Robert, to comment on the first half of your posting at least (the maths
of cryptography is still something I haven't explored)...
On Sun, Jan 06, 2002 at 06:30:16PM -0500, [EMAIL PROTECTED] wrote:
Last summer my PC was attacked by a malicious hacker who used a Trojan
Horse NetBus. My Norton
In the case of NetBus, at some point someone actually had to install
the trojan on your computer. This is easier than you might imagine. Is
your computer *always* under lock and key when not in use? Do you
*never* run software downloaded from anywhere except official sources,
and then only
Robert Betts wrote: I learned after he
gave me a research paper to read, because there was a computer technician there
working on his PC to help him reinstall his backed up files.
How do you know this technician isnt the
hacker in question? Which underscores the next point
Stilgherrian
That's strange. My first guess would be the CBAC. I would enable the
logging facility:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgc
r/fsecur_c/ftrafwl/scfcbac.htm#64990 (wrapped) provides info.
That will give you an idea of whether CBAC is blocking something.
Henry
Hey folks, I havent posted here in quite a while, but have run into something that
someone probably knows off the top
After months of begging and pleading with numerous ISP's and Mass email marketers
(read: SPAMMERS), to be removed from their spam lists (of course to no avail). We have
On 07/01/02 07:31 -0800, Network Operations wrote:
After months of begging and pleading with numerous ISP's and Mass email
marketers (read: SPAMMERS), to be removed from their spam lists (of course
to no avail). We have succumbed to filtering SMTP from the following
netblocks:
Fix the line
I am studying the modeling and specifications of network
security. Is there a good forum for the title?Can anyonepoint me?
Itisappreciated for your help.
That would be enough to convince me to look at the source IPs and seriously
consider black - holing them .. no commercial gain in that annoyance.
/ev/
On Sat, Dec 29, 2001 at 01:46:38PM -0800, [EMAIL PROTECTED] wrote:
even though the company's marketing has and is solely focused on the US
Thanks to Henry Sieff
Adding more to the above problem yesterday we solved the problem but
temporarily. As we remove ip inspect name 'name' smtp things have started
moving smoothly. But our situation forces us to implement smtp monitoring.
How to go about it..
Prathabacimman.M (call me