On Sat, 30 Jun 2001, Ravi Kumar spewed into the ether:
How we can block yahoo mesanger/chat applet, I tried
with port 5050, but did not worked.
How we can block that ?
This subject has been beaten to death.
Set an appropriate AUP, do not allow installation of messengers on
desktops and enfore
- Original Message -
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Monday, July 09, 2001 11:38 PM
Subject: Firewalls digest, Vol 1 #82 - 9 msgs
Send Firewalls mailing list submissions to
[EMAIL PROTECTED]
To subscribe or unsubscribe via the World Wide Web, visit
MEHMET A TOLUAY wrote:
- Original Message -
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Monday, July 09, 2001 11:38 PM
Subject: Firewalls digest, Vol 1 #82 - 9 msgs
Send Firewalls mailing list submissions to
[EMAIL PROTECTED]
To subscribe or unsubscribe via the
- Original Message -
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Tuesday, July 10, 2001 7:32 AM
Subject: Firewalls digest, Vol 1 #83 - 12 msgs
Send Firewalls mailing list submissions to
[EMAIL PROTECTED]
To subscribe or unsubscribe via the World Wide Web, visit
need help
I have to send a username and password via Inetkey to a firewall-1
at our University to get Internet access. Is it possible to hack into
the firewall so that I can get Internet access without sending my
username and password to the firewall?
Hi!
MNR. E DE BEER schrieb:
I need help
I have to send a username and password via Inetkey to a firewall-1
at our University to get Internet access. Is it possible to hack into
the firewall so that I can get Internet access without sending my
username and password to the firewall?
---
Hi all,
I want to produce a tool that measure linux firewall performnce. This is my MSc's
thesis. I have two questions:
1) I want to generate application layer load including HTTP, FTP, Telnet, SMTP.
I don't know how?
2) How can i saturate firewall before clients and servers, by using a minimum
Are there any Hack software that I can use to get access to a
Firewall-1 without using Inetkey (username and password)?
Where can I find this softwhere?
___
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls
Title: RE: Hacking FW-1 programs
Why would you post a request like this when all of us here are the ones maintaining Firewall of various manufacturers and it is our jobs to keep people from circumventing the security policies in place? I would be surprised to find that anyone here who is
DE BEERS- You have some nerve asking this list for ways to circumvent the
security policies we work so hard to develop. Why don't you use your real
name as that would allow us to check out who you are. Remember what list you
are asking for help from...
Richard Golodner
before anyone goes ona righteous jihad, did one ever think this guy may
be a newbie sys admin who was left with a locked down firewall and no
docs by the previous admin? Could happen.
Now, it *is* an interesting question because if there are s'kiddie tools
out there to do such a job, I'd like
Hi folks,
Since this is a firewall mailing list, I thought this would be
the right forum.
I'm looking for people who would be willing to provide me with their
PIX firewall configurations, so I can test the latest Lumeta Firewall
Analyzer (LFA) PIX support code on real-life rule sets.
As a
What is the functionality of VPN in case
of Gauntlet Firewall? Please elaborate.
regards.
Anuradha
~~
Opinions expressed in this e-mail are those of the individual and
Title: RE: Hacking FW-1 programs
It's good that the common types do not understand
many of the ways to evade the security/auditing tools in place.
One of the things in a University/Dormitory
environment is that you do not have complete administrative
control over the workstations on the
Hi Team!
just a quick question regarding Equinet Netpilot Hardware Firewalls - are
there any known vulnerabilities with this hardware?
Does anybody use it? I am trying to decide whether to keep it or set up
another box.
Cheers
___
Firewalls
Title: RE: Hacking FW-1 programs
Sure!
Telnet or SSH to the firewall (you may need to do some VLAN hopping or hack some routers to get there - but of course you knew that), guess the username and password (probably admin,admin) and add yourself to the GUI clients. Run up the GUI and add a
Hi list,
I have lots of error like the one below,
The description for Event ID ( 1 ) in Source ( FW1 ) cannot
be found. The local computer may not have the necessary
registry information or message DLL files to display
messages from a remote computer. The following information
is part of the
On Mon, 9 Jul 2001 [EMAIL PROTECTED] wrote:
The issue, I think, is that the poster DOESN'T have an autonomous
or portable address. So in this latter arrangement, while he can
play all sorts of router tricks about which provider a given outbound
packet gets sent to (shouldn't matter, since
hi ya
On Mon, 9 Jul 2001 [EMAIL PROTECTED] wrote:
The issue, I think, is that the poster DOESN'T have an autonomous
or portable address. So in this latter arrangement, while he can
play all sorts of router tricks about which provider a given outbound
packet gets sent to (shouldn't
Not the first time, seem to remember lots of adverts on the CP mailing list!
- Original Message -
From: [EMAIL PROTECTED]
To: Truman Boyes [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Monday, July 09, 2001 7:05 PM
Subject: Re: Routing between 2 distinct link providers
It's a
Hello!
Just wondering if anyone knows if the Netscreen 5XP appliance works
with autokey IKE VPN when in route mode ? ... In transparent mode the
only way to make VPN connections is with manual keys that ain't the
best way. Would be lovely to use autokey IKE so that the administrator
doesn't
u can use the following in the ulr matching for blocking msn and yahoo chat
gateway.dll
msg.edit.yahoo.com
http.pager.yahoo.com
and use:
acl chat url_regex /usr/local/squid/etc/chat
http_access deny chat
this will surely block these chatting sites
Azher
-Original Message-
From:
I feel the paying-beta-tester slam is a little out of line, especially
when the alternative is a more stable and more mature product. I realize
that in the security arena, new typically means not as secure, but I still
think this is a bit too much of a slam. Unless you have used the product
and
On Tue, 10 Jul 2001, Alvin Oga wrote:
i think this is the norm... but it works ??? because...
a) you have ppp + tcp/ip
b) you either use one or the other...but NOT both at the same time
c) you dont have www.you.com where the folks on internet needs to find
your server on your
On Tue, 10 Jul 2001, Akatosh wrote:
A solution I use at home (dsl + modem backup, two different providers) is
this.
##
|--dsl-##
me-| #internet#work
|--dialup--##
##
I establish a tunnel to work
Stellenbosch has awesome wineries.
Henry Irrelevant Sieff
-Original Message-
From: Eric N. Valor [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, July 10, 2001 5:20 PM
To: [EMAIL PROTECTED]
Subject: Re: Hackadelicide
I wonder if Mr. De Beer would mind if his network administrator
Title: RE: VPN - Gauntlet E-ppliance
In 5.5, and presumably later, you can either terminate IPSec VPNs on the firewall, or pass them through to an internal termination point. Gauntlet doesn't (AFAIK) support any local VPN termination other than IPSec.
I've set it up a couple of times and
hi ya
On Tue, 10 Jul 2001, Wil Cooley wrote:
Thus spake [EMAIL PROTECTED]:
I want to produce a tool that measure linux firewall performnce. This
is my MSc's thesis. I have two questions:
1) I want to generate application layer load including HTTP, FTP,
Telnet, SMTP. I don't know
Randy,
Very good point on the beta issue. I agree with you 100%, I personally enjoy
doing beta testing. It is a good way to learn about a product, and you can get some
good insight on how it will turn out. Also you might get a feature in the finished
product. It helps everyone.
The other
29 matches
Mail list logo