Fabiola, Sergio . . .

Creo que  les puede servir . . . es una pagina web que testea los puertos
abiertos y si es posible algun ataque en vuestros host.

https://grc.com/x/ne.dll?bh0bkyd2

Saludos Cordiales.

Matias E. Siri
Div. Post-Venta
Gerencia de Ingenieria
[EMAIL PROTECTED]

REYCOM an ETEK Company
Bernardo de Irigoyen 678
(1072) Buenos Aires, Argentina
Tel. (54) (11) 4345-2544
Fax. (54) (11) 4345-2944
http://www.reycom.com.ar




                                                                                       
                           
                    "Fabiola Mayorca"                                                  
                           
                    <[EMAIL PROTECTED]>                        Para:   "Sergio Munoz 
-- Ingeniero de Sistemas    
                    Enviado por:                                (x.219)" 
<[EMAIL PROTECTED]>,                     
                    [EMAIL PROTECTED]        
<[EMAIL PROTECTED]>        
                    kpoint.com                                  cc:                    
                           
                                                                Asunto:      [FW1] Re: 
                           
                                                                                       
                           
                    06/11/00 11.34                                                     
                           
                                                                                       
                           
                                                                                       
                           




Puedes utilizar un 'software de auditor�a'. Dentro de esta gama de
herramientas busca lo que se llaman scanners de red. Hay varios,
licenciados
y freeware. Entre los licenciados te recomiendo el Internet Scanner de ISS
(Internet Security Systems) o el NetSonar de Cisco. Entre los freeware, el
m�s popular es el Satan pero la verdad es que nunca lo he utilizado.
Las licencias se venden por n�mero de hosts que deseas scanear. Lo que
hacen
esto programas es detectar puertos abiertos del sistema y otras
vulnerabilidades en funci�n de patrones de ataques.
Sobre lo de Stonebeat, nunca he entrado a una lista de este software.
Saludos

Fabiola Mayorca

-----------------------------------------------------
Fabiola Daniela Mayorca Arellano
CCSE  & CCSA CheckPoint Certified Security Engineer / Administrator
Sistemas de Informaci�n
Telef�nica Sistemas, sucursal Per�.  Los Sauces 374 Piso 10/11
Edificio La Torre Roja.  San Isidro - Lima 27
Email: [EMAIL PROTECTED]  Phone: (511) 211-9500 ext. 386
http://www.ts.com.pe/

----- Original Message -----
From: Sergio Munoz -- Ingeniero de Sistemas (x.219) <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Monday, November 06, 2000 9:02 AM




Hi all...
I need support with two questions please :

1. How do you probe your firewall. Is there a software
   which attack a firewall machine ??
2. Is there a Stonebeat/FW-1 HA mailinglist, I've problems
   with that.

Thanks for all.

-----
Sergio Mu�oz Godoy
Ingeniero de Sistemas
mailto:[EMAIL PROTECTED]
Cientec Computacion S.A.      Tel. (56-2) 426 2626
http://www.cientec.cl         Fax  (56-2) 233 9009
Santiago, CHILE





============================================================================

====
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
============================================================================

====



================================================================================

     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================







================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to