t one. ;-)
bryan
---
I had several people cost justify hard disk encryption based on this. If
you are encrypting the entire partition all you have to do is disable
the users on that disk and the disk is left as a 256-bit AES bundle of
bits.
Regards;
Bryan
Bryan Glancey
[EMAIL PROTECTED]
Vice President - Research
s than secure.
With both, misconfigurations are the kiss of death. Kinda reminds me of
the old GIGO (garbage in - garbage out) acronym. If the guy building
the rules or specifying which services are available, screws up, your
whole box can be compromised...firmware o
elves. Appliances have a place,
just as the OS based firewalls do. Instead of saying one is better or
worse, try implementing each in the appropriate place in your security
stack.
IMO,
bryan
---
Evaluating SSL VPNs'
Port 44334 is typically used by Tiny or Kerio Personal Firewalls.
Bryan
-Original Message-
From: Hyperion [mailto:[EMAIL PROTECTED]
Sent: Monday, June 30, 2003 11:52 AM
To: Security Basics Mailing List
Subject: What is this port? is it a trojan?
Hello all :)
I have been taking a
Telnet is telnet. The protocol itself is unencrypted. The only way to
encrypt the protocol is to tunnel it via SSL or some VPN type of software.
But telnet, as it is shipped with Win2K (both client and server) is
clear text.
bryan
Depp, Dennis M. wrote:
Richard,
The telnet built into
Give a quick call to PCguardian. They have a product that fits your
exact requirements.
Bryan Glancey
[EMAIL PROTECTED]
CTO
EPS Technology
999 Executive Parkway Drive
St. Louis, MO 63141 USA
http://www.epsione.com/
314-205-2300
314-205-2303 fax
-Original Message-
From: Bear Giles
arious attacks. Another side benefit of application proxy servers
like Raptor and Borderware is that you can put a bandwidth throttle on
things like streaming audio/video.
Hope this helps,
bryan
[EMAIL PROTECTED] wrote:
I am in charge of researching a firewall to replace what we currently
have.
than the owner of the account requests a reset, the
account is still safe, assuming email and vmail are secure.
Bryan
-Original Message-
From: Robert Sieber [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, December 03, 2002 12:50 PM
To: [EMAIL PROTECTED]
Subject: How to authentificate an user
Quoting Frank Cheong <[EMAIL PROTECTED]>:
> I received complains regarding one of the image on my web site has been
> modified by a PORN picture ! While the image have resumed normal during
> the second visit.
You say you have had complaints, but don't state if you have seen it or
not. Can Y
implementation.
Bryan Glancey
[EMAIL PROTECTED]
Manager of Security Solutions
EPS Technology
999 Executive Parkway Drive
St. Louis, MO 63141 USA
http://www.epsione.com/
314-205-2300
314-205-2303 fax
-Original Message-
From: Kenneth W. Kubiak [mailto:kkubiak@;bflohearspeech.org]
Sent
g ins. If you set the system to
more tolerant modes (you can put your finger on 'close' to the same way
every time) there will be more false accepts but less log in refusals..
It's all a trade off.
Bryan Glancey
[EMAIL PROTECTED]
Manager of Security Solutions
EPS Technology
999 Exe
://www.smartcardalliance.org
Regards;
Bryan
Bryan Glancey
[EMAIL PROTECTED]
Manager of Security Solutions
EPS Technology
999 Executive Parkway Drive
St. Louis, MO 63141 USA
http://www.epsione.com/
314-205-2300
314-205-2303 fax
-Original Message-
From: Xu He [mailto:xuhe@;yahoo.com]
Sent
The activKey solution is very good. Some major competitors to look at
are:
authenex - Low cost alternative
Alladin
Rainbow
Regards;
Bryan
Bryan Glancey
[EMAIL PROTECTED]
Manager of Security Solutions
EPS Technology
999 Executive Parkway Drive
St. Louis, MO 63141 USA
http://www.epsione.com
How about using sftp, the ssh implementation of ftp.
Bryan
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, July 23, 2002 2:55 AM
To: [EMAIL PROTECTED]
Subject: An alternative to ftp
Hello all,
I'm trying to figure out the best way to tra
r two are not intended to handle professional traffic...regardless
of marketing hype.
Your best bet might be to make a checklist of features, requirements, cost, etc and do
a side-by-side to see what works best for you.
Good luck,
bryan
On 13 Jul 2002 11:11 MDT you wrote:
> Netscreen 5XP - di
s
for restricted access to my company's private apps while leaving the
public ASP applications open for all access.
Bryan Ponnwitz
Webmaster - Broome-Tioga Boces
[EMAIL PROTECTED]
(607) 763-3609
>>> Mauri Gómez <[EMAIL PROTECTED]> 07/09/02 06:34AM >>>
Hi all. I have an
t behind a firewall, but wouldn't recommend using it over the
Internet. (That's what VPNs are for.)
Bryan Ponnwitz
Webmaster - Broome-Tioga Boces
[EMAIL PROTECTED]
(607) 763-3609
>>> "Aditya Lalit Deshmukh" <[EMAIL PROTECTED]> 07/05/02 11:56PM >>>
How
support
Socks since TotalRC has a tool to "socksify" network transfers. I've
been able to get KaZaA to work through a proxy and firewall and still
acheive relatively good transfer rates.
Bryan Ponnwitz
Webmaster - Broome-Tioga Boces
[EMAIL PROTECTED]
(607) 763-3609
>>>
idea has merit.
Also, what would the best kind of shield be, or is there something around
the house / office you could use, like a frying pan or trash can lid.
(Sorry, I've been watching too much MacGyver)
BRYAN ALLERDICE
-Original Message-
From: Johnson, Wayne [mailto:[EMAIL PROTECTED]
A good resource for network gear reviews is Network Computing magazine. This
recent review might be of some help.
http://www.networkcomputing.com/1223/1223f2.html
-bryan
Create a file and encrypt it using 3DES with a 10char+ passphrase.
-Original Message-
From: Nick Lehman [mailto:[EMAIL PROTECTED]]
Sent: Thursday, November 08, 2001 5:31 PM
To: [EMAIL PROTECTED]
Subject: Secure password storage?
Hi there,
Curious what others are using for secure passwo
22 matches
Mail list logo