I've to choose betwen FW-1 et Guantlet and i have no specific comparaison.
If someone can help me i will be very thankfull.
Get FREE voicemail, fax and email at http://voicemail.excite.com
Talk online at
If the netowkr architecture was done correctly and the underlying
operating system was hardened to only allow that particular application's
protocol to be the only service enabled then it would be very hard to
actually get in.. Marcus's assumption is that every firewall admin or
Hi all !
I would like know whether there is a solution for tear drop attack and sys flooding
attack for BSD . If so please
forward me the site to find the source to me.
Thanks !
VRS
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]
Taken to extremes, all the applications running inside the
protected network would have to be duplicated on the
firewall and written in "safe" form. :)
In addition, all incoming code would have to be run
in a sandbox to determine if it does things that
are contrary to the security policy of all
FWIW I am not a paid endorser for any product, but after watching this
list (with the occasional post), for quite some time there is a repeated
pattern of the 'fill in name/organization here' am new to security and
want to know how to get started...good books to get...understand the
difference
I would like know whether there is a solution for tear drop
attack and sys flooding attack for BSD . If so please
forward me the site to find the source to me.
I could be wrong, but I assume the latest
(or even not-so-latest due to the age of
the listed attacks) version of the kernel
would
I have a combo question.
I am running Firewall-1 3.0b 3048, and my router is a Cisco 2611
running 12.0.6t.
We are getting alot of chatter traffic on high ports above 30k
coming inbound that appear to be associated with web browsing. The
firewall blocks this traffic, and
a) I have a web server running ,MS IIS, I have enabled
anonymous access only
and removed IUSR_computername account from user right "access
this computer
from n/w" .only "log on locally" right has been assigned to this
account..but the client browser is not able to access web
Can anyone let me know if you know how to perform automatic backups from a Nokia
IP650 Firewall to a NT Server using CRON or such like...
Thanks.Helen.
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]
Taken to extremes, all the applications running inside the
protected network would have to be duplicated on the
firewall and written in "safe" form. :)
lol :D I suppose :)
In addition, all incoming code would have to be run
in a sandbox to determine if it does things that
are contrary to
(Sorry Paul, I like your posting a lot (and I am really more "on your side"),
so no offense, but) "mht" *might* have covered these cases by saying
"if the network architecture was done correctly ..". Probably far
fetched, but this term *could* include ActiveX Java disabeled on all
I have a very busy web server for a client and
it is well protected by a firewall etc. However we
find that some of the internet statisticians have
been
able to guage the number of hits that the web
server
is getting each day.
The statisticians contacted us as they were curiuos
to get more info
12 matches
Mail list logo