Hi,

I am not sure it's what you need (I don't know if you need a free and
limited tool or this kind of tool) but just take a look at :
http://www.ipswitch.com/Products/WhatsUp/index.asp

Hope this helps.
---
Patrick Stuto
PSideo Informatique
Av. du Bois de la Chapelle 99, CH-1213 Onex
tél. +41 (22) 870 17 16
fax +41 (22) 870 17 17
web http://www.psideo.com

> -----Message d'origine-----
> De: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED]]De la part de Dave Gillett
> Date: lundi, 11. octobre 1999 11:18
> À: [EMAIL PROTECTED]
> Objet: Re: Exploiting RedHat
>
>
> On 9 Oct 99, at 17:14, Ahbaid Gaffoor wrote:
>
> > Where can I find information on how to exploit certain OS's?
> >
> > I'm setting up a RedHat based web server and would like to demonstrate
> > the need for security policies to my employer and clients...
>
>   One of the common scan signatures that we were seeing last Oct-
> March, we started referring to as "womebody's RedHat box got
> compromised", because when we notified the admins at the source IP
> address, that was invariably found to be the case.
>
> David G
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
>


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to