Not quite;
If you pass the 14 character margin, No LM hash will be stored of the
password. 14 characters is its limit, so if you enforce a policy of 15 or
greater you do not have to worry about it.
_
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
"High achievement a
600+
plus client from one console and love the ease of use.
-Dave Gonsalves
-Original Message-
From: John Roberts [mailto:[EMAIL PROTECTED]
Sent: Tuesday, August 05, 2003 3:29 PM
To: [EMAIL PROTECTED]
Subject: Anit-Virus Software
I need to set up some anti-virus software for our company
appy
cross-platform password. For one software application it may work for
another it might not.
There is a short reference to it in a post I made a while back, please take
a look at it.
http://www.securityfocus.com/archive/88/312263
_
Dave Kleiman
[EMAIL PROTECTED]
www.ne
/
tools/chklist/iis5chk.asp
And also if you want to lock down the OS and IIS plus security support for
Apps etc., look at:
http://www.securit-e-doc.com/products/securitelok.asp
_
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
"High achievement always takes place i
http://www.accessdata.com/dictionaries.htm
_
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
"High achievement always takes place in the framework of high expectation."
Jack Kinder
-Original Message-
From: O'Connell, Geoffrey [mailto:[EMAIL P
John
I've had good luck with Norton Corp SAV.
And if your users are a little more tech savvy, you can create
a webpage for them to install their own client.
Dave
- Original Message -
From: "John Roberts" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Tu
think
that a laptop could possibly do this (someone correct me if I am wrong ?). Or
even 11,000.
So first check your packet totals. I do not think that it they can be
correct.
Best Regards,
Dave
On Friday 01 August 2003 18:06, [EMAIL PROTECTED] wrote:
> One of the employees h
When I tried to 'nmap 0.0.0.0' on my RedHat 9.0 machine, it essentially
nmap'd itself.
So, I guess a valid "situation" would be "On a RedHat 9.0". I've not
bothered checking anything else.
-Dave
-Original Message-
From: Fernando Gont [mailto:[E
Bravo on that analogy. (even though I like Windows) That was excellent.
_
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
"High achievement always takes place in the framework of high expectation."
Jack Kinder
-Original Message-
From: Ranjeet Shet
http://www.securit-e-doc.com/
_
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
"High achievement always takes place in the framework of high expectation."
Jack Kinder
-Original Message-
From: Ronish Mehta [mailto:[EMAIL PROTECTED]
Sent: Wedne
These are IP protocols you are denying no TCP or UDP protocols.
i.e 103 = PIM Protocol Independent Multicast
_
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
"High achievement always takes place in the framework of high expectation."
Jack Kinder
---
Hello Doug,
Actually that's not true. Any one of the aforementioned protocols can
fill the queue with ~76 packets.
Dave Gilmore
Information Security Analyst
--
Intrusense - Securing Business As Usual
-Original Message-
From: DOUGLAS GULLETT [mailto:[EMAIL PROTECTED]
Sent: Wedn
For about twice the cost of the books you could take a good security course
from SANS or somewhere and probably learn a lot more. Of course I have not
read the books so these are just my personal comments.
_
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
"
That may be correct, Tim, but does it justify 2-3 emails a day to
multiple people within his organization? Seems a bit overzealous to me.
Doesn't sound like they put a lot of 'thawte' into it. ;)
Dave Killion
Senior Security Engineer
NetScreen Security Group, NetScreen Te
Nathan
Nick
Do try MRTG and see if it fits what you're looking for. It is easy to set
up on a M$ or Xnix box as well as many companion tools and sites available
on their site.
http://people.ee.ethz.ch/~oetiker/webtools/mrtg/
If you need an assist, mail me.
Dave
>
>>>-Original
Network Data Management Protocol - Standard protocol for network attached
storage.
_
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
"High achievement always takes place in the framework of high expectation."
Jack Kinder
-Original Message-
From:
I am calling this up from memory so do not quote me on this, but I remember
something about webots (googlebot etc..) using this port.
