When I came in this morning, I noticed a log full of these. The source port
ranged from 1237 to 1534. The source IP address traces back to a dialup
account so I am assuming someone was doing some sort of hack attempt. I am
wondering what this was for, and what could have been gained by
Network Computing recently published an article listing differences between types and
brands of firewalls. You may consider visiting
http://www.networkcomputing.com/1023/1023f1.html to see their review.
Thanks,
-Dave
--
From: [EMAIL PROTECTED][SMTP:[EMAIL PROTECTED]]
Sent:
At 11:40 01.12.99 +0800, Zheng Bokui wrote:
Dear gurus,
Is Darren Reed's IPFILTER a good tool comparing with commerical firewalls
like
Checkpoint FIREWALL-1 or CISCO PIX?
Of course commerical ones provide more features. What I'm most concerned is
security: Can I build a secure firewall with
Hi all
How do I do NAT with ipchains. I have ipchains and ipmasqadm (for
portforwarding )
working already. I know that port forwarding on the firewall can be done to
a particular machine. Now how do I configure the firewall (address b) to say
that any request for address c
should actually go to
Can anyone point me in the right direction...
I need information in regard to the use and configuration of TCP Wrappers.
We are evaluating the security of several linux and unix based firewalls and
I dont know much about them and would like to understand their use better.
Any help is
Currently we have SMTP service only allowed between our exchange server and
the ISP mail server. This firewall rule is working fine and we have had no
security incidents with this arrangement. Due to the usual political masters
which are this company they wish to enable POP3 service on our
I've been given a project to integrate our RADIUS authentication
database with our NIS setup. This strikes me as either a bad
idea or an unworkable one.
It's quite workable, if
I need to stick to either PAP or CHAP,
not something like tokens or Kerberos, etc.
Tokens are not mutally
I know that this bad security practice to allow the POP3
service to come in,
but I need additional internet white papers, concrete evidence, best
practices info on why we should not allow this.
Anything wrong with running POP if you have an SSL wrapper
in place for the transmission of
(for those interested in intrusion detection)
ICSA.net invites you to attend our free web broadcast, "An Overview of
Intrusion Detection Technologies" to air on Thursday December 9th at 2pm
EST.
This one-hour seminar will give an overview of Intrusion Detection and
Vulnerability Assessment
Hi all,
I've started looking at adaptive firewalls and while I get the basic idea I'd
be interested in hearing opinions on some questions I have:
* What is the state of this technology at the moment? Looking around the web,
I've seen a few commercial offerings but little mention in mailing
10 matches
Mail list logo