It's not rumor...the NSA administers the program, but it is for the
Department of Defense. The Government will pay for the last two years of
your undergrad, or two years of your master's. The catch is that you have
to work as an intern in the job "they" select, while in college, and then
work an
-BEGIN PGP SIGNED MESSAGE-
PGP (go to www.pgpi.org) has a wipe feature. The Windows version will wipe files and
free space as well.
You can also go to google and search for "secure delete".
thx
- --phil
- --
phil park
system administrator
[EMAIL PROTECTED]
208.885.5562 (phone)
208.885.
When a win98 machine is running, the date of it's last boot is the date of
the swapfile win386.swp which exists in the root path (I mean C:\ by
default).
If you mean the preceding boots, you can find the last 5 boots in the
windows\sysbckup folder. There you can find 5 files : rb00?.cab ( ?= 1, 2,
You might want to start with either NIST (http://csrc.nist.gov/) or take a
look at the Open Source Security Testing Methodology Manual
(http://www.ideahamster.org/projects.htm).
Terry Dunlap
- Original Message -
From: "A B" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Thursday, Febr
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
We use a program called GWSCAN that comes on Gateway restore disks. You
can download it from
http://www.gateway.com/support/drivers/search.asp?strSearch=gwscan&searchType=all
I just put it on a bootable floppy and run it from there.
- --Greg
On
www.nsa.gov/programs/employ/index.html
> Is this rumor only, or do you have some links to go with this?
I would recommend the "Security and Encryption FAQ Revision 16.1" by Dr.
WhoThis is a recent revision and is quite good. A keeper. It is a good
introduction to *applied* encryption focusing on tools, etc. You can find it
all over the web, but here's a URL where the latest revision can be fou
checkout Autoclave (http://staff.washington.edu/jdlarios/autoclave/) it runs
on a bootable floppy and wipes the entire hdd.
> Does anyone have recommendations for freeware or shareware that effectively
> erases disks for unclassified but sensitive information? This would be used
> for all machi
On Thu, Feb 21, 2002 at 07:17:00PM -0600, David Andersson wrote:
> Tim,
>
> Is this rumor only, or do you have some links to go with this?
>
> Dave A
http://www.nsa.gov/programs/employ/cep.html
You have to be majoring in Computer Science, or Electrical Engineering.
Maintain a 3.0 GPA, and the
Hi,
I think you mean the book written by 'Robert L. Ziegler'.
Its published by 'New Riders'
ISBN number 0-7357