Re: Question for all

2003-08-14 Thread Ansgar Wiechers
On 2003-08-04 Chris Berry wrote: From: Bob Walker [EMAIL PROTECTED] While I am a huge fan of the msconfig utility in windows machines, it doesn't work in win2k. Doesn't even exist. My advice would be to go the safe mode route, as you suggested. Another possible avenue (for advanced users

Re: Question about 802.11i WPA

2003-08-14 Thread Tomas Wolf
I'm not really sure if I understood the question but I'll try to go over some things that can be related to it. An user can't access any of the computers directly if they work in *infrastructure mode*. It is always the central station (access point) through which is the connection completed

RE: Question for all

2003-08-14 Thread Ricardo Ceballos
: Question for all don't know if this is of any help, but found it through google search : http://www.symantec.com/avcenter/venc/data/w32.randex.d.html - Original Message - From: Morton B. Maser [EMAIL PROTECTED] To: Flory D Jeffrey Contractor 59MDSS/MSISI [EMAIL PROTECTED]; [EMAIL

Re: Question about 802.11i WPA

2003-08-14 Thread Mitchell Rowton
I'm trying to determine if 802.11i has sufficiently addresses the deficiencies in WEP to make it a viable alternative to wired networks. I still have one concern that I haven't seen an answer to. Could someone point me to some documentation that might address my concerns. This may help:

RE: Windows 2000 Audit Question

2003-08-14 Thread Tiago Halm
] Subject: RE: Windows 2000 Audit Question I'm fairly sure that 1 applies to domain logons and 2 applies to any other connection that requires authentication. eg. accessing a shared folder. -Original Message- From: Michael Ungar [mailto:[EMAIL PROTECTED] Sent: Sunday, 3 August 2003 3:42 PM

Re: Question for all

2003-08-14 Thread stephen at unix dot za dot net
tried doing a search on the internet for some kind of information pertaining to this, but we had no luck. We also tried all the antiviral websites but they do not have a tool for this. My question is: Has anyone ever heard of this, and if so, how do you clean it off. Thanks in advance

Re: Question for all

2003-08-14 Thread Morton B. Maser
59MDSS/MSISI [EMAIL PROTECTED] Sent: Friday, August 01, 2003 7:22 AM Subject: Question for all A friend of mine recently went from Windows ME to Win2K, but now he has a trojan on his computer. He is running Norton Anti-virus, and it will not clean it off, it will only quarentine

RE: Question for all

2003-08-10 Thread Ramsinghani, Aashish (EM, GECIS)
You can also download Msconfig.exe for XP and run it on Windows 2000.. -Original Message- From: Bob Walker [mailto:[EMAIL PROTECTED] Sent: Monday, August 04, 2003 10:24 AM To: 'KoRe MeLtDoWn'; [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: RE: Question for all Hamish

Question about 802.11i WPA

2003-08-08 Thread localhost
I'm trying to determine if 802.11i has sufficiently addresses the deficiencies in WEP to make it a viable alternative to wired networks. I still have one concern that I haven't seen an answer to. Could someone point me to some documentation that might address my concerns. It seems that a lot of

Re: Question for all

2003-08-06 Thread Nick Bennett
PROTECTED] Cc: Flory D Jeffrey Contractor 59MDSS/MSISI [EMAIL PROTECTED] Sent: Tuesday, August 05, 2003 10:57 AM Subject: Re: Question for all Haven't heard of it specifically by that name - you might check http://www.diamondcs.com.au (TDS-3 anti-trojan scanner) or http://www.nsclean.com (BOClean

Re: Question for all

2003-08-04 Thread Brad Mills
Chris, Well, the best plan would be to wipe your hard drive and start over, but barring that, my next step would be to use SpybotSD, it's pretty good at cleaning out garbage like that. If it works you might consider sending a donation, the developer does all that work for free. Agreed.

