Then NFR is the only ticket (unless you watn to use REALLY high-end RS
probes).
The main advantages to NFR are it's speed and adaptability. A
disadvantage may be it's adaptability. =) You will need someone on staff
with some programming skills to build the custom scripts you may want to
add
Right, but bind has an option "query-source", with which you can tune named
for your needs.
[EMAIL PROTECTED] wrote:
> "Vesselin" == Vesselin Mladenov [EMAIL PROTECTED]>
writes:
Vesselin> Hi,
Vesselin> TCP is for zone transfers (master->slave), while UDP is used
for DNS queries
Vesselin> and
Hello,
has anyone a suggestion how I can handle remote diagnostic access to
servers in our LAN. My first thought was to put the server which need
remote diagnostic access in the DMZ. But in this case I have to put all
my servers in the DMZ sooner or later. The remote diagnostic user
shouldn't
Well, to control traffic on your network you would use either a firewall
or network segmentation. You can setup authentication through the
firewall and in that rule allow access to only certain machines (i.e.
Allow 10.0.0/24 to access 192.168.1.32/29 provided the user authenticates
to the
It has about the same credibility as the current MCSE certification. It is
not very difficult to pass ergo passing the exam gives very little
indication of one's ability...one could say: could one say a false sense of
security
Sorry, but I just HAD to.
Info follows below:
Hi, Folks,
Any knows how to secure a pcAnywhere environment?
Thanks in advance!
Sean Gao
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]
In a response to Saso [EMAIL PROTECTED], Carric Dooley [EMAIL PROTECTED]
wrote:
The main advantages to NFR are it's speed and adaptability. A
disadvantage may be it's adaptability. =) You will need someone on staff
with some programming skills to build the custom scripts you may want to
add
1. Strong user authentication. (I still prefer personal hand-held
authentication tokens, sans smartcards and readers.)
2. Ssh or a VPN.
3. Access controls that isolate, as one or several groups, the servers which
need remote diagnostic access, thru Authentication Agents on those servers.
From:Peter.Kunz [SMTP:[EMAIL PROTECTED]]
Sent:Tuesday, June 22, 1999 4:46 AM
Folks,
with all the C2 security discussion, does anyone know of an OS that is C2
certified WITH the network? Or would one have to go to B1 or B2 to get
that?
Oh, and anyone have a good
2) download by telnet or TFTP (BTW, support of SSH is coming real soon
now)
Can you give us more detail or direct us to any specifics? Have long
thought that Cisco should have a secure means of logging in...
Subject: Login via AUX in Cisco
Anybody knows, How change the #
suid is dangerous but:
change onwnership of the file to root then do a:
chmod 4755 [filename]
THis causes the process to run as root:
4000 = suid
2000 = sgid
1000 = sticky bit
What was that IP again? ;)
Carric Dooley
COM2:Interactive Media
http://www.com2usa.com
On Tue, 6 Jul 1999,
Good luck ...
Actually, I understand that pcANYWHERE 9.0 is supposed to contain some
central management features. I haven't checked this out yet, but it sounds
like they're at least attempting to address some security concerns. My
assumption is that you'll have some kind of centralized control
Hi
Taking advantage of the discution about the right way to
connect to a cisco router and send an access list. I need to build a
program in C to connect to one and send an access list.
Does anybody knows a way to connect to a cisco router trough
a C program and send commands to
So much thanks to everybody!
Bye, again!
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]
Hi again!
Are there transparent proxies?
Is only theory?
"I talk in anytime about it with a lawyer specialist in Informatic
Crime".
TIA.
/javier
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]
Hello,
Are there transparent proxies?
They do indeed exist in the real world. A popular implementation
is the SQUID proxy in conjunction with a cisco ACL re-direct (hence
the "transparent" part).
for info on squid, see http://squid.nlanr.net/Squid/
The May 1999 issue of Sys Admin magazine
The short answer: no.
The long answer: no, no, a thousand times no.
Starsiege Tribes often uses port 28001/tcp for game connection, and the
standard IRC port 6667 for chat (it's actually using IRC protocol).
Meridan59 uses a single tcp port, but I forgot which one, and who cares
anymore?
17 matches
Mail list logo