efault services . but since an admin is going to maintain a system
anyways it does become a mute point.
Ash
ctical note both can be setup to be 'secure' but it has been my
experience that OpenBSD takes less time as long as you are comfortable in a
Unix environment.
Cheers,
Ash
---
Darkfire Secure Linux
http://www.gnulinux.net
More information would be great. A short sollution would be to use
OpenBSD pf. It not only has a good amount of documentation but is also
on of the most veritile firewall solutions arround.
Please give some more information on the configuration (like the rules
implemented).
Thanks,
Ash
drine.cx/pf-paper.html
The OpenBSD Packet Filter HOWTO
http://www.inebriated.demon.nl/pf-howto/
The OpenBSD PF Manpage
http://www.openbsd.org/cgi-bin/man.cgi?query=pf&apropos=0&sektion=0&manpath=OpenBSD+Current&arch=i386&format=html
Cheers,
Ash
---
Darkfire Secure Linux -- http://www.gnulinux.net
ms on the LAN have totally bypassed the firewall and acted as a local
> IP, How can I put a stop to this?
Use an open firewall, not a closed one. If there are problems with an
open firewall their will be patches asap. Also, if you can help it,
don't run services or use the firewall as a deskto
, Programming Perl, and The Perl CD
Bookshelf.
Cheers,
Ash
On Fri, 2002-07-05 at 10:40, Joe McCray wrote:
> I'm a Linux newbie, so I've been working really hard on learning
> Linux, and learning C. I'm finally getting a hold of C. No I can't
> write on the fly without some sort
Good day!
I use loopback encryption for sensitive data to make a psuedo encrypted
file system. There also is an article in Linux Journal about BestCrypt
(http://www.jetico.com/) which is a Windows and Linux FS encryption
container.
Hope I didn't misread your post :-).
Cheers,
Ash
On Thu,
.
Ash
On Thu, 2002-06-13 at 17:06, TheFinn wrote:
> (ZDNET) - "If you spend more on coffee than you spend on IT security, then
> you will be hacked. What's more, you deserve to be hacked." - Richard Clarke,
> special adviser to the president on cyberspace security.
;ThanksMike Ungar
>
I don't have any information on Sametime but I can point you to Jabber
(jabber.com and jabber.org). It is an open source IM service to be used
however you want (inside the corporation only if you wish).
Ash
d probably dive right into Slackware and feel at home.
Ash
---
Darkfire Secure Linux -- http://www.gnulinux.net
>-Original Message-
>From: Thomas Madhavan
>Sent: Monday, May 13, 2002 12:15
>To: [EMAIL PROTECTED]
>Subject: Slackware or Redhat?
>
>
>Hi all.
>
ackable
default install over the last 4 (5 by now?) years.
Ash
---
Darkfire Secure Linux -- http://www.gnulinux.net
ts a really good question. The only way I can see it hapening is if
either the NIC's broadcast any info over the network, a internel user
knowing the MAC addresses and crawling their way in that way, or
possibly scanning for NIC's in promiscous mode.
Ash
Can we have some linkage? I didn't find any information about it on
logwatch.org or linuxsecurity.com.
Cheers,
Ash
Bailey Kong wrote:
>if you haven't heard yet, root account can be compromised by a local account
>using logwatch.
>
>the current work around i got was to
IMHO I would say OS X is more secure by default. While both can be beat
into submission (and it does take some beating and patches for XP :-D)
Apple has done a pretty good job. The whole idea of taking a open
base/kernel and build on top of it helps add a little more security
because of the ma
I belive that http://www.linuxsecurity.com/advisories/redhat.html can
help with information about Red Hats advisories. Just rememebr that Red
Hat is known for being a little more cutting edge than most other
distrobutions (ie: Slack, Debian, Libranet, Beehive, etc ...).
Cheers,
Ash
ge between the two hosts. You could easily then use tcpdump or
another utility to keep an eye on the packets. Just an idea.
Ash
---
Darkfire Secure Linux -- http://www.gnulinux.net
Calhoun, Heath wrote:
>Hello. I am looking for a cable to aid with sniffing.
>This cable should have jacks
oft patch only
kept the string used by the teardrop expoit to be filtered out, if you
sent something else, like "does this still work at all, joe?" it would
be exploited. Of course, it took a little time for people to find it
tout (closed patch, so it took about 3 days) but the fact that MS's
patch was almsot a hoax didn't sit well with me. They eventually
released a better patch.
Cheers,
Ash
---
Darkfire Secure Linux -- http://www.gnulinux.net
ginal is from OpenBSD).
Ash
Darkfire Secure Linux - http://darkfire.sf.net
Michael Gegerfelt wrote:
>We are looking for a replacement ftp server instead of Microsofts own. Does
>anyone know of a good and secure server?
>
>/michael
>
>
>
a litsing of all
programs and services running so that you can track down what is
running at those ports. Also, netstat -a and see if anything is connected.
Ash
===
EASY and FREE access to your email anywhere: http://Mailreader.com/
===
[humor]
First login either by administrator or tricking the administrator into
running a program that executes a script to give you admin access (very
simple ...). Then, format C:\ and all other drives. Go to a computer
store and buy FreeBSD or Linux. Install. You should be pretty safe now.
[
20 matches
Mail list logo