Windows 2000 Audit Question

2003-08-04 Thread Michael Ungar
Windows 2000 has 2 Audit Policy Settings; 1 - Audit account logon events 2 - Audit logon events I'm not totally clear on the difference. I know the first one is used as a central repository for auditing logons (e.g., domain account logons to multiple servers can get recorded to the central

RE: Question for all

2003-08-04 Thread Bob Walker
management, and remove the offending service there. Bob -Original Message- From: KoRe MeLtDoWn [mailto:[EMAIL PROTECTED] Sent: Friday, August 01, 2003 2:44 PM To: [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: Re: Question for all Hi there Jeffery, Backdoor.Trojan

RE: Question for all

2003-08-04 Thread George Peek
: Question for all Here is a link to trend http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=TROJ_BDFR.SV R it lists some information and you can use their online scan. David -Original Message- From: Flory D Jeffrey Contractor 59MDSS/MSISI [mailto:[EMAIL PROTECTED] Sent

RE: Question for all

2003-08-04 Thread Glenn Pearl
:54 PM To: 'KoRe MeLtDoWn'; [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: RE: Question for all Hamish While I am a huge fan of the msconfig utility in windows machines, it doesn't work in win2k. Doesn't even exist. My advice would be to go the safe mode route, as you

RE: Question for all

2003-08-04 Thread Chris Berry
From: Bob Walker [EMAIL PROTECTED] While I am a huge fan of the msconfig utility in windows machines, it doesn't work in win2k. Doesn't even exist. My advice would be to go the safe mode route, as you suggested. Another possible avenue (for advanced users only though), would be to go to

Re: Security/Firewall question

2003-08-01 Thread BIll Phillips
Subject: Security/Firewall question Hi everyone! I'm still pretty new to security and firewalls and such, and I'm having a problem wrapping my head around a couple of concepts. Here's what I have- I have a stand alone email server behind an Adsl router (with 4prt hub). The router is set to pass

Question for all

2003-08-01 Thread Flory D Jeffrey Contractor 59MDSS/MSISI
. He cannot get ride of it. We have tried doing a search on the internet for some kind of information pertaining to this, but we had no luck. We also tried all the antiviral websites but they do not have a tool for this. My question is: Has anyone ever heard of this, and if so, how do you

Re: Question for all

2003-08-01 Thread Shaun Colley
have tried doing a search on the internet for some kind of information pertaining to this, but we had no luck. We also tried all the antiviral websites but they do not have a tool for this. My question is: Has anyone ever heard of this, and if so, how do you clean it off. Thanks

RE: Question for all

2003-08-01 Thread Cameron Losco
PROTECTED] Cc: Flory D Jeffrey Contractor 59MDSS/MSISI Subject: Question for all A friend of mine recently went from Windows ME to Win2K, but now he has a trojan on his computer. He is running Norton Anti-virus, and it will not clean it off, it will only quarentine it. The affliction

RE: Question for all

2003-08-01 Thread Jason Armstrong
AM To: [EMAIL PROTECTED]; [EMAIL PROTECTED] Cc: Flory D Jeffrey Contractor 59MDSS/MSISI Subject: Question for all A friend of mine recently went from Windows ME to Win2K, but now he has a trojan on his computer. He is running Norton Anti-virus, and it will not clean it off, it will only

RE: Question for all

2003-08-01 Thread McCleskey, David
, 2003 8:23 AM To: [EMAIL PROTECTED]; [EMAIL PROTECTED] Cc: Flory D Jeffrey Contractor 59MDSS/MSISI Subject: Question for all A friend of mine recently went from Windows ME to Win2K, but now he has a trojan on his computer. He is running Norton Anti-virus, and it will not clean it off, it will only

Re: Question for all

2003-08-01 Thread KoRe MeLtDoWn
PROTECTED] To: [EMAIL PROTECTED], [EMAIL PROTECTED] CC: Flory D Jeffrey Contractor 59MDSS/MSISI [EMAIL PROTECTED] Subject: Question for all Date: Fri, 1 Aug 2003 09:22:51 -0500 MIME-Version: 1.0 Received: from outgoing2.securityfocus.com ([205.206.231.26]) by mc6-f29.law1.hotmail.com with Microsoft

Re: Question for all

2003-08-01 Thread Chris Berry
question is: Has anyone ever heard of this, and if so, how do you clean it off. Thanks in advance for any assistance, anyone can provide. Well, the best plan would be to wipe your hard drive and start over, but barring that, my next step would be to use SpybotSD, it's pretty good at cleaning out

Re: Security/Firewall question

2003-07-31 Thread Morton B. Maser
hardware requirements are a 400 MHz processor and 128 MB Ram (I used an old original Celeron box, and it works fine). M - Original Message - From: Gregg [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Tuesday, July 29, 2003 1:40 AM Subject: Security/Firewall question Hi everyone! I'm

