In a message dated: Sun, 17 Feb 2002 13:15:29 EST
"Kenneth E. Lussier" said:

>>   2. use nessus or something like that to then  scan the live
>>            IP addresses for open ports.
>
>DON'Y USE NESSUS!!

So what exactly are you trying to say here?

> Nessus is for security auditing and vulnerability
>assessment. Use nmap. Nmap is command-line friendly, faster, and is
>more targeted to the job at hand. Nessus is extreme over-kill. Not to
>mention the fact that it might just take down your router, or any
>Windows boxen that get in it's way ;-)

Can you explain a little more about the differences between nessus 
and nmap. (I actually meant nmap above, but couldn't think of the 
name, and nessus is all that came to mind :)
 
>You could also do a comparison of response times to estimate relative
>physical position of the system in relation to the system the program
>is running on. This, of course, would be highly unreliable, but it
>could be done.

Ahm, yeah, and a lot more mathematically challenging than anyone 
would *really* be interested in tackling, I'd bet :)

>This requires the router/gateway to be running snmp. Given the recent
>talk of the evils of snmp, this could be a problem.

Yeah, right, sure.  And no one out there is running Exchange/Outlook 
anymore because of all the recent discussion of why *that* 
combination is evil :)


*****************************************************************
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*****************************************************************

Reply via email to