Guantlet vs FW1

1999-11-16 Thread elamrani
I've to choose betwen FW-1 et Guantlet and i have no specific comparaison. If someone can help me i will be very thankfull. Get FREE voicemail, fax and email at http://voicemail.excite.com Talk online at

SV: Query on FW Attacks -reply

1999-11-16 Thread Per Gustav Ousdal
If the netowkr architecture was done correctly and the underlying operating system was hardened to only allow that particular application's protocol to be the only service enabled then it would be very hard to actually get in.. Marcus's assumption is that every firewall admin or

Dos attacks !

1999-11-16 Thread R.Srinivasan
Hi all ! I would like know whether there is a solution for tear drop attack and sys flooding attack for BSD . If so please forward me the site to find the source to me. Thanks ! VRS - [To unsubscribe, send mail to [EMAIL PROTECTED] with "unsubscribe firewalls" in the body of the message.]

Re: VS: Query on FW Attacks -reply

1999-11-16 Thread Gary Flynn
Taken to extremes, all the applications running inside the protected network would have to be duplicated on the firewall and written in "safe" form. :) In addition, all incoming code would have to be run in a sandbox to determine if it does things that are contrary to the security policy of all

RIF or {Reading is Fundamental - AND FUN}

1999-11-16 Thread Mike Bost(CSIRT)
FWIW I am not a paid endorser for any product, but after watching this list (with the occasional post), for quite some time there is a repeated pattern of the 'fill in name/organization here' am new to security and want to know how to get started...good books to get...understand the difference

RE: Dos attacks !

1999-11-16 Thread Mullen, Patrick
I would like know whether there is a solution for tear drop attack and sys flooding attack for BSD . If so please forward me the site to find the source to me. I could be wrong, but I assume the latest (or even not-so-latest due to the age of the listed attacks) version of the kernel would

Cisco ACLs

1999-11-16 Thread Engasser, Charlie
I have a combo question. I am running Firewall-1 3.0b 3048, and my router is a Cisco 2611 running 12.0.6t. We are getting alot of chatter traffic on high ports above 30k coming inbound that appear to be associated with web browsing. The firewall blocks this traffic, and

RE: WIN NT

1999-11-16 Thread Michael Howard
a) I have a web server running ,MS IIS, I have enabled anonymous access only and removed IUSR_computername account from user right "access this computer from n/w" .only "log on locally" right has been assigned to this account..but the client browser is not able to access web

No Subject

1999-11-16 Thread Helen_Richardson
Can anyone let me know if you know how to perform automatic backups from a Nokia IP650 Firewall to a NT Server using CRON or such like... Thanks.Helen. - [To unsubscribe, send mail to [EMAIL PROTECTED] with "unsubscribe firewalls" in the body of the message.]

SV: VS: Query on FW Attacks -reply

1999-11-16 Thread Per Gustav Ousdal
Taken to extremes, all the applications running inside the protected network would have to be duplicated on the firewall and written in "safe" form. :) lol :D I suppose :) In addition, all incoming code would have to be run in a sandbox to determine if it does things that are contrary to

SV: SV: Query on FW Attacks -reply

1999-11-16 Thread Per Gustav Ousdal
(Sorry Paul, I like your posting a lot (and I am really more "on your side"), so no offense, but) "mht" *might* have covered these cases by saying "if the network architecture was done correctly ..". Probably far fetched, but this term *could* include ActiveX Java disabeled on all

Web statistics ?

1999-11-16 Thread Tally
I have a very busy web server for a client and it is well protected by a firewall etc. However we find that some of the internet statisticians have been able to guage the number of hits that the web server is getting each day. The statisticians contacted us as they were curiuos to get more info