RE: Security/Firewall question

2003-07-30 Thread DeGennaro, Gregory
/Firewall question I'm not certain if- I want to assign that IP to the OpenBSD firewall, and use NAT and/or RDR to pass on SMTP traffic on port 25 to the email server. Yes? No? Maybe? Am I a shame on my species? About the only other valid choice would be if you can coerce the OpenBSD

RE: Security/Firewall question

2003-07-30 Thread Nick Nauwelaerts
-Original Message- From: Gregg [mailto:[EMAIL PROTECTED] Sent: Tuesday, July 29, 2003 10:41 AM To: [EMAIL PROTECTED] Subject: Security/Firewall question Hi everyone! I'm still pretty new to security and firewalls and such, and I'm having a problem wrapping my head around a couple

RE: nmap status question

2003-07-29 Thread Thomas Ng
-Original Message- From: marc brown [mailto:[EMAIL PROTECTED] Sent: Tuesday, July 29, 2003 2:03 AM To: [EMAIL PROTECTED] Subject: nmap status question i am new to linux but after getting my rh9 box running i have started to use nmap to do some scanning of my networks. can someone tell

Re: nmap status question

2003-07-29 Thread Joshua J . Kugler
Marc - From the nmap man page: The result of running nmap is usually a list of interesting ports on them achine(s) being scanned (if any). Nmap always gives the port's well known service name (if any), number, state, and protocol. The state is either 'open', ´filtered´, or

Re: nmap status question

2003-07-29 Thread David
On Mon, 28 Jul 2003, marc brown wrote: i am new to linux but after getting my rh9 box running welcome to linux i have started to use nmap to do some scanning of my networks. can someone tell me exactly what it means when the state of a particular port is 'filtered'? man nmap will tell

Re: nmap status question

2003-07-29 Thread gminick
On Mon, Jul 28, 2003 at 06:03:26PM -, marc brown wrote: i am new to linux but after getting my rh9 box running i have started to use nmap to do some scanning of my networks. can someone tell me exactly what it means when the state of a particular port is 'filtered'? Ugly RTFM, really...

Re: nmap status question

2003-07-29 Thread john mathew
In-Reply-To: [EMAIL PROTECTED] Hi Marc A port is in either of the two states ie , open or closed at any point of time. But using a firewall a particular port can be blocked.In such a scenario when nmap is run aganist a system which has a particular port blocked by a firewall , then the

Re: nmap status question

2003-07-29 Thread Pete Hunt
Filtered means that a firewall or similar is covering the port and stopping nmap from determining whether the port is open. (Unfiltered means that nmap knows the port is closed and nothing is interfering with nmap's ability to detect it) At 18:03 28/07/2003 +, marc brown wrote: i am new

Security/Firewall question

2003-07-29 Thread Gregg
Hi everyone! I'm still pretty new to security and firewalls and such, and I'm having a problem wrapping my head around a couple of concepts. Here's what I have- I have a stand alone email server behind an Adsl router (with 4prt hub). The router is set to pass-thru (nat and firewall disabled).

Re: nmap status question

2003-07-29 Thread Birl
As it was written on Jul 28, thus marc brown spake unto [EMAIL PROTECTED]: marc: Date: 28 Jul 2003 18:03:26 - marc: From: marc brown [EMAIL PROTECTED] marc: To: [EMAIL PROTECTED] marc: Subject: nmap status question marc: marc: marc: marc: i am new to linux but after getting my rh9 box

RE: Security/Firewall question

2003-07-29 Thread David Gillett
I'm not certain if- I want to assign that IP to the OpenBSD firewall, and use NAT and/or RDR to pass on SMTP traffic on port 25 to the email server. Yes? No? Maybe? Am I a shame on my species? About the only other valid choice would be if you can coerce the OpenBSD box to act

RE: nmap status question

2003-07-29 Thread Brad Bemis
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 A port is in either of the two states ie , open or closed at any point of time. That is not exactly correct. Ports are not either open or closed. Depending on the protocol, there are actually several different states of activity. For