Dave
_
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
"High achievement always takes place in the framework of high expectation.&
Dave,
If you are trying to "destroy" the hdds, I would do an overwrite 3x or 7x or
35x if you want. Then open the hard-drive take out the platters and put them
in the microwave oven for 5 seconds.
Of course if you need to reuse them than I would skip the microwave part.
It works fo
s a
unique admin name. If the admin on the local box is called "admin" and on
the domain called "admin" if the passwords are the same they are going to
have the credentials of the domain "admin".
_
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
Here is a list of the top 75 security tools sites
http://www.insecure.org/tools.html
Here are some links to other security sites with some good multiple links on
them:
http://www.nthelp.org/links.asp
http://www.netmedic.net/nm/links/index.asp
_
Dave Kleiman
It would work in either instance if the Admin name and Password were
Identical.
_
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
"High achievement always takes place in the framework of high expectation."
Jack Kinder
-Original Message-
From: hong
one. Hopefully this will get you
close.
Good luck!
Dave Killion
Senior Security Engineer
Security Group, NetScreen Technologies, Inc.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]
Sent: Monday, June 30, 2003 10:55 PM
To: [EMAIL PROTECTED]
Subject: Getting an IP a
As well as Foundstones and SysInternals, there's another nice (and free) port viewer
called Active Ports, at http://www.ntutility.com/freeware.html
All the best
Dave
- Original Message -
From: "Spencer D'oro" <[EMAIL PROTECTED]>
To: "Hyperion" &
oks Windows-ish to me, but I
could be wrong) you could use lsof to determine which process was
listening to what port - very handy proggie.
Good luck,
Dave Killion
Senior Security Engineer
Security Group
NetScreen Technologies, Inc.
-Original Message-
From: Hyperion [mailto:[EMAIL
Download this it will tell you...
http://www.sysinternals.com/ntw2k/source/tcpview.shtml
But I can tell you if you are running TPF that is wheat it is.
_
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
"High achievement always takes place in the framework of
/
http://www.securityfocus.com/infocus/1653
Happy reading,
_
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
"High achievement always takes place in the framework of high expectation."
Jack Kinder
-Original Message-
From: Joe Lindsay [mailto:[EMAIL
and
customer mucking.
Dave Killion
Senior Security Engineer
NetScreen Security Group
NetScreen Technologies, Inc.
-Original Message-
From: Charles Lacroix [mailto:[EMAIL PROTECTED]
Sent: Friday, June 20, 2003 12:14 PM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: perl scrambling
tp://www.r-tt.com/FAQ.shtml#
Your best bet would be to read the users manual:
http://www.r-tt.com/downloads/rstudio.pdf
http://www.r-tt.com/downloads/rundelete.pdf
_
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
"High achievement always takes place in the fr
download the eval-copy which
will find and show you the lost info, but just will not recover them.
_
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
"High achievement always takes place in the framework of high expectation."
Jack Kinder
-Original Message
helpful. I did not know I was going to be
investigated/scrutinized for suggesting a $79 product.
I am sending you a separate e-mail with a zip file containing screenshots of
R-studio in action from my system.
And I still say it is without a doubt the best bang for the buck!
_
Dave
ntire namespace.
http://screamer.mobrien.com/Manuals/MPRM_Group/dns_notes.html
http://lyris.iislists.com/articles/dns_for_iis.htm
http://www.microsoft.com/windows2000/techinfo/howitworks/communications/name
adrmgmt/w2kdns.asp
_____
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
"H
,0
MACHINE\System\CurrentControlSet\Control\Lsa\NoLMHash\bar=4,0
http://support.microsoft.com/default.aspx?scid=kb;EN-US;225233
http://support.microsoft.com/default.aspx?scid=kb;EN-US;226107
http://support.microsoft.com/default.aspx?scid=kb;en-us;201194
_
Dave Klei
bang for your buck.
_
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
"High achievement always takes place in the framework of high expectation."
Jack Kinder
-Original Message-
From: Wilcox, Stephen [mailto:[EMAIL PROTECTED]
Sent: Thursday, June 19,
There is a perl script call DNSDigger that does this.
Dave
_
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
"High achievement always takes place in the framework of high expectation."
