Unfortunately there isn't a clear way to do this since Yahoo is the middle
guy and the mail headers were generated there. We recently had a similar
e-mail come in and we spoke to Yahoo directly. While they were sympathetic
to the situation, they stated some sort of Court Order or Law
$)C
Sure you can. I did it on the Cat4000 series switches I have here. It's
rather easy to implement actually.
The information I think you're looking for is in Chapter 17 of the Software
Configuration Guide for the switches themselves.
I believe it's entitled Configuring the IP Permit List.
If it makes you feel better you're definately not alone in this. It
happens to hundreds of people every day. It had happened to a server I
inherited when I started this job and they couldn't figure it out either.
The only reason I know about the fix is because I was an idiot and created
a COM1
Unfortunately, I've never used Retina Scanner so I'm probably not in the
position to claim who's copying who. (smile) I do know that currently SSS
holds the spot as the 'preferred tool' for exploit identification in the
warez/hacking scene.
I've seen it used a number of times on compromised
I'd suggest getting on the support site at Microsoft as a place to start.
(http://support.microsoft.com) Do a search for Security in the Outlook
client, not Outlook Express. I know it can encrypt e-mail on the send
(client side encryption before it sends the e-mail over the wire). I
wouldn't
Shadow Security Scanner is currently the hot tool in the exploit checking
circles. It's exploit DB is regularly updated with the latest and
greatest. It not only checks to see if the exploit exists, it tests the
exploit and then reports back it's findings.
- You can customize your scans to
Often the folks in the Warez scene will hack into a machine and
install a hidden FTP server set to run on these higher port numbers. The
idea being that they are safe because so few applications/services actually
use these ports the network/systems admins won't think to look there.
Ken
Have you tried taking at a look at the network traffic to see if the two
DNS servers are even getting past the handshake phase? From the limited
information I have, I'd have to venture a guess that they're not.
Ken Hayes
Network Administrator
Eastbay / Footlocker.com
Wausau, WI Offices
(715)
If nothing else I'd suggest the implement strong WEP keys. Sure someone
would be able to tell there's a wireless network out there but without the
WEPs, they won't be able to jump on the network. It still leaves them
vulnerable to DoS attacks on it but that's an entirely different issue they