anything with the downloaded files. A recently updated virus scan!!! A hex viewer mighten be a bad idea either, just in case. Great site but I did get the odd dodgy file. Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1

RE: encrypt ftp service?

2002-10-17 Thread Trevor Cushen
a problem then you can change them by changing the /etc/services file and/or providing the port as part of the ftp session. Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -Original Message- From: brien mac [mailto:aph3x;linuxmail.org] Sent: 15

RE: Firewall options- which way to go

2002-10-17 Thread Trevor Cushen
which might be best if you are fairly new to Linux. It certainly makes life easier. Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -Original Message- From: Arjen De Landgraaf [mailto:arjen.de.landgraaf;cologic.co.nz] Sent: 15 October 2002 22:40

RE: Increase in traffic on port 20480 and 6667

2002-10-17 Thread Trevor Cushen
Hope this helps Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -Original Message- From: dsardina [mailto:dsardina;si.rr.com] Sent: 15 October 2002 21:41 To: Kip Sr.; [EMAIL PROTECTED] Subject: Re: Increase in traffic on port 20480 and 6667 I dont

Is SSH worth it??

2002-10-11 Thread Trevor Cushen
interesting and informative and I will let you know the final result from the report etc, (If you still care at this stage) Cheers :) Trevor Cushen ** This email and any files transmitted with it are confidential and intended

RE: Is SSH worth it??

2002-10-10 Thread Trevor Cushen
unfortunately has not read through all the domains of CISSP and doesn't really see the end benefit. Rock and Hard place springs to mind. Thanks again to all on thread. Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -Original Message- From: harley mcdonald

RE: Is SSH worth it??

2002-10-09 Thread Trevor Cushen
This man is a god amoung men, I will test this and get back to you. SSH is going in place if all this works out. I'm side tracked at the moment but will get back to it next week. Thanks again to all Trevor Cushen P.s Can I ask you for a url to more info on this expect language

Is SSH worth it??

2002-10-08 Thread Trevor Cushen
machine to set all this up and emulate the site as much as possible. I will post the final result in time. Thanks again for the feedback. Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499

Is SSH worth it??

2002-10-07 Thread Trevor Cushen
is, is it worth it. Bare in mind also that few people have passwords to the boxes and the only real threat is sniffing the traffic. All opinions welcome, thanks Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499

RE: Status Of The IT Talent Pool

2002-07-17 Thread Trevor Cushen
. The CISSP exam requires three years experience before you even get to sit the exam, for a reason. In an interview for a job you should be able to tell very quickly the real experience level of the candidate. If that experience is valid then I don't care if they are from Mars. Trevor Cushen

RE: NT/2000 vs Unix based Web Servers

2002-07-16 Thread Trevor Cushen
level of security on it and like everything else we discussed they do not come secure 'out of the box'. Access lists, and removal of services on your router are vital steps. Just take a look at what is possible with GRE tunnels to see some of the damage that can be done quite easily. Trevor Cushen

RE: NT/2000 vs Unix based Web Servers

2002-07-15 Thread Trevor Cushen
A very good point made here on what you allow to go from your web server via the firewall. Alot of people only consider the threat of what comes in. Note that there are many tools that allow traffic to 'tunnel' through port 80, so if your firewall allows traffic out from port 80 then it can be

NT Web Server V's Unix Web Servers

2002-07-15 Thread Trevor Cushen
Just an article that is worth noting to follow up on the recent discussion on IIS and *nix Web servers http://linuxtoday.com/news_story.php3?ltsn=2002-07-15-007-26-SC-SL

Freeware security products in the enterprise.

2002-07-15 Thread Trevor Cushen
Thanks Douglas, I had not heard of IPCop is some time. I see that the latest verion is 0.1.1, so I guess it is still in development. Have a look at GuardDog http://www.simonzone.com/software/guarddog/ and see what you think. I assume you are having no troubles with IPCop, I must try it.

RE: NT/2000 vs Unix based Web Servers

2002-07-12 Thread Trevor Cushen
. I can live with Trevor Cushen is an idiot you should be running X product on Y Server, see so and so web site for more details that is constructive. And even I the idiot get to learn something. But just Trevor Cushen is an idiot is useless to everyone. And finally before anyone replies, I

RE: NT/2000 vs Unix based Web Servers

2002-07-12 Thread Trevor Cushen
Scanner is web server only. Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -Original Message- From: Steve Bremer [mailto:[EMAIL PROTECTED]] Sent: 12 July 2002 14:14 To: Trevor Cushen Cc: [EMAIL PROTECTED] Subject: RE: NT/2000 vs Unix based Web Servers

RE: Personal Firewalls

2002-07-12 Thread Trevor Cushen
Tiny Personal Firewall for Windows systems GuardDog for Linux systems Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -Original Message- From: Nicole Tutt [mailto:[EMAIL PROTECTED]] Sent: 12 July 2002 18:14 To: [EMAIL PROTECTED] Subject: Personal

RE: NT/2000 vs Unix based Web Servers

2002-07-11 Thread Trevor Cushen
media is easier to build with Windows systems as more software is available for it and a better price. But again if you are up and running why change. Hope this helps if even a little Trevor Cushen Sysnet Ltd www.sysnet.ie Tel: +353 1 2983000 Fax: +353 1 2960499 -Original Message- From

Re: Single Sign On

2002-07-09 Thread Trevor Cushen
PAM or Kerberos? Try webmin for easy configuring of both. On Sun, 2002-07-07 at 21:34, ABRAHAM AJI wrote: Hello, Is there any product available on the market, whcih can make different applications running on UNIX, Single Sign On enabled with or without customization. Applications are

Re: Programming Language for security?