Jack Kinder
-Original Message-
From: Fred Dirkse - OIC
http://www.s-doc.com/products/securitelok.asp
Has profiles for all just about all Windows Server configurations, and takes
about 20 minutes per server.
_
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
"High achievement always takes place in the framework of
FamilyKeyLogger InternetSpy PerfectKeyLogger
_
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
"High achievement always takes place in the framework of high expectation."
Jack Kinder
-Original Message-
From: Potter, Tim [mailto:[EMAIL PROTEC
Maybe everyone should attend the following..
http://www.theregister.co.uk/content/28/31135.html
:)
_
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
---
Evaluating SSL VPNs' Con
Brian,
Harsh words.
You Wrote > " contact the law enforcement who will undoubtedly not
understand a word of what you are talking about, but hey, that's how it
goes"
I will take the Pepsi challenge on that one up against you any day of the
week.
Dave
have software that id
FIPS-140 approved and surpasses the NIST, NSA and Common Criteria
guidelines.
Dave
-Original Message-
From: James [mailto:[EMAIL PROTECTED]
Sent: Wednesday, June 11, 2003 02:19
To: [EMAIL PROTECTED]
Subject: Re: Locking down workstation
The problem with that is
You can still pull his history and cookies form his .dat files. Also it in
the registry there are places that info is stored.
Or, you could simply set up a sniffer and monitor his system, it would show
what he his doing.
Dave
_
Dave Kleiman
[EMAIL PROTECTED
for
1026 etc.. the answer is, I do not know but by playing around with this,
it is the configuration I got to work. I have 3 DNS servers running in this
configuration.
Also you can add 20,21 and 80,443 and IIS and FTP can run on them.
Dave
_
Dave Kleiman
[EMAIL PROTECTED
Actually Paris you can in theory "disable" the default admin. It just takes
a few tricks
_
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
-Original Message-
From: Paris Stone [mailto:[EMAIL PROTECTED]
Sent: Wednesday, June 04, 2003 13:59
To: steph
It is best to "disable" the built in administrator account.
Dave
_
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
-Original Message-
From: David Gillett [mailto:[EMAIL PROTECTED]
Sent: Monday, June 02, 2003 17:38
To: [EMAIL PROTECTED]
Subject:
t" and "Administrator" accounts you
might be better off "disabling" them as well as renaming them.
_
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
-Original Message-
From: Jimi Thompson [mailto:[EMAIL PROTECTED]
Sent: Sunday, Ju
I'm currently reviewing the Pointsec disk encryption product and haven't
been able to identify how the product sends it's recovery key information
over the network and what impact a change to the relevant destination
location share (i.e. to write only) might be.
Does anyone have any experienc
ommunicate with?
Are you aware of the traffic load between the "Thin clients" and the
"Terminal server"? Normally the traffic between the thin client and server
is minimal. The traffic between the Terminal server and APP, File and other
servers is very heavy.
___
Ok you guys can Start making fun of me any time you want
You do not want/need the -n in the end there :o(
-Original Message-
From: dave [mailto:[EMAIL PROTECTED]
Sent: Friday, March 28, 2003 14:01
To: 'Su Wadlow'; [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: RE: Wi
txt
Nbtstat -A 192.168.0.1 -n >> whoislogon.txt
Nbtstat -A 192.168.0.2 -n >> whoislogon.txt
Nbtstat -A 192.168.0.3 -n >> whoislogon.txt
Nbtstat -A 192.168.0.4 -n >> whoislogon.txt
Notepad.exe whoislogon.exe
This would list all your IP's and who was logged on them.
Dav
68.0.2 -n >> whoislogon.txt
Nbtstat -A 192.168.0.3 -n >> whoislogon.txt
Nbtstat -A 192.168.0.4 -n >> whoislogon.txt
Notepad.exe whoislogon.exe
This would list all your IP's and who was logged on them.
