[Fwd: Re: Firewall-1]

2001-07-11 Thread Volker Tanger
Hi! MNR. E DE BEER schrieb: On 10 Jul 01, at 19:15, Volker Tanger wrote: - Expertize: after you have hacked the firewall admin station it will be very simple to change the access rules. How do you hack into the firewall admin station. Isn't there any programs I could use to

RE: [Fwd: Re: Firewall-1]

2001-07-11 Thread Ong, Jong Han
use an axe, :P -Original Message- From: Volker Tanger [mailto:[EMAIL PROTECTED]] Sent: Wednesday, July 11, 2001 4:03 PM To: [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Subject: [Fwd: Re: Firewall-1] Hi! MNR. E DE BEER schrieb: On 10 Jul 01, at 19:15, Volker Tanger wrote: -

RE: Hackadelicide

2001-07-11 Thread Johnston Mark
Title: RE: Hackadelicide Oh yes I can vouch for that . I've been there, and had some wine of course. -Original Message- From: Henry Sieff [mailto:[EMAIL PROTECTED]] Sent: 11 July 2001 12:26 To: 'Eric N. Valor'; [EMAIL PROTECTED] Subject: RE: Hackadelicide Stellenbosch has

Watch Guard Firebox II

2001-07-11 Thread Lister, Jimmy
Hello Does anyone out there have any hands on experience with the Watch Guard firebox II? If so what do you think of it compared to other options on the market, that you have worked with. I have worked with the Firebox II for about a year, but it is the only firewall I have real world

RE: Hacking FW-1 programs

2001-07-11 Thread \J\
Well, for the determined of spirit, I offer the following advice: A firewall is a difficult thing to get through. First off, most good ones are made of heat-molded concrete with a ludicrously high grain-count, so just the outer layer is going to be hard to get through. See, the challenge is to

RE: Hacking FW-1 programs

2001-07-11 Thread Marx, Jörg
Best article ever read on this list, hehe... Don't feed the trolls ! ;-) cu another J -Original Message- From: J [mailto:[EMAIL PROTECTED]] Sent: Wednesday, July 11, 2001 9:39 AM To: [EMAIL PROTECTED] Subject: RE: Hacking FW-1 programs Well, for the determined of spirit, I

RE: Hacking FW-1 programs

2001-07-11 Thread Eric Johnson
At 03:09 PM 7/10/2001 -0400, Cessna, Michael wrote: Why would you post a request like this when all of us here are the ones maintaining Firewall of various manufacturers and it is our jobs to keep people from circumventing the security policies in place? I would be surprised to find that

RE: Hacking FW-1 programs

2001-07-11 Thread Patrick . Neselrade
Excellent !!! ;-) For once I had fun reading my emails this morning. P ...Les jeux videos n'affectent pas les enfants.Si Pac Man avait eu des effets secondaires sur nous, nous serions tous en train de courir dans une pièce sombre en gobant des cachets tout en écoutant des musiques

Re: Firewall-1

2001-07-11 Thread dgillett
It's pretty clear that local network policy is to provide Internet access only to authorized users. Any hack that lets you bypass this policy is probably both (a) a policy violation itself, and (b) a bug which may be fixed by installation of a newer FW-1 version. Therefore, your

Re: weird checkpoint errors

2001-07-11 Thread dgillett
On 11 Jul 2001, at 9:32, simon chan wrote: Hi list, I have lots of error like the one below, The description for Event ID ( 1 ) in Source ( FW1 ) cannot be found. The local computer may not have the necessary registry information or message DLL files to display messages from a remote

Re: linux firewall performance

2001-07-11 Thread Inaki Agirre
Hi, 2) How can i saturate firewall before clients and servers, by using a minimum number of client/server machines. Apache carries a program 'ab' that gets any page any times. Compile apache in some boxes and run ab -n 10 server.edu/page This is my MSc's thesis. I have two

RE: Hacking FW-1 programs

2001-07-11 Thread Claussen, Ken
Grin Depending on the height of your firewall, assuming the standard 7 foot rack, Wouldn't it be easier to simply throw your Cat 5 cable over the top of the firewall and simply plugin to the ISP router? In this way bypassing those silly university people all tyogether(sp?) grin/ Funny Stuff! Ken

Re: Firewalls digest, Vol 1 #13 - 14 msgs

2001-07-11 Thread Ahmed Shaheer
YES... Thnx Shaheer At 09:13 AM 6/18/2001 -0700, you wrote: Send Firewalls mailing list submissions to [EMAIL PROTECTED] To subscribe or unsubscribe via the World Wide Web, visit http://lists.gnac.net/mailman/listinfo/firewalls or, via email, send a message with subject or

RE: Raptor Mobile Problem

2001-07-11 Thread Bill Royds
There has been some problems with Raptor Mobile and Win2k that Symantec (Axent) has hot fixes for. Check the Symantec web site. Also see the Raptor mailing list archive at http://www.firewtower.com for more information on this. -Original Message- From: Sent: Wednesday, July 11, 2001

Re: weird checkpoint errors

2001-07-11 Thread simon chan
Hi David, Thanks for the info. If I may bold, is there a way to get rid of this error ? Best Rgds, Simon On Wed, 11 Jul 2001 02:59:08 -0700 [EMAIL PROTECTED] wrote: *This message was transferred with a trial version of CommuniGate(tm) Pro* On 11 Jul 2001, at 9:32, simon chan wrote:

RE: Stonegate Firewall ( what do you think? )