Re: Security/Firewall question

2003-07-29 Thread Glenn English
On Tue, 2003-07-29 at 02:40, Gregg wrote: I'm not certain if- I want to assign that IP to the OpenBSD firewall, Yup and use NAT and/or RDR to pass on SMTP traffic on port 25 to the email server. Yup And put the email server on one of the private nets; set up the OpenBSD box with no

Re: nmap status question

2003-07-29 Thread Shaun Moore
To put it very trivially, when a port is filtered it drops packets which do not originate from a trusted IP address. Just one example of when port filtering is used is for backdoors or trojans. These often only accept connections from user-specified IP addresses, and silently ignore all other

RE: Security/Firewall question

2003-07-29 Thread Michael Dunn
: Gregg [mailto:[EMAIL PROTECTED] Sent: Tuesday, July 29, 2003 4:41 AM To: [EMAIL PROTECTED] Subject: Security/Firewall question Hi everyone! I'm still pretty new to security and firewalls and such, and I'm having a problem wrapping my head around a couple of concepts. Here's what I have- I

Re: nmap status question

2003-07-29 Thread David Vertie
PROTECTED] Subject: Re: nmap status question Date: 29 Jul 2003 07:27:42 - In-Reply-To: [EMAIL PROTECTED] Hi Marc A port is in either of the two states ie , open or closed at any point of time. But using a firewall a particular port can be blocked.In such a scenario when nmap is run aganist

Re: Security/Firewall question

2003-07-29 Thread Terry Soucy
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Heya Gregg, On Tuesday, July 29, 2003, at 05:40 AM, Gregg wrote: I'm not certain if- I want to assign that IP to the OpenBSD firewall, and use NAT and/or RDR to pass on SMTP traffic on port 25 to the email server. Yes? No? Maybe? Am I a shame on

Re: ARP Spoof Question

2003-07-28 Thread Martin Brecher
The Fueley wrote: How would that apply to a layer 3 switch/router? Actually the packaging says that I have a Residential Gateway/Router/Firewall. Aren't gateways layer 7 devices? While switches are layer 2 devices, they deal with MAC addresses right? Maybe a smart switch knows which MAC addresses

RE: ARP Spoof Question

2003-07-28 Thread David Gillett
: RE: ARP Spoof Question what are layers? what purpose do they serve? dave On Thu, 24 Jul 2003, David Gillett wrote: Switches are layer 2 devices, IP begins at layer 3. A -switch- usually doesn't understand a single ip bit. The management side of the switch (snmp, http

nmap status question

2003-07-28 Thread marc brown
i am new to linux but after getting my rh9 box running i have started to use nmap to do some scanning of my networks. can someone tell me exactly what it means when the state of a particular port is 'filtered'? thanks, marc

RE: ARP Spoof Question

2003-07-24 Thread Stuart
]; [EMAIL PROTECTED] Subject: Re: ARP Spoof Question Q1.My Question is, Node C will also reply to that request of Node A. SO now Node A has 2 different MAC for the same IP. How is Node A handling this situation??? Q2.The switch also updates its table of IP/MAC address bindings, so how is switch handling

RE: ARP Spoof Question

2003-07-24 Thread The Fueley
-Original Message- From: Stephane Nasdrovisky [mailto:[EMAIL PROTECTED] Sent: Wednesday, July 23, 2003 2:05 PM To: [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Subject: Re: ARP Spoof Question I have a small question. I was reading about ARP Spoofing and here is my question. So when Node

RE: ARP Spoof Question

2003-07-24 Thread David Gillett
] Sent: July 23, 2003 16:13 To: [EMAIL PROTECTED] Subject: RE: ARP Spoof Question If we use a Cisco switch for example, don't they have a learning period? I would presume that the switch would go through the process of building its ARP tables again. Stu -Original Message

RE: ARP Spoof Question

2003-07-24 Thread Stuart
Gillett [mailto:[EMAIL PROTECTED] Sent: 24 July 2003 17:39 To: 'Stuart'; [EMAIL PROTECTED] Subject: RE: ARP Spoof Question A switch should *always* be learning. A destination MAC address should always fall into one of two categories: 1. I have it in my switch table (NOT *ARP*, per se), because I

RE: ARP Spoof Question

2003-07-24 Thread David Gillett
Switches are layer 2 devices, IP begins at layer 3. A -switch- usually doesn't understand a single ip bit. The management side of the switch (snmp, http, telnet, whatever) are to be considered as any other networked host. How would that apply to a layer 3

