JM:
Kids don't know how to chage password, and are running with restricted user.
.
JM wrote:
How old are your kids, maybe not so innocent eh?
You probably setup W2000 with all the default options, so have IIS
running on there, with unpatched vulnerabilities.
Check the event log that may
Be careful
A Lesson I have learned some time ago, from the management. They say
You not need to kill me to demonstrate that you can do it. So better
mount a presentation with test machines.
netsec novice wrote:
I would like to demonstrate the importance of physical security to
management by
Hi list
I have a machine with Windows 2000 with SP4, Kerio Personal Firewall.
My kids use to chat with messenger.
Last night I discover my admin password was changed, so I have a little
surprised.
My only corrective action until now was to remove and hide the modem.
But what can I do? How is
. For a *bank*, I think it's just WRONG.
David Gillett
-Original Message-
From: Meritt James [mailto:[EMAIL PROTECTED]
Sent: July 31, 2003 06:16
To: pablo gietz
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: Hosting
A bank is outsourcing? yeah. There may well be privacy
banking networks?
On Tue, 2003-07-29 at 16:20, pablo gietz wrote:
Hi all
What are the usual terms and condition about security a Bank may require
to a hosting company?
Legal aspect, security, availability, confidentiality, any interesting
link?.
Its better to have the hosting into de company or out
Hi all
What are the usual terms and condition about security a Bank may require
to a hosting company?
Legal aspect, security, availability, confidentiality, any interesting
link?.
Its better to have the hosting into de company or out ?
Thanks
--
Pablo A. C. Gietz
Jefe de Seguridad Informtica
May be kerio Firewall or winroute firewall
Hyperion wrote:
Hello all :)
I have been taking a more detailed interest in my pc's security of late,
and security for computers in general, and I am learning at quite a fast
rate, although there is a great, great deal of information to learn out
Thear list,
Do you know how to encrypt the proces of authentication betwen the
browser and squid proxy?
We like to use the same login name and password for NT and squid, but
doing so we expose the
password of the NT users based in the fact that the browser code the
password in base64.
Thanks
Hi discipulus
I sugest you to read the orange book and find the category of
operating system that meet your needs (B1 for example).
Then if you are parent of saruman (lord of the rings) you may find
that OS.
Seriously you may put some dumb terminals like NET PCs in the most
risky sectors.
Dear gurus
We are defining policies for the use of corporate e-mail, I have doubts
about privacy of messages sent by employees. Since the e-mail system is
intended for business use, we need to prevent sensitive information
disclosure. If we respect the privacy , how can discover infidelity
u may use ghost
- Original Message -
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Tuesday, December 24, 2002 7:12 AM
Subject: copying a disk image to restore on linux
hi all,
I would like to know if there are any utilities on linux (preferably
freeware) which can create a
http://inner-smile.com/nocrack.phtml
- Original Message -
From: Rahul Chander Kashyap [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Saturday, December 21, 2002 10:49 AM
Subject: Writing secure code
Hi people,
I've been going through some articles on how to write secure code esp.
Hi
Do Right click on the tray icon , and select Firewall status . There you can
view all process listening. You can disable the firewall and still view this
screen.
In my experience the best way to configure the personal firewall is defining
rules on the way. This software also permit save your
Dear list:
It's possible that a intruder could take active part of a TCP connection
after this was established?
In UPD I know this is true because is a connectionless protocol. But I have
doubts about TCP.
Thanks
Pablo A. C. Gietz
Jefe de Seguridad Informática
Nuevo Banco de Entre Ríos S.A.
Te.:
Read This, may be related.
http://www.phenoelit.org/arpoc/
Also I want to ear the experts opinion about this or similar soft. This
work? this represent a risk?
Thanks
Pablo A. C. Gietz
Jefe de Seguridad Informática
Nuevo Banco de Entre Ríos S.A.
Te.: 0343 - 4201351
- Original Message
Hi list
DO you know if FTP (standard) login process is maked in clear text?
thanks
Pablo A. C. Gietz
Jefe de Seguridad Informática
Nuevo Banco de Entre Ríos S.A.
Te.: 0343 - 4201351
Pablo A. C. Gietz
Jefe de Seguridad Informática
Nuevo Banco de Entre Ríos S.A.
Te.: 0343 - 4201351
I think that if any data would be recovered after rewritten 30 times, we can
expect a disk of 20GB have 600GB of data to be recovered. Also we need to
know the correct nth version of the FAT in order to recover clusters in the
right order. I think this is really difficult to do.
Pablo A. C. Gietz
You should encrypt the output from apache server, redirecting ports, and
develop a personal browser that decrypt the pages only for your eyes,
making no chache of anything.
Pablo A. C. Gietz
Jefe de Seguridad Informática
Nuevo Banco de Entre Ríos S.A.
Te.: 0343 - 4201351
- Original Message
18 matches
Mail list logo