If your protected servers are on a different NIC than your inside users (eg.
you have 3 NICs, 1 for inside, 1 for outside, and 1 for publicly accessible
hosts) then you can use the Alias command which will redirect packets from
inside addresses to your protected servers using their public
I have responsibilities at a small (approx 2200 user) liberal arts college. We
have been slowly getting the expenditure to do appropriate upgrades to the
network and IT infrastructure, usually the crisis du jour that finally makes it
clear to the administration that, yes, they really do have
I have responsibilities at a small (approx 2200 user) liberal arts college. We
have been slowly getting the expenditure to do appropriate upgrades to the
network and IT infrastructure, usually the crisis du jour that finally makes it
clear to the administration that, yes, they really do have
So...Are you going to need to share ClearCase over the Web? I'm not sure,
but I think they have specific web-based tools that you can add on to
ClearCase. If you made your solution web-based then you wouldn't have to
use Win2k file sharing and logon.
If you do need to provide more just a fancy
Well, just from a glance at what you have here...
Look's like you're running Redhat 6.2 - correct?
21 - FTP - version of WU-FTPD you are running is vulnerable to a remote root
exploit - patch and or upgrade this.
23 - Telnet - rather use SSH if possible. Telnet sends traffic in plaintext.
25
We also have a Cisco network and have expressed frustration to Cisco about
the available alternatives. It is hard to construct Access Lists to deal
with anything but fixed ports. NBAR on the 7200's and the PIX seem to be
the only incursions into application-specific bandwidth management. You
We have at least 3 open reqs for experienced Gauntlet Firewall Admins to
work as consultants. If you are one or know anyone who is, please contact
me with a resume and I'll send it on to the hiring manager.
Positions are located in Brooklyn NY. The company is the Securities
Industry Automation
Please leave this stuff for recruiters and classified ads. I read these
postings for technical help. Thank you very much.
-Original Message-
From: Bill Casti, CQA [mailto:[EMAIL PROTECTED]]
Sent: Monday, September 18, 2000 10:39 AM
To: [EMAIL PROTECTED]
Subject: Re: Gauntlet Firewall
snip addy
We have at least 3 open reqs for experienced Gauntlet Firewall Admins to
work as consultants. If you are one or know anyone who is, please contact
me with a resume and I'll send it on to the hiring manager.
sweet job..damn shame i don't know gauntlet that well...oh well if anyone
Bill,
We have at least 5 open positions for unexperienced mailspammers to work as
network flooders. If you are one or know anything which is, please contact
me with a resume and I'll send it to the trashing manager.
Positions are located all around the wold. The company is the "Most Open
Please! No more beating me up messages for acciddentally violating the
terms of this list. I didn't know that jobs weren't allowed. Yes, I
probably should have, but I didn't. Fortunately, ONE kind soul was good
enough to send me the posting address for the Security Jobs list. I find
it
Hi,
WE are trying to write a firewall for IPv6 using linux (2.2.16). But
the basic support for registering IPv6 firewalls is not present in the
kernel src
code. Can anyone tell me how to go abt. this or are there any patches
available?..
Thanks in Advance,
-Deepak
Project IPv6@BITS.
-
[To
On Tue, Sep 19, 2000 at 01:10:27AM +0530, [EMAIL PROTECTED] wrote:
Hi,
WE are trying to write a firewall for IPv6 using linux (2.2.16). But
the basic support for registering IPv6 firewalls is not present in the
kernel src
code. Can anyone tell me how to go abt. this or are there any
Correct me if I am wrong, but sounds like someone on that "little 98 machine"
is trying to run some sort of network scanner... perhaps getting IP's with
known network vulnerabilities to use some kiddie script later on?
tomas
- From [EMAIL PROTECTED] Mon Sep 18 14:43:54 2000
-
No correction required, the interpretation is mutual.
Rick
[EMAIL PROTECTED]
- Original Message -
From: Tomas Huynh [EMAIL PROTECTED]
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Sent: Monday, September 18, 2000 8:52 PM
Subject: Re: Windows 98 trying to learn about Windows Networks
Sounded more to me like remote control = spy tools. Perhaps BO2K or a
derivative. I don't think one of his own users would be stupid enough to run
a portscanner against an outside network and then complain about the machine
running slow. That is something akin to performing an illegal act and
First guess I would have would be the "networks.exe" virus cant recall what
its actual name is offhand but it spans a process called networks.exe which
scans subnets looking for windows file and print sharing which it then
replicates itself to and starts the whole process over again..
Hope this
Search for network.vbs on the system. We've had a lot of problems with this
little bugger on customer systems. All in does is attempt to replicate via
open shares. It picks a random 24.0.0.0/24 subnet and scans all the hosts
on that subnet. The version we've found doesn't do anything but
I suggest you check that system for NETWORK.VBS trojan
C:\NETWORK.VBS
C:\WINDOWS\NETWORK.VBS
C:\WINDOWS\Start Menu\Programs\Startup\NETWORK.VBS
C:\NETWORK.LOG
Details can be found on the NAI and Symantec A-V sites.
One of our Windows 98 machines ground to a slow pace today. Then we get
an
A packet can not go through NAT twice... i.e. if you use the
domain which resolves to a public IP address it will go through the
router (NAT) and then back to the server (NAT) which will fail... we
had this problem and the solution for us was to set up an internal
DNS server that resolved the
First, sorry for the double post, but I forgot to 'obscure' the trojan
filename and it might get filtered on some mail servers. Also, according to
the customer (and NOT myself), AtGuard, Lockdown 2000 (obviously, for those
who know about these guys), Jammer, and Computer Associates A/V software
Adam Williams [EMAIL PROTECTED] writes:
[...]
You don't need to do this if you use:
# ipchains -A output -i $EXTERNAL_INTERFACE -s $IPADDR -j ACCEPT,
which would allow any packets out of your machine. To allow the
packets coming back from the remote machine port 25, you could do
We handle the situation exactly the same way... it is however useful
if your developers use relative refernces off the web root for images and
pages... that is to say pages should be linked as
\main_page\sales\northwest\images\logo.gif and not
23 matches
Mail list logo