RE: ARP Spoof Question

2003-07-24 Thread David Gillett
Question -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Thanks for clearing that up, I remember reading an article a while back about sending frequent spoofed ARP packets to receive packets but have been unable to locate the article. You can specify your own Mac address on some network

Re: ARP Spoof Question

2003-07-24 Thread Justin Pryzby
[mailto:[EMAIL PROTECTED] Sent: 24 July 2003 17:39 To: 'Stuart'; [EMAIL PROTECTED] Subject: RE: ARP Spoof Question A switch should *always* be learning. A destination MAC address should always fall into one of two categories: 1. I have it in my switch table (NOT *ARP*, per se), because I

ARP Spoof Question

2003-07-23 Thread Vineet Mehta
Hi all members, I have a small question. I was reading about ARP Spoofing and here is my question. When Node A wants to send some packets to Node C, it sends a ARP Broadcast to find out the MAC address of Node C. This broadcast reaches all nodes in a network in a switched or Hub network. So when

Re: ARP Spoof Question

2003-07-23 Thread David J. Bianco
On Wed, 2003-07-23 at 01:22, Vineet Mehta wrote: Q1.My Question is, Node C will also reply to that request of Node A. SO now Node A has 2 different MAC for the same IP. How is Node A handling this situation??? Q2.The switch also updates its table of IP/MAC address bindings, so how

RE: ARP Spoof Question

2003-07-23 Thread David Gillett
an additional response (first two lines) but the if prevents it from looping infinitely.) David Gillett -Original Message- From: Vineet Mehta [mailto:[EMAIL PROTECTED] Sent: July 22, 2003 22:22 To: [EMAIL PROTECTED] Subject: ARP Spoof Question Hi all members, I have a small question. I

Re: ARP Spoof Question

2003-07-23 Thread Simon Gray
Q1.My Question is, Node C will also reply to that request of Node A. SO now Node A has 2 different MAC for the same IP. How is Node A handling this situation??? Q2.The switch also updates its table of IP/MAC address bindings, so how is switch handling this situation??? Is it first-come-first-serve

Re: ARP Spoof Question

2003-07-23 Thread jfastabe
a small question. I was reading about ARP Spoofing and here is my question. When Node A wants to send some packets to Node C, it sends a ARP Broadcast to find out the MAC address of Node C. This broadcast reaches all nodes in a network in a switched or Hub network. So when Node B is a attacker he

Re: QMail Question

2003-07-21 Thread Chris Berry
... Is it necessary to configure qmail-smtpd in inetd.conf??? If i start qmail in start script from inet.d directory for example or by service qmail start it works fine. And one more question. I'm using xinet daemon, so i've no inetd.conf file, but xinet.d directory with stored settings. How can i

QMail Question

2003-07-18 Thread Pessoft
qmail-smtpd in inetd.conf??? If i start qmail in start script from inet.d directory for example or by service qmail start it works fine. And one more question. I'm using xinet daemon, so i've no inetd.conf file, but xinet.d directory with stored settings. How can i interpret setting mentioned above

Re: QMail Question

2003-07-18 Thread Einstein Oliveira
Pessoft wrote: I've removed sendmail and installed qmail. In installation info it's written this: 16. Set up qmail-smtpd in /etc/inetd.conf (all on one line): smtp stream tcp nowait qmaild /var/qmail/bin/tcp-env tcp-env /var/qmail/bin/qmail-smtpd ... Is it necessary

Re: QMail Question

2003-07-18 Thread Matt Thoene
On Friday, July 18, 2003 @ 6:36:33 AM [-0700], Pessoft wrote: service smtp { disable = yes socket_type = stream protocol= tcp wait= no user= qmaild server =

Re: QMail Question

2003-07-18 Thread Allan Manayan
question. I'm using xinet daemon, so i've no inetd.conf file, but xinet.d directory with stored settings. How can i interpret setting mentioned above to setting for xinetd? I've created file xinet-smtpd in xinet.d directory, which contains this: service smtp { disable = yes socket_type

Re: [misc-sec] QMail Question

2003-07-18 Thread Jon Zobrist
/qmail-smtpd ... Is it necessary to configure qmail-smtpd in inetd.conf??? If i start qmail in start script from inet.d directory for example or by service qmail start it works fine. And one more question. I'm using xinet daemon, so i've no inetd.conf file, but xinet.d directory with stored

