Hi Amit,
On Fri, Mar 25, 2011 at 7:17 PM, Amit Pal <[email protected]> wrote:
> Hello,
>
>
> So it is obvious to put feature in this remote UMIT scanner which is
>> already present in the UMIT_WEB Scanner.But somehow i have doubt about the
>> scanning feature Application hosted over cloud.If some one want to scan the
>> host machine which is running over on cloud.According to the documentation
>> it will search the nearby host but my point is cloud is globally how much he
>> can search the host : )
>>
>>
> Let say a cloud (named A) where UMIT_network web Scanner has deployed. and
> i am the user(let say B) who do login to that website(A) and run the web
> scanner.As we put the two point on the previous mail.
> First one is that B can scan his machine by running the
> UMIT_NETWORK_WEBSCANNER and see the connected host.
> Second one is that B can also scan the machine A and can check the near
> host to A machine.So my doubt is that A is hosted over cloud if someone want
> to scan the A machine.so will it scan those another machine (excepted) B
> machine which are connected to the them ?
>
It is a very specific user case, isn't? Did you test Network Web Scanner?
>
>
> There are also some software which can block to run the port scanner on his
> machine my suggestion is that we can add some vector data to the
> information(data is going to the host machine) and the vector data will vary
> to every after information.WIFI system using this vector data .and this
> functionality can also be use vice-versa.
>
> There are lot's of firewall which provide a facility to block the port
> scanner over him. I don't know that it is illegal or not .we can cross this
> huddle by sending the extra data which is also known as vector data with
> do_get information(after seeing the diagram of request_response) and this
> vector data is change to change from after every do get information.So that
> no one can knows what kind of information we want to fetch from another
> machine.So it can break the firewall easily and scan the ports.
>
Is it like a HTTP tunnel? Or something? Could you please give me some links
about these "vector data" that you are talking about?
>
>
> Regards :
> Amit Pal
>
>
> ------------------------------------------------------------------------------
> Enable your software for Intel(R) Active Management Technology to meet the
> growing manageability and security demands of your customers. Businesses
> are taking advantage of Intel(R) vPro (TM) technology - will your software
> be a part of the solution? Download the Intel(R) Manageability Checker
> today! http://p.sf.net/sfu/intel-dev2devmar
> _______________________________________________
> Umit-devel mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/umit-devel
>
>
Best Regards,
--
Luís A. Bastião Silva
Skype: koplabs
http://www.bastiao.org
------------------------------------------------------------------------------
Enable your software for Intel(R) Active Management Technology to meet the
growing manageability and security demands of your customers. Businesses
are taking advantage of Intel(R) vPro (TM) technology - will your software
be a part of the solution? Download the Intel(R) Manageability Checker
today! http://p.sf.net/sfu/intel-dev2devmar
_______________________________________________
Umit-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/umit-devel