Jay,
Only addressing one of your points:
> Seems a bit silly to take away
>crypto use for the average citizen when it hasn't even been demonstrated
>that crypto is being put to ill use.
See United States v. Scarfo, Criminal No. 00-404 (D.N.J.) at:
http://www.epic.org/crypto/scarfo.html
Grante
James,
I haven't seen anything that has been advertised as "secure" out of the box. However,
depending on the exact application, you may want to look at a generic PDA (pick your
favorite brand) and an application like CheckPoint's Universal VPN. Add some file
encryption and I&A, etc..
I
That web page has been plagerized from TechWebold story though.
http://content.techweb.com/wire/story/TWB19990903S0014
Regards,
Bomm
Hush provide the worlds most secure, easy to use online applications - which solution
is right for you?
HushMail Secure Email http://www.hushmail.com/
Hus
All,
I should have been more clear when I said PGP didn't "work" with XP. Several people
have clarified this when they say that it will work as long as you don't implement the
VPN adapter and install the PGP virtual NIC, etc.
That is correct that it will work, or more accurately *parts* of it
Chris,
That is correct...rumor has it (article on CNet I think) that NAI has produced a
version of PGP for both MacOS X and XP but will not release them for sale (since they
are stopping support and production of the software).
I did try to run the last version of the desktop security package
Connie,
As I'm sure you are aware, Sensitive But Unclassified (SBU) data has a different
standard for what constitutes "securely erased" than your garden variety data. As
such, I normally recommend that people dealing with tasks such as yours contact their
Inspector General (IG) office, CIO o
Lisa,
You can find information regarding FormMail here:
http://www.securiteam.com/securitynews/Formmail_pl_Can_Be_Used_As_An_Open_Mail_Relay.html
Regards,
Bomm
Hush provide the worlds most secure, easy to use online applications - which solution
is right for you?
HushMail Secure Email http:
Use a standard packet sniffer (dsniff, etherpeek, etc.) connected at various
convergence points on your network and do one of two things depending on the
functionality of the sniffer:
1) partial packet sniff and filter the results based on ports or save it to a text
file and grep out the port
Not speaking for Jeff, just my two cents, if I see a server named firewall.foo.com it
narrows my choices of attack enough to save me the time and trouble of having to
"figure out" that the machine I'm seeing is a firewall.
I have yet to see someone name a machine creditcarddatabase.foo.com but
Actually, I've used BlackIce (NetworkIce) since it came out and have never had a
problem on my home connection (broadband). HOWEVER, I keep it updated (automatically
notifies me when there is an update) and I patch my machines.
BrownFox is correct in that it is not a product for idiots...thank
Go to
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci214249,00.html
for a definition of RADIUS and download the Lucent paper for more info.
Go to
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213464,00.html
for info on TACACS.
Good luck...
Check into using the Policy Editor to enforce restrictions; at one point (at another
job) I had 300 98/98se machines authinticating against a RADIUS server and completly
locked down the machine (including the ability to install/run programs). Later the
labs migrated to NT after the needed appl
Please excuse the postings to individual users...I don't remember who the original
person was that submitted the question...
Regardless, while I agree with Mr. Jackson that people will sue for just about
anything I think that for a person (i.e., business) to be prudent they should employ a
kn
All,
Not to fan the fire of the almost religious belief that the IIS discussion has taken
on, I think some points have been overlooked:
1) both applications can be hardened against *known* vulnerabilities; if you don't
believe this talk to someone that's been a sys admin or CompSec person for
14 matches
Mail list logo