RE: Question for you all

2003-07-07 Thread Brad Bemis
PROTECTED] Cc: [EMAIL PROTECTED] Subject: Re: Question for you all I agree. FreeBSD and moreso, OpenBSD, are indeed more secure by default and you are correct that this doesn't mean it's more secure over all, there's just less word, at first. However, look at the kernel for OpenBSD compared to Linux

Re: Question for you all

2003-07-07 Thread Steve Bremer
Bastille Linux (http://www.bastille-linux.org/) and Immunix (http://www.immunix.org/) definitely fit the bill. I've worked with both and have been quite pleased with their overall security. Let's not forget about one of my favorites: Openwall/*/GNU Linux. www.openwall.com Steve Bremer

Re: Port scanning question

2003-07-04 Thread Brad Mills
Thom, As a relative newcomer to the security field, but with a reasonable amount of experience in sys admin roles, I am now responsible for the network security of the (small) company I work for. One of the things I would like to do is determine if (when) our web server, which hosts our

Re: Question for you all

2003-07-04 Thread Tim Greer
, consulting. - Original Message - From: exon [EMAIL PROTECTED] To: CreativeSell [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Sent: Thursday, July 03, 2003 5:13 AM Subject: Re: Question for you all On Mon, 30 Jun 2003, CreativeSell wrote: Hi All, Having just got off an awful php host, my

Re: Question for you all

2003-07-04 Thread Ivan Coric
Hi ae, I think some of your comments are not exactly correct. OpenBSD is secure by default because no services running, as soon as you activate httpd or alike the actual daemon is what will be the problem not the under lying OS. As for RedHat, I like it, you can make it as secure as any distro,

RE: Port scanning question

2003-07-04 Thread Thomas Ng
It runs on windows as well. -Original Message- From: DeGennaro, Gregory [mailto:[EMAIL PROTECTED] Sent: Thursday, July 03, 2003 1:30 AM To: Thom Larner; '[EMAIL PROTECTED]' Subject: RE: Port scanning question Check out SNORT which runs on UNIX. And reviewing firewall or router syslogs

Re: Question for you all

2003-07-04 Thread Tim Greer
: [EMAIL PROTECTED] Sent: Thursday, July 03, 2003 5:17 PM Subject: Re: Question for you all Hi ae, I think some of your comments are not exactly correct. OpenBSD is secure by default because no services running, as soon as you activate httpd or alike the actual daemon is what

RE: Port scanning question

2003-07-03 Thread Rajesh Kumar Dilli
PROTECTED]' Subject: Port scanning question Hi all, As a relative newcomer to the security field, but with a reasonable amount of experience in sys admin roles, I am now responsible for the network security of the (small) company I work for. One of the things I would like to do is determine

Re: Question for you all

2003-07-03 Thread Tim Greer
to try and list here. -- Regards, Tim Greer [EMAIL PROTECTED] Server administration, security, programming, consulting. - Original Message - From: CreativeSell [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Monday, June 30, 2003 2:49 PM Subject: Question for you all Hi All, Having

Re: Question for you all

2003-07-03 Thread m0use
On Mon, 2003-06-30 at 16:49, CreativeSell wrote: .what else can we do? Olly Bastille it. http://www.bastille-linux.org/ Log everything and actually read the logs, use logsentry or swatch to manage them. Use a system integrity monitor like tripwire.

Re: Port scanning question

2003-07-03 Thread Meritt James
scanned how? There are different ways to scan, but the basic sequential ports, fast (does anybody still do this?) shows up big time in the logs and sets off lights and alarms in almost (?) every intrusion detection system there is. Now, a slow, irregular, half-sync scan... Jim Thom Larner

RE: Port scanning question

2003-07-03 Thread DeGennaro, Gregory
Check out SNORT which runs on UNIX. And reviewing firewall or router syslogs can help too. --Greg -Original Message- From: Thom Larner [mailto:[EMAIL PROTECTED] Sent: Monday, June 30, 2003 4:38 PM To: '[EMAIL PROTECTED]' Subject: Port scanning question Hi all, As a relative newcomer

