Re: Is It possible to trace a hacker, and on Diffie-Hellman

2002-01-07 Thread Stilgherrian
Robert, to comment on the first half of your posting at least (the maths of cryptography is still something I haven't explored)... On Sun, Jan 06, 2002 at 06:30:16PM -0500, [EMAIL PROTECTED] wrote: Last summer my PC was attacked by a malicious hacker who used a Trojan Horse NetBus. My Norton

Re: Is It possible to trace a hacker, and on Diffie-Hellman

2002-01-07 Thread Ron DuFresne
In the case of NetBus, at some point someone actually had to install the trojan on your computer. This is easier than you might imagine. Is your computer *always* under lock and key when not in use? Do you *never* run software downloaded from anywhere except official sources, and then only

Re: Is It possible to trace a hacker, and on Diffie-Hellman

2002-01-07 Thread Muenzinger, Karl
Robert Betts wrote: I learned after he gave me a research paper to read, because there was a computer technician there working on his PC to help him reinstall his backed up files. How do you know this technician isnt the hacker in question? Which underscores the next point Stilgherrian

RE: Cisco IOS Firewall

2002-01-07 Thread Henry Sieff
That's strange. My first guess would be the CBAC. I would enable the logging facility: http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgc r/fsecur_c/ftrafwl/scfcbac.htm#64990 (wrapped) provides info. That will give you an idea of whether CBAC is blocking something. Henry

Black- Holing Spammer netblocks with PIX 5.3x

2002-01-07 Thread Network Operations
Hey folks, I havent posted here in quite a while, but have run into something that someone probably knows off the top After months of begging and pleading with numerous ISP's and Mass email marketers (read: SPAMMERS), to be removed from their spam lists (of course to no avail). We have

Re: Black- Holing Spammer netblocks with PIX 5.3x

2002-01-07 Thread Devdas Bhagat
On 07/01/02 07:31 -0800, Network Operations wrote: After months of begging and pleading with numerous ISP's and Mass email marketers (read: SPAMMERS), to be removed from their spam lists (of course to no avail). We have succumbed to filtering SMTP from the following netblocks: Fix the line

a off-subject problem

2002-01-07 Thread foxlet
I am studying the modeling and specifications of network security. Is there a good forum for the title?Can anyonepoint me? Itisappreciated for your help.

Re: OT: Massive unexpected web request for info

2002-01-07 Thread Everett F Batey II
That would be enough to convince me to look at the source IPs and seriously consider black - holing them .. no commercial gain in that annoyance. /ev/ On Sat, Dec 29, 2001 at 01:46:38PM -0800, [EMAIL PROTECTED] wrote: even though the company's marketing has and is solely focused on the US

Cisco IOS firewall

2002-01-07 Thread Prathabacimman.M
Thanks to Henry Sieff Adding more to the above problem yesterday we solved the problem but temporarily. As we remove ip inspect name 'name' smtp things have started moving smoothly. But our situation forces us to implement smtp monitoring. How to go about it.. Prathabacimman.M (call me