On Wed, 20 Feb 2002, Victor Usjanov wrote:
> I agree with you, but we use NIS domain and NFS for mounting of user home
> areas .. So that i why i am running NFS- to get my home area when i log on
> other computers over here.
Do you have the resources to put the users who are mounting NFS home
pa
Someone on campus called me yesterday inquiring about how to stop relaying
through sendmail. He thought he had configured his sendmail.cf to not
allow relaying, but then got notified he was relaying mail. Today after
some searching he found some information about FormMail.pl where it can be
use
Hi All
I am doing a project on Deception Toolkits.
Can you point to some mailing list dedicated to the same.
When I mail [EMAIL PROTECTED] having sign-up as the subject and/or body. It fails
to be delivered.
Thanks
Aman
The newest beta of bastille supports redhat 7.2; I think it is available at
sourceforge.
Fred
-Original Message-
From: leon [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, February 19, 2002 6:56 PM
To: [EMAIL PROTECTED]
Subject: hardening script for redhat 7.2?
-BEGIN PGP SIGNED MESSAGE--
interesting, i used bastille on a 7.2 box and it worked fine for me!!
Michael Weiner, Linux+, Linux+ SME
Senior Systems Administrator, WebOps
AmericanGreetings.com
-Original Message-
From: leon
To: [EMAIL PROTECTED]
Sent: 2/19/02 6:55 PM
Subject: hardening script for redhat 7.2?
-B
The situation you describe could be stage setting for
possible business fraud. The longer you wait to report
the situation the greater the liability to your company.
You might try the Internet Fraud Complaint Center.
http://www1.ifccfbi.gov/index.asp
Good luck!
"Bejon Parsinia" <[EM
Hello All,
Thank you in advance for those who reply.
We are currently looking at a way to protect the download of our products on an ftp
server. What we need to accomplish is:
Use an FTP server
Password protect the directories
Handoff a Web user from our website and log them into the proper d
Hello All,
I was wondering the other day as to how one could go about detecting a
sniffer on the network. If it is a Shared Ethernet, I wouldn't even
try... but on a Switched Ethernet, I feel there still is a chance.
Specifically,
1. What would be the best method to see if someone is c
Hi all,
I'm looking for product suggestions of DHCP servers that require authentication from
the client before handing out an ip address. It must also be able to use MAC address
registration, and I would like to see if there is a way to only allow clients that
have been assigned IPs from the
the 7.2 script is still in beta, but it is working solidly
and it is probably the most mature and complete hardening
script out there, even in it's beta state.
you can download it from:
http://sourceforge.net/project/showfiles.php?group_id=403&release_id=75042
hth,
cliff
leon wrote:
> -BE
I use TopSecret by Clicklight software (www.clicklight.com) Although this
does not work on Unix I am able to synchronize it with my palm, which
basically never leaves my side. I believe it only uses Blowfish encryption.
Jason
-Original Message-
From: Matt Hemingway [mailto:[EMAIL PROTE
[EMAIL PROTECTED] writes:
>Thanks to everyone who responded.
>Disclaimer: I have yet to try them out.
>
>Most people pointed at fwsum, hosted at
>http://fwlogsum.sourceforge.net/ and *another* fwlogsum hosted at
>http://www.ginini.com.au/software/fwlogsum/
>
>Another couple of tools are availabl
I am looking for some kind of checklist that covers the operation of PCs (more than
1000)that use smartcards + PINS + fingerprints for authentication. I am thinking of
questions like how to deal with issues like somebody forgetting his smartcard at home.
Does anybody on this list know a resourc
Drew,
I'm going to assume you're not behind any sort of firewall on your side..
Verizon's TOS say that users are allowed to run services, however they
block inbound port 80 on their routers. You cannot run a web server. (Some
may be able to, based on different account types, or possibly even
mi
Novell product called Account management 2.1
http://www.novell.com/products/edirectory/accountmanagement/
This gives total security control of NT/W2K/Solaris/Linux etc. via Novell
NDS, which already gives you forced password change after xx days.
Stavros
A cheap back-up tool (may not be what you want) is a little freeware app (Wintel only)
from Karen Kenworthy:
http://www.karenware.com/powertools/ptreplicator.asp
May not be what you want, but could be handy for others on the list.
> -Original Message-
> From: Domingos Costa [mailto:[EM
Check out East Stroudsburg University -- I've read in the local papers that
they were offering a 4 year degree in this. It just started, and haven't
heard anything about it.
You can learn more here:
http://www.esu.edu/cpsc/security/csecwebpage.htm
--Brad
__
"A h
I haven't worked too much on it lately, because the last Freshmeat tally I saw for
downloads was 250 something. No one has sent any comments on it, so I stopped working
on it. If I hear more comments on it, I'll start back on it again.
Just an aside for all those on the list who use open sour
Hi you all,
I would like to know how to lock morpheus access to users in my network.