Re: Question for you all

2003-07-03 Thread vincent
On Mon, 30 Jun 2003 22:49:32 +0100 CreativeSell [EMAIL PROTECTED] said: Hi All, Having just got off an awful php host, my partner and I have decided to get our own redhat server. However we are slightly apprhhensive about ebing hacked to pieces. we are keeping up to date with all bugtracks

Re: Question for you all

2003-07-03 Thread Mitch Pirtle
On Mon, 2003-06-30 at 17:49, CreativeSell wrote: Hi All, Having just got off an awful php host, my partner and I have decided to get our own redhat server. However we are slightly apprhhensive about ebing hacked to pieces. we are keeping up to date with all bugtracks and security

Re: Port scanning question

2003-07-03 Thread Rodney Green
One of the things I would like to do is determine if (when) our web server, which hosts our applications, is being port scanned. How do I go about this? Are there (free or cheap) tools that will help you do this? The Snort Intrusion Detection System (IDS) is free software that will

Re: Port scanning question

2003-07-03 Thread Ryan Smith
: Thom Larner [EMAIL PROTECTED] Subject: Port scanning question Hi all, As a relative newcomer to the security field, but with a reasonable amount of experience in sys admin roles, I am now responsible for the network security of the (small) company I work for. One of the things I would like

Re: Question for you all

2003-07-03 Thread Birl
csell: Date: Mon, 30 Jun 2003 22:49:32 +0100 csell: From: CreativeSell [EMAIL PROTECTED] csell: To: [EMAIL PROTECTED] csell: Subject: Question for you all csell: csell: Hi All, csell: csell: Having just got off an awful php host, my partner and I have decided to get csell: our own redhat

Re: Port scanning question

2003-07-03 Thread Justin Pryzby
Linux has scanlogd and scandetd, both of which are short and simple. Probably Sun has their own, too. I don't know if anyone supports this, but this could also be implemented on a router/switch, which would save you time managing different OS. Justin On Wed, Jul 02, 2003 at 08:26:02PM +,

Re: Port scanning question

2003-07-03 Thread Mitchell Rowton
There are a number of different things that could alert you to a port scan, but an IDS generaly has the role of detecting these types of events. Snort is a very popular free IDS, but if would be best to install on a seperate box (if you have an old pc around) Check out their website at

Re: Digital Evidence Question - What is an effective Windows hard -disk search tool?

2003-07-03 Thread Jack Crone
On 6/30/2003 at 8:46 PM Benjamin A. Okopnik wrote: Well, I can't claim that I've actually seen a _documented_ recovery as such, or that I have *absolute* proof, but - having worked for $LARGE_AEROSPACE_COMPANY where this was a concern, I'm aware of two techniques that were supposedly in actual

RE: Question for you all

2003-07-03 Thread Maher Odeh
/nikto.shtml Enjoy ;-) -Original Message- From: CreativeSell [mailto:[EMAIL PROTECTED] Sent: Monday, June 30, 2003 11:50 PM To: [EMAIL PROTECTED] Subject: Question for you all Hi All, Having just got off an awful php host, my partner and I have decided to get our own redhat

RE: Port scanning question

2003-07-03 Thread David Gillett
] Sent: June 30, 2003 16:38 To: '[EMAIL PROTECTED]' Subject: Port scanning question Hi all, As a relative newcomer to the security field, but with a reasonable amount of experience in sys admin roles, I am now responsible for the network security of the (small) company I work for. One

Re: Port scanning question

2003-07-03 Thread Devdas Bhagat
On 01/07/03 09:38 +1000, Thom Larner wrote: security of the (small) company I work for. One of the things I would like to do is determine if (when) our web server, which hosts our applications, is being port scanned. How do I go about this? Are there (free or cheap) http://www.snort.org/ is

Re: Digital Evidence Question - What is an effective Windows hard -disk search tool?