Dave
_
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
---
Here you go all the patches you could ever want to see for MSFT.
https://www.microsoft.com/technet/security/search/mssecure.xml
- Original Message --
From: "Craig Searle" <[EMAIL PROTECTED]>
Date: Wed, 19 Mar 2003 10:03:35 +1100
>Hello All,
>
>I am current
Funny wormwatch is still not showing it, maybe they are little behind.
http://www.wormwatch.org/
_
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
-Original Message-
From: Mike Heitz [mailto:[EMAIL PROTECTED]
Sent: Wednesday, March 12, 2003 20:31
To
There are after market alternatives which use a different approach such as
hfnetchk pro at http://www.shavlik.com/ and securit-e-updater at
http://www.s-doc.com/products/securitelok.asp
_
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
-Original Message
Securit-e-Lok and Securit-e-Updater seem to work well.
http://www.s-doc.com/products/securitelok.asp
_
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
-Original Message-
From: Eric Zatko [mailto:[EMAIL PROTECTED]
Sent: Monday, March 03, 2003 11:16
To
thoughts and counter-thoughts are
greatly appreciated. I do not mean this to be an end-all way of defeating
these programs, but every little bit helps.
__
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
install lsof and then
lsof -i | grep sunrpc
or
lsof -i | grep 111
check out:
http://www.redhat.com/docs/manuals/linux/RHL-8.0-Manual/security-guide/s1-server-ports.html
for more info.
dave
On Fri, 2003-02-07 at 08:40, Rod Green wrote:
> Hello. I'm using nmap to scan a Linux m
Also If you run ERD from the Backup utility it will create
'%WinDir%\repair\regback' with the new SAM.
Remember if you do not store the passwords using the LMHash they are a lot
harder to crack.
Dave
>> -Original Message-
>> From: Pez Mohr [mailto:[EMA
How did they get to and install it on the servers?
Prevent access to your server would be my first guess.
_
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
-Original Message-
From: Bill [mailto:[EMAIL PROTECTED]]
Sent: Saturday, February 01, 2003 01:34
To
/ds_whitepaper.pdf
http://online.securityfocus.com/news/2055
http://www.accessdata.com/Product07_Overview.htm?ProductNum=07
http://gsu.linux.org.tr/wipe/
http://www.diskwiper.com/
Dave Cooper
Systems Engineer
Redwood Data
[EMAIL PROTECTED]
running.
If you are still worried try http://www.s-doc.com/products/securitelok.asp
Cheers,
Dave
-Original Message-
From: Bill [mailto:[EMAIL PROTECTED]]
Sent: Monday, February 03, 2003 19:58
To: [EMAIL PROTECTED]
Subject: Re: Proxy+ Trojan
Hamish,
Sorry, I should have provided a
Gary,
Are you talking about the "remove" utility for POSIX? I have not seen that
in resource kit since NT 3.51. Maybe 4.0
Unless you were referring to something else?
I have the old resource kits so I am sure I can give it to you I guess
e-mail me off line. I will forward it to you.
The following may help.
www.securit-e-doc.com
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
-Original Message-
From: Zimin, Alex [mailto:[EMAIL PROTECTED]]
Sent: Friday, January 24, 2003 14:19
To: Phillips, Mike; Jack Hill; [EMAIL PROTECTED]
Subject: RE: Secure
Yes, it does support discovery.
http://groups.google.com/groups?q=enablepmtubhdetect&hl=en&lr=&ie=UTF-8&selm
=8e7f01c2794c%241f58bda0%242ae2c90a%40phx.gbl&rnum=8
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
-Original Message-
From: Mark Reardon [mailto:[EMA
For the Windows based systems you could use Securit-e-Lok at
www.securit-e-doc.com
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
-Original Message-
From: Tony Toni [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, January 22, 2003 22:27
To: [EMAIL PROTECTED]
Subject: Server
with W2K so you do not have to
worry about those systems.
Hope this helps,
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
-Original Message-
From: Mohamed Karmil Asgarally ( ZADCO ITS) [mailto:[EMAIL PROTECTED]]
Sent: Saturday, January 18, 2003 23:38
To: [EMAIL PROTECTED
http://www.hsc.fr/ressources/outils/pktfilter/index.html.en
(B
(BHope this helps
(B
(B
(B
(BDave Kleiman
([EMAIL PROTECTED]
(Bwww.netmedic.net
(B
(B
(B
(B
(B-Original Message-
(BFrom: swin [mailto:[EMAIL PROTECTED]]
(BSent: Friday, January 10, 2003 19:30
(BTo: [EMAIL PROT
Sarbjit,
If you have any questions about setting up pktfilter I will help the best I
can, also Jean-Baptiste Marchand the maker of the product has been very
helpful whenever I have had a question.
