s they are
> right now.
yes.
>
> ---
> Further I am trying to use dtk on my system. There isn't any literature for
> that work around.
sorry - i am not familiar with dtk
>
> Any suggestions are appreciated.
> Thank you
> Aman
>
> >From: ___cliff rayman_
aman raheja wrote:
> Thank you Sir
> My output says:
> [xinetd.d]# ldd /usr/sbin/xinetd
> libnsl.so.1 => /lib/libnsl.so.1 (0x4002d000)
> libm.so.6 => /lib/i686/libm.so.6 (0x40044000)
> libcrypt.so.1 => /lib/libcrypt.so.1 (0x40068000)
> libc.so.6 => /lib/i686/libc.s
http://www.modssl.org/
Constance Baptist wrote:
> Hello All,
> Can anyone share some websites about SSL. I have done a search on this, but
--
___cliff [EMAIL PROTECTED]http://www.genwax.com/
continually patching a buggy product does not make it safer.
IE and outlook are insecure because of their design. the chance
of future exploits is very high.
i would not consider netscape a secure product, but i definetly
consider it to be far safer the IE/outlook.
Gilles Poiret wrote:
> So I'
the 7.2 script is still in beta, but it is working solidly
and it is probably the most mature and complete hardening
script out there, even in it's beta state.
you can download it from:
http://sourceforge.net/project/showfiles.php?group_id=403&release_id=75042
hth,
cliff
leon wrote:
> -BE
Todd Suiter wrote:
> I highly recommend Demarc, you cannot beat the price (though there are
what is the price? it is not clear on their website. i don't want to get
addicted to a tool and then have it become very expensive somewhere
down the line. i see that it is free for 25 employees and und
Clinton McLeay wrote:
> Is there any way to help this situation? How possible is it for us to
> put a firewall BEFORE the T1 line to block all of this before it hits
> our poor little line, or would this even help? I don't know if this
> would even be possible?
not at all possible unless your is
snow white and the seven dwarfs still bangs on our door
several times a month. same boring story.
JL wrote:
> Tonight I received an old friend in one of my mail boxes, Snow White and
> the Seven Dwarfs... the real story.
>
> Anyone else get this old virus on their doorstep?
--
___cliff [EM
Bourque Daniel wrote:
> Normally, you want your FW to be as invisible as possible (black hole) so
> you just drop all incoming packet that are not specifically allowed in by a
> rule. What you can't see can only be attack by guessing. Rejecting give
> back information to the bad guy...
hmmm...
this is system dependent. i don't believe snort will see the
traffic on a linux box, but it will on an openBSD box. i think
this is a result of where the promisicous device is located
in the kernel structures. on linux, it is obviously after the firewall
code, on openBSD it appears to be before
10 matches
Mail list logo