After going through this personnally a few years ago, at this point I
involved the police. The detective's office was great about obtaining
search warrants on the system where the e-mails originated to deteremine
who was sending the messages. The sender was found and eventually ended
up in jail.
Laurence,
For the last several years, we've had good success with EasyLink's
MailWatch utility (www.mailwatch.com). In MailWatch you can set up
filters based on addresses and content. The utility is hosted by
EasyLink, thus there's nothing to install on your network and no
integration issues
After doing a search on Google and some other security sites, it appears
that there are only two database vulnerability scanners on the market
right now - ISS's Database Scanner and Application Security, Inc's
AppDetective. Are there any other database vulnerability scanners out
there? Has
Check out Trad.Goth Advisory #1:
http://lists.insecure.org/lists/vuln-dev/2002/Jun/0084.html
Good luck,
Brett
Rodel Calvario [EMAIL PROTECTED] 01/09/03 08:12AM
Hello All,
Don't know if this is the right place to post this. Are the out of office
messages inviting hackers to attack your
In our Novell environment, we have had quite a bit of success with
managing the anti-virus on workstations via the System Center Console.
Via the console it is very easy to set up every server and client to
automatically look to a specific server for AV updates on a regular basis.
Thus, you only
Don't forget to educate your users on security issues.
Chris Berry [EMAIL PROTECTED] 09/18/02 10:51AM
The company I work for had no security at all when I started here.
I've
made a number of improvements, but I'm trying to come up with a defense in
depth security plan, and I thought I'd