2003-07-03 Thread Jack Crone
On 6/30/2003 at 7:53 PM isox wrote: There is a good paper written by Peter Gutmann titled Secure Deletion of Data from Magnetic and Solid-State Memory. It is nearly a decade old, but it contains some very good information in it. It is available at

Re: Question for you all

2003-07-03 Thread Jeff
On Mon, Jun 30, 2003 at 10:49:32PM +0100, CreativeSell wrote: Hi All, Having just got off an awful php host, my partner and I have decided to get our own redhat server. However we are slightly apprhhensive about ebing hacked to pieces. we are keeping up to date with all bugtracks and

RE: Question for you all

2003-07-03 Thread John Brightwell
-Original Message- From: CreativeSell [mailto:[EMAIL PROTECTED] Sent: 30 June 2003 22:50 To: [EMAIL PROTECTED] Subject: Question for you all Hi Olly, Probably the first thing I'd do is get hold of a private email address that isn't easily associated with your site and use

AW: Port scanning question

2003-07-03 Thread Meidinger Chris
on the firewall. badenIT GmbH System Support Chris Meidinger Tullastrasse 70 79108 Freiburg -Ursprngliche Nachricht- Von: Thom Larner [mailto:[EMAIL PROTECTED] Gesendet: Tuesday, July 01, 2003 1:38 AM An: '[EMAIL PROTECTED]' Betreff: Port scanning question Hi all, As a relative newcomer

Re: Question for you all

2003-07-03 Thread exon
On Mon, 30 Jun 2003, CreativeSell wrote: Hi All, Having just got off an awful php host, my partner and I have decided to get our own redhat server. However we are slightly apprhhensive about ebing hacked to pieces. we are keeping up to date with all bugtracks and security updates...what

Re: Question for you all

2003-07-03 Thread Devdas Bhagat
On 30/06/03 22:49 +0100, CreativeSell wrote: Having just got off an awful php host, my partner and I have decided to get our own redhat server. However we are slightly apprhhensive about ebing hacked to pieces. we are keeping up to date with all bugtracks and security updates...what else can

Question for you all

2003-07-02 Thread CreativeSell
Hi All, Having just got off an awful php host, my partner and I have decided to get our own redhat server. However we are slightly apprhhensive about ebing hacked to pieces. we are keeping up to date with all bugtracks and security updates...what else can we do? Olly

Re: Digital Evidence Question - What is an effective Windows hard-disk search tool?

2003-07-02 Thread isox
There is a good paper written by Peter Gutmann titled Secure Deletion of Data from Magnetic and Solid-State Memory. It is nearly a decade old, but it contains some very good information in it. It is available at http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html

Re: Digital Evidence Question - What is an effective Windows hard -disk search tool?

2003-07-02 Thread Benjamin A. Okopnik
On Fri, Jun 27, 2003 at 08:06:52PM -0700, Jack Crone wrote: If anyone on the list is aware of an actual, documented recovery I would really like to know about it. Demonstrations which show how to retrieve a few bits don't count. Neither do the claims of some data recovery companies who, when

Re: Digital Evidence Question - What is an effective Windowshard -disk search tool?

2003-07-02 Thread Meritt James
Hence the DCID 6/3 specification that disks may only be used after cleaning at the classification they were used on or above. The bad sector problem with disks thwarts many of the erase procedures. There may be data written in those sectors that tools (all tools, to my understanding) do not

Port scanning question

2003-07-02 Thread Thom Larner
Hi all, As a relative newcomer to the security field, but with a reasonable amount of experience in sys admin roles, I am now responsible for the network security of the (small) company I work for. One of the things I would like to do is determine if (when) our web server, which hosts our

RE: Digital Evidence Question - What is an effective Windows hard -disk search tool?

2003-06-30 Thread Troy Larson
: Digital Evidence Question - What is an effective Windows hard -disk search tool? Greetings All, I really have to jump in in the middle of this one(threads included, for contextual reference). OnTrack's Data Recovery utility (cost: $200) is an excellent tool for recovering data from

RE: Digital Evidence Question - What is an effective Windows hard-disk search tool?

2003-06-30 Thread Bob Walker
, and this has saved my backside several times already. Regards Bob -Original Message- From: Troy Larson [mailto:[EMAIL PROTECTED] Sent: Thursday, June 26, 2003 2:32 PM To: 'Robinson, Sonja'; 'NC Agent'; [EMAIL PROTECTED] Subject: RE: Digital Evidence Question - What is an effective Windows hard

RE: Digital Evidence Question - What is an effective Windows hard -disk search tool?

2003-06-30 Thread Troy Larson
] Subject: RE: Digital Evidence Question - What is an effective Windows hard -disk search tool? According to information I received at an HTCIA meeting about 3 months ago, as well as some reading that I have done, 31 times is now what is recommended. I can't locate my notes that had

  1   2   3   4   5   6   7   >