Is it enough to lock the in/out for the port 1214? (I think it's not)
Thank you
José Rayo
Hello Dave
You can configure one of the ports of your router to send a copy of all the
traffic that it receives on that port to another port, where you connect a
PC with a packet sniffer. Depending on your speed you would like eather to
analyse packets on the fly or to save them for later analyse
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Raymond:
If you are going to use a software firewall, personally I feel you
should invest in zonealarm or at least use some other third party
solution like zonealarm or tiny. To me, A) anything by MS is subject
to scrutiny and B) anything that dis
I would like to attend a class on Ethical Hacking, Hacker Techniques and
Exploits to gain a better understanding of what we need to prepare for as an
Incident Response Team. I am looking at the SANS class that is offered, but
it seems like they study old exploits and old tools in this class. I'v
On Wednesday 20 February 2002 06:08 am, TD - Sales International Holland B.V.
wrote:
> Oh I forgot to mention, one more thing I'm worrying about. I believe it's
> not possible to track the state of UDP connections, and since I run a
> caching DNS there will be some UDP traffic and I'm afraid my c
Hey all
one option would be to enable ratings in IE on the client machines.
You then enter the list of approved sites in the 'Approved Sites' list, then password
protect the options in the 'general' tab.
Your mileage may vary, but it's a start on the way to what you want. restricted sites
won'
On Tuesday 19 February 2002 02:00 pm, Drew Hallward wrote:
> Sorry If I doubled Posted, this list is much more
> accurate to my needs though. TIA
>
> I am running mandrake 8 (2.4.8) and am having a
> tough time accessing port 80 from a machine
> outside my LAN. The machine the webserver is on
> i
Password Corral:
http://www.cygnusproductions.com/freeware/pc.asp
Completely free to all users in US & Canada- Site licensing available if you
need support.
>From the site:
Password Corral uses the 128-bit Diamond2 Block Cipher to encrypt all the
information you store in the program, keeping it s
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
The NSA will actually pay for some or all of your higher education if
you stick with computer security. The catch is you have to go to one
of the approved schools. The only one I remember from the list was
ISU. Then you are required to work for t
Violet... (and the rest of the Security-Basics readers)
I spoke with a manager over at NetSol and they gave me a suggestion. So
long as you don't need to make frequent changes to your DNS information
regarding where your site is residing, you can set up a locked down
registration with NetSol. B
Most broadband ISP's will filter incoming port 80 access, which (I think)
explains your problem. Most also offer a premium package where they'll give
you more bandwidth and unfilter it, but for more money.
DoPo
Bruce,
I remember reading somewhere in the Hacking Exposed series of books that they
gave a partial list of the more common hacking EXEs. I don't think they claimed
in any way that it was an exhuastive list.
And I agree. Its a true shame the people liek Professor Woo have not real clue
as to
Hey Bejon
If you figure this out, let me know as I have MAJOR issues with NetSucks
(sol) who let this kind of pilfering go on! It has happened to me too.
/Violet Weed
Director
Roo Networks
Scotts Valley, CA
- Original Message -
From: "Bejon Parsinia" <[EMAIL PROTECTED]>
To: "Security-Basi
Use a program called Active Ports that you can get at download.com
It tells you which program uses which port.
hope this help
Mathieu
-Original Message-
From: Calhoun, Heath [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, February 06, 2002 10:01 AM
To: [EMAIL PROTECTED]
Subject: ArcServIT
This may not apply, but on cisco you can set ACL's and have it logg them
which in effect logs the packet info.
On Tuesday 19 February 2002 04:18 pm, Mat Pearsons wrote:
> Kartik,
>
> You can get to the "command prompt" (kinda unix shell) with option number
> 24 and then 8 (i think). I haven't
I believe the information ProfesseurWoo is attempting to find is a list of
names of the executables commonly associated with various hacking tools.
While executable names can be changed often times they are not changed. If
he has a tool to do automated queries of his enterprise/environment for
Drew Hallward wrote:
>
> Sorry If I doubled Posted, this list is much more
> accurate to my needs though. TIA
>
> I am running mandrake 8 (2.4.8) and am having a
> tough time accessing port 80 from a machine
> outside my LAN. The machine the webserver is on
> is the firewall and has a direc
I am using a Sonic GX250 and having problems with FTP dropping packets.
When the Firewall is removed, zero errors and 2x faster FTP. Any input
anyone.
Thanks,
Stef
>
Anyone know of any vulnerabilities / performance issues with iChat Rooms version 5.0.3
on Solaris?
I have to install it on my network and want to make sure I know what I'm up against.
TIA,
William J. Kintz, SCNA, CCNA
Director of Internet Services & Network Security
Academy for Educational
during my OS scan project found at www.mrcorp.net, I found the xp firewall so far to
be a good solution for home users. The only thing that I have noticed is that file
sharing and netbios can become problematic if the firewall is turned on in default.
However, the firewall is configurable and
I am trying to set up Cisco VPN client 3.5a behind a Winproxy 4.0h. I
am able to authenticate, however I can reach anywhere on the LAN. I
looked in Winproxy support site and they have a document how to fix it.
However, that solution did not work for me. Does anybody have any
idea/suggestion how
Hello,
I am using both filtering software and Firewall (GNat Box) to try to
block out the use of several chat programs. On the FW I have blocked
ports:
4000 - ICQ
1863 - MSN Messenger
5050 - AOL and
5190 for Yahoo
After having set up the blocking rule, I then tested MSN Messenger in
the
I am contemplating to remove/disable finger or port 79 from some
workstations and/or servers. Is there any negative impact for doing it?
Any advice is much appreciated.
Thanks,
41 matches
Mail list logo