I have been trying to install linux on my pent 100 for days...i have
many machines and this machine is giving me the following message for any
linux dist i have tried whether redhat , slackware , debian , etc
crc error
--system halt
when the kernel boots up vmlinuz is when i get this
cyclic redundency check (I think). Are you trying to load from CD-ROM or
floppy? Either the hardware you are loading from is bad, the media is bad
(unlikely since it seems you've tried many) or you've got a memory
problem in the system. Could be bad memory, bad cache etcit's probably
On Sun, 2002-02-17 at 21:51, Mansur, Warren wrote:
nmap scans hosts and reports if they are up, and what ports are open.
Just a quick question. Does nmap rely on being able to connect to a
particular website to download the TCP fingerprints, or are they
included with the program when
In a message dated: Sun, 17 Feb 2002 20:33:54 EST
Kenneth E. Lussier said:
Nessus can do nasty things to a system, and to a network as a whole if
it isn't used correctly, wisely, and carefully.
Oh, didn't know that.
Can you explain a little more about the differences
Nessus, on the other
On Sun, 17 Feb 2002, Mansur, Warren wrote:
Just a quick question. Does nmap rely on being able to connect to a
particular website to download the TCP fingerprints, or are they included
with the program when installed?
AFAIK, nmap is completely self-contained, although I haven't looked at
Thanks for the answers to my question.
I guess any question on this forum is sure to promote discussion.
It will take a while to research all the information given.
Thanks again
Jim McGlaughlin
*
To unsubscribe from this list,
On Mon, 18 Feb 2002, Jim McGlaughlin wrote:
I guess any question on this forum is sure to promote discussion.
Likely so. This can generally be considered a Good Thing. :-)
--
Ben Scott [EMAIL PROTECTED]
| The opinions expressed in this message are those of the author and do not |
|
Quoting Mansur, Warren [EMAIL PROTECTED]:
nmap scans hosts and reports if they are up, and what ports are open.
Just a quick question. Does nmap rely on being able to connect to a
particular website to download the TCP fingerprints, or are they
included with the program when installed?
GNHLUGers
I am looking for an information resource that discusses command line utilities and how
to use them to figure out network hierarchy, in the form of parent/child IP addresses.
I am hoping to be able to use these tools from inside a scripting language like Python.
In general I think
In a message dated: Sun, 17 Feb 2002 12:40:09 EST
Jim McGlaughlin said:
I am looking for an information resource that discusses command
line utilities and how to use them to figure out network
hierarchy, in the form of parent/child IP addresses.
[...snip...]
I have found tools that do the
[EMAIL PROTECTED] wrote:
[SNIP...]
The automated tool sets do little to organize the diagram of the
network it auto-discovers other than just show you what's connected
to a specific ethernet segment. They won't show you what's a
server of what, what's a client of what, etc. Usually, the
In a message dated: Sun, 17 Feb 2002 13:15:29 EST
Kenneth E. Lussier said:
2. use nessus or something like that to then scan the live
IP addresses for open ports.
DON'Y USE NESSUS!!
So what exactly are you trying to say here?
Nessus is for security auditing and vulnerability
You may want to check out 'scotty' - TCL based network discovery tool
kit. I believe you'll want the 'tkined' program in that package.
Jim McGlaughlin wrote:
GNHLUGers
I am looking for an information resource that discusses command line utilities and
how to use them to figure out network
On Sun, 17 Feb 2002 [EMAIL PROTECTED] wrote:
Can you explain a little more about the differences between nessus and
nmap.
nmap scans hosts and reports if they are up, and what ports are open.
Nessus scans for vulnerabilities. For example, Does this system crash
when sent an over-size
[EMAIL PROTECTED] wrote:
2. use nessus or something like that to then scan the live
IP addresses for open ports.
DON'Y USE NESSUS!!
So what exactly are you trying to say here?
I'm trying to say that there is a correct tool for every job, and that
just isn't it.
nmap scans hosts and reports if they are up, and what ports are open.
Just a quick question. Does nmap rely on being able to connect to a
particular website to download the TCP fingerprints, or are they
included with the program when installed? For some reason I can't seem
to use nmap when
16 matches
Mail list logo