Best of luck,
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
-Original Message
that free tool it is fairly easy to
set up and use.
Dave Kleiman
[EMAIL PROTECTED]
www.netmedic.net
-Original Message-
From: Mike Moore [mailto:[EMAIL PROTECTED]]
Sent: Thursday, January 09, 2003 22:04
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: RE: Making a W2K with
- Original Message -
From: "ALBEE,RUSSELL. S FC2 (CV63 CS5)" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Friday, November 29, 2002 12:01 PM
Subject: Low end machines for Firewall/IDS
> Does anybody know of any good locations online to purchase old 486
machines
> or low end Pentium
much data can be
retrieved off a hard drive and under what conditions etc etc.
Thanks
Dave Adams
This message (and any associated files) is intended only for the
use of the individual or entity to which it is addressed and may
contain information that is confidential, subject to copyright
On Fri, Oct 25, 2002 at 11:23:34AM -0700, Chris Berry wrote:
> >From: [EMAIL PROTECTED]
> >Hello,
> > I'm looking for a virus scanner to use under sendmail. Do you know >
> >if there are any script or daemon to do that?.
>
> Can't help you there, I don't use sendmail.
Me neither ;-)
>
0% of boxes out there. So it is a good start.
Good luck.
/Dave
On Friday 20 September 2002 02:05, Nikolai wrote:
> I have setup the following rules for my ipchains:
> :input ACCEPT
> :forward DENY
> :output ACCEPT
>
> -A input -j DENY -p all -l -s 127.0.0.0/8 -i eth0 -d 0.0.0
e and known bad value for each jump.
If you have some idea that it is going to be over 1400 try that value early
in the sequence.
This is fairly standard procedure for finding any unknown limit. (Or it is by
me :) )
/Dave
> From: "Irene Xie" <[EMAIL PROTECTED]>
> To:
Although debatable, many consider OpenBSD (www.openbsd.org) to be the
"most secure".
What's the function of the box going to be??
Robert M. Judy wrote:
> What is generally considered to be the "most secure" (or securable)
> Unix/Linux package/version?
>
> Thanks in advance,
>
>
> rmj
In-Reply-To: <[EMAIL PROTECTED]>
sounds like you don't have the correct version of Libpcap installed.
Snort requires an older version. I think .04.
I had the same problem on my RedHat 7.2 server. I had to download the
older verion in order for snort to work.
>Received: (qmail
g you come to your senses,
>David Rodriguez
if this bothers anyone else, please let them know.
have fun
dave
Chris Santerre wrote:
>I just received a mailing from Verisign that borderlines on fraud. It is at
>the least, VERY misleading. It states in BOLD letters "Domain Name
>E
anyone
has any suggestions I would be most appreciative.
Any replies, on or off the list would be really appreciated,
Thanks in advance
Dave
... A Unix box, a Unix box, my entire %#&ing Windows network for a Unix box
:p
in this less-than-perfect organistaion.
Thanks in advance for any feedback you may have
Dave
wow, i've not seen that behavior.
Just for comparison purposes, I've got one in a Duron box (Duron 800)
and no problems. I plan on getting an athlon for that box, so i'll keep
and eye out, just in case.
thanks for the heads up
dave
On Tue, 2002-04-09 at 14:07, Steve Bremer w
TX. I've had no problems whatsoever in
the 2 yrs I've been using them. (tulip driver) A quick pricewatch search
shows compuplus.com selling them for $4 right now.
have fun
dave
On Fri, 2002-04-05 at 05:49, David Hayes wrote:
> Hi,
> I've got an old p150 with about 64Mb Ram ha
I have actually made metal plates and screwed them over the CON port with
security screws ( done at a school where I dont trust anyone, and
closets have no control over access )
coop
- Original Message -
From: "Frank Quinonez" <[EMAIL PROTECTED]>
To: "Shafagh Zandi" <[EMAIL
Hey,
Has anyone heard of plans to drop PGP from NAI product line? If so, are
there any plans for someone to pick up where they left off?