2001-07-11 Thread mouss
At 13:29 10/07/01 -0400, Graham, Randy (RAW) wrote: I feel the paying-beta-tester slam is a little out of line, especially when the alternative is a more stable and more mature product. I realize that in the security arena, new typically means not as secure, but I still think this is a bit too

RE: Hacking FW-1 programs

2001-07-11 Thread Cessna, Michael
Title: RE: Hacking FW-1 programs Actually by reading his original posts you can see that he doesn't want to have to log in to the FW1 to get internet access (probably porn surfing). Anyway, the Checkpoint advisory is alarming in that I never though of checking for RDP holes since I've

Re: Hacking FW-1 programs

2001-07-11 Thread mouss
sure, just do as follows: 1-on your machine, type telnet 127.0.0.1 2- at prompts, enter your name and passwd 3- then write a file named hackit.now that contains the following: wanna hack you now sesame, open your hole hmmm, open it now 4- next, type: cat hackit.now |

Cisco Pix 520 w/ 5.3(1)

2001-07-11 Thread no one
Hello Everyone, Has anyone seen this before. I have 2 Cisco Pixes set to be passive failover configuration. Someone outside is sending probles to ports 21,23,8080 at about 10/second. After about 15mins of this the primary pix seems to be failing over... =( Has anyone any experience w/

Cisco Pix 520 w/ 5.3(1)

2001-07-11 Thread no one
Hello Everyone, Has anyone seen this before. I have 2 Cisco Pixes set to be passive failover configuration. Someone outside is sending probles to ports 21,23,8080 at about 10/second. After about 15mins of this the primary pix seems to be failing over... =( Has anyone any experience w/

Cisco Security Advisory: Vulnerabilities in Cisco SN 5420 Storage Routers

2001-07-11 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Cisco Security Advisory: Vulnerabilities in Cisco SN 5420 Storage Routers Revision 1.0 For Public Release 2001 July 11 08:00 (UTC -0800) _

Re: Firewalls digest, Vol 1 #13 - 14 msgs

2001-07-11 Thread Zachary Uram
[VERY LARGE SNIP] Shaheer wrote: YES Shaheer, Please don't cite 26K of text in your reply if you are not responding to all of it. All you basically said here was YES. Regards, Zach [EMAIL PROTECTED] Blessed are those who have not seen and yet have faith. - John 20:29

RE: Hacking FW-1 programs

2001-07-11 Thread Chris Tobkin
Really? The implied rules and what they mean are part of the CheckPoint CCSA (Intro. to FW Mgmt. I) class.. I give special attention to it when I teach the class ever since they shipped previous versions with ICMP and DNS allowed.. It has always been considered Best Practice to turn off the

FYI - Sidewinder List Announcement

2001-07-11 Thread Rama Kant
Sidewinder(tm) Firewall Mailing List Sidewinder Mailing List is created for Sidewinder users to share their experiences in effectively managing the firewall. This list's host will keep it independent of any external influence, although the product vendor is welcome to make product support

RE: Hacking FW-1 programs

2001-07-11 Thread Eric N. Valor
Well, for the determined of spirit, I offer the following advice: Wow. I'm assuming the same advice would hold for your average bank vault. What's the ratio of crisped/shredded bills to passable take? I think we saw this method successfully employed in Die Hard (except I believe they

RE: Hacking FW-1 programs/Die Hard

2001-07-11 Thread mht
Actually, the terrorists waited for the FBI to initiate standard operating procedures for terrorist operations (i.e. turn off power to the building). The turning off of the power dis-engaged the timelock on the corporation's vault allowing the terrorists to gain access to the bearer bonds

RE: Hacking FW-1 programs/Die Hard

2001-07-11 Thread Zachary Uram
yes but all of the terrorist's know-how, manpower, weapons and funding was no match for Bruce Willis. yah right. can't they make at least semi-realistic movies? anyone notice how absurd computer security is portrayed in the movies. usually a mainframe terminal pops up on their MacOS desktop and

Re: Stonegate Firewall ( what do you think? )

2001-07-11 Thread Martin Hoz
Graham, Randy (RAW) wrote: I feel the paying-beta-tester slam is a little out of line, especially when the alternative is a more stable and more mature product. I realize that in the security arena, new typically means not as secure, but I still think this is a bit too much of a slam.

Re: Stonegate Firewall ( what do you think? )

2001-07-11 Thread Martin Hoz
mouss wrote: At 13:29 10/07/01 -0400, Graham, Randy (RAW) wrote: I feel the paying-beta-tester slam is a little out of line, especially when the alternative is a more stable and more mature product. I realize that in the security arena, new typically means not as secure, but I still think

RE: Hacking FW-1 programs/Die Hard

2001-07-11 Thread mht
Ok.. To address the second part of this reply first: As part of the testing of the code, secret messages written in it were distributed in puzzle magazines with the promise of a prize to anyone who could decrypt them. It wasn't actually expected that anyone would be able to do so, as the

The Microsoft-English Dictionary 1.0 (What Microsoft Really Means To Say) from ISN

2001-07-11 Thread mht
http://www.infowarrior.org/articles/2001-04.html ___ Firewalls mailing list [EMAIL PROTECTED] http://lists.gnac.net/mailman/listinfo/firewalls

RE: Stonegate Firewall ( what do you think? ) - beta

2001-07-11 Thread Steven Pierce
Alvin, That is true, I like to tweek with things. It is fun to see how quick that I can break it... S *** REPLY SEPARATOR *** On 7/11/2001 at 20:13 Alvin Oga wrote: On Tue, 10 Jul 2001, Steven Pierce wrote: Randy, Very good point on the beta issue. I agree with you