2002-07-08 Thread Trevor Cushen
The O'Reilly Books on Perl are the best without a doubt. Learning Perl by O'Reilly is the place to start the the Advanced Perl Programming and keep the Perl Reference by your side. All by O'Reilly and also the cheaper of the books on the market. http://perl.oreilly.com Good luck Trevor

RE: log question

2002-07-05 Thread Trevor Cushen
NOT try to connect to them direct from your site, even with a ping. Best of luck Trevor Cushen

RE: monitoring corporate internet usage

2002-06-27 Thread Trevor Cushen
for attempted exploits. Hope this helps http://www.counterpane.com/log-analysis.html#gen_parsing Good luck Trevor On Tue, 2002-06-25 at 15:57, Omar Khawaja wrote: I need to parse through syslog messages from a PIX firewall to analyze corporate users internet traffic. -Original Message

RE: monitoring corporate internet usage

2002-06-26 Thread Trevor Cushen
I used some Perl code to parse our various logs and produce a simple break down of usage. If you are unfamiliar with Perl and want to go this route then I have no problem sending you some code if you send a spec of your needs. Trevor Cushen -Original Message- From: Omar Khawaja [mailto

Cisco IOS question

2002-05-22 Thread Trevor Williams
things a little better, you might want to add some sort of AAA server instead of using terminal passwords alone. . . Thanks and have a great day, Trevor Williams Sr. Design Engineer The TechKnowledgy Center A problem well stated is a problem half solved Charles Kettering

RE: Best VLAN supporting Switch

2002-05-17 Thread Trevor Williams
have the budget for the 4006, the 3500 would be a better solution to the 2900, since it has a better switching fabric and the 3524 can come with inline power for wireless stuff and phones. . . My $.02 Thanks and have a great day, Trevor Williams Sr. Design Engineer The TechKnowledgy Center 5200

RE: Nessus follow up question.

2002-03-21 Thread Trevor Cushen
anything to do with Linux so that goes first. Then install Nessus, Sara, etc etc etc on the machine. All run perfect. VMWARE is good but hogs the machine when you run something like Nessus on it. Not comfortable to work with in my humble opion. Good luck, Trevor -Original Message- From

RE: IDS

2002-03-12 Thread Trevor Cushen
a google search before too long. Quick pointers for further investigation, Network based tools used for IDS: Snort Demarc --- also note Tcpdump Etherpeek Ethereal IPWatcher Host based IDS tools: Tripwire regmon MD5 tools stuck to think of more at the moment sorry. Good luck. Trevor

RE: Security Engineers Field Tool Kit

2002-03-09 Thread Trevor Cushen
Add DD Unix utility to the list so that disk cloning can be done of live machines. But that is just a suggestion for those who wish to build a complete kit. -Original Message- From: jon schatz [mailto:[EMAIL PROTECTED]] Sent: 06 March 2002 00:00 To: Pradeep Pillai Cc: [EMAIL PROTECTED]

RE: Security Auditing / Assesments

2002-03-09 Thread Trevor Cushen
http://www.isaca.org/standard/guidelne.htm -Original Message- From: Chad [mailto:[EMAIL PROTECTED]] Sent: 05 March 2002 20:26 To: [EMAIL PROTECTED] Subject: Security Auditing / Assesments I am looking for a good reference or some established guidelines for performing a professional

Re: detecting wireless access points

2002-03-05 Thread Trevor
Even if you had your setup as an AdHoc system running VPN over it? - Original Message - From: [EMAIL PROTECTED] To: Trevor S [EMAIL PROTECTED]; Marc Eiler (Volt) [EMAIL PROTECTED]; Hornat, Charles [EMAIL PROTECTED]; [EMAIL PROTECTED] Sent: Tuesday, March 05, 2002 4:02 AM Subject: RE

RE: Alternatives to Kerberos

2002-03-05 Thread Trevor Cushen
. Tough enough to setup but certainly possible. Good Luck. Trevor p.s. The VPN side I am sure of as I have set it up already, working nicely too. The Kerberos I am in the middle of and Microsoft documents and Linux documents are what I am going by so I am open for correction

Re: detecting wireless access points

2002-03-04 Thread Trevor S
Do sniffers like AirSnort detect the MAC addresses of the devices that are being used? On Thursday 28 February 2002 04:36 pm, Marc Eiler (Volt) wrote: Depending on the brand of transceiver that you are using, you may be able to add all of the MAC addresses of the access points that you are

RE: remote packet capture?

2002-02-17 Thread Trevor Cushen
VNC can be used on both platforms. Etherpeek will also run on Windows if needed. If you just want a packet capture and display tool then NTOP listens on a port and any web browser can connect to view network activity. There are also many X11 emulators for windows that can act as windows to the

RE: remote packet capture?--VIRUS WARNING

2002-02-17 Thread Trevor Cushen
Eoin, I downloaded that x-deep package again to test it was indeed the one I was talking about. I got it from that site I sent you. My Anti-Virus software shows two of the files as infected. Please be carefull if you use that URL I posted to you. Trevor -Original Message- From: Eric

RE: Databases

2002-02-17 Thread Trevor Cushen
All documents and experience I have of this is using a three tier solution. Internet --- firewall --- web box firewall --- database IPSec between web box and database. All boxes hardened etc. Firewalls different systems to avoid one exploit giving full through access. Microsoft site has a