Dave Evans
Information Security Officer
> F eCom Services / SUMMIT Information Systems
1-888-817-1708 Ext. 8607
[EMAIL PROTECTED]
se the
software is being loaded as another user (probably localsystem) and the
cd-rom has been restricted to the logged in user...this case Administrator.
Has anyone else experienced this? Is there a work around besides
'unsecuring' your box, loading software, then re-
If it makes anyone feel any better, I did get a message from Trend
anti-virus, "Action: Clean Failed (Moved)"
Of course that was on or about the time the Command Prompt appeared on
my screen...
Dave Bujaucius
-Original Message-
From: Premek Marek [mailto:[EMAIL PROTEC
Dennis,
Thanks for the reply. Could you possibly tell me specifically what third
party tools can do this?
dave
>You can purchase third part tools that can do this, or you can download a
>utility to send these to a syslog
ne that is
locked up.
Thanks in advance for your help.
dave
_
Send and receive Hotmail on your mobile device: http://mobile.msn.com
sults. After all,
you just concluded an illegal activity.
Thanks for all your replies. I think I have a better understanding of
the risks now.
Dave Bujaucius
-Original Message-
From: Steve [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, February 27, 2002 7:47 PM
To: [EMAIL PROTECTED]
Subj
hi guys,
thanks for all the sugestions about my question. I've
setup rspan and its working fine now, but all your
ideas were helpful. thanks for your time!.
--Dave
-- On Thu, 21 Feb 2002 08:17:52 -0500 --
"Jim Murray" <[EMAIL PROTECTED]> wrote:
Dave,
You are not goin
Has anyone taken the exams for Cisco Security Specialist 1?? How good are
they? Is it worth the time and money? I'm a CCNA and looking to add on
security related certs. Already know about SANS certs.
thanks
dave
_
Get
ke most IT issues everything is relative. I'm
questioning the relative risk in sending confidential information over
the Internet. Real life experiences versus theory.
Dave Bujaucius
The last time I saw this, I looked at the details. The reason the
signing certificate was being flagged was because the verification
code was unable to find a current revocation list, so was unable to
certify that the certificate was still valid. This means the certificate
source is trusted and
Hi there,
Im very new in this list, and a newbie in cisco
administration, i would like to know ,if it is
posible,
how to capture the traffic on the router (or sniff it,
if you like), and send it into another pc on plain
text or whatever, or if its posible to keep it on a
file.
Sorry if thi
e. Worked like a charm.
Dave Bujaucius
Director of Information Technology
Gliatech Incorporated
23420 Commerce Park Road
Beachwood, OH 44122
Ph: (216) 831-3200 Ext. 3012
Fax: (216) 831-4220
Email: [EMAIL PROTECTED]
-Original Message-
From: Noel Fitzpatrick [mailto:[EMAIL PROTECTED]]
Se
main admin to force their way into the
local admin group? The alternative is to reinstall 2000.
Thanks,
Dave
from your base station. If all of this is true then how is it that
people would ever implement a network that includes even a small portion of wireless
nets. I hope I am wrong about this because there have been cries for wireless from
above in my organization.
Thank you in advance.
Da
ly, I believe this is just a general and still outstanding
problem/issue/annoyance. Under Solaris, toying with your arp cache was
necessary with 4.0, and it's still necessary with my NG install.
--
--
Dave Solbes
Security Administrator
Credence
Standard Disclaim
NMAP.
-Original Message-
From: Pradeep Kumar [mailto:[EMAIL PROTECTED]]
Sent: Sunday, September 30, 2001 3:38 PM
To: [EMAIL PROTECTED]
Subject: Syn Flood generator / Dos Attack generator
Folks
Does any know any tool which can generate Syn Floods / DoS attacks.
This is for lab testing p
96 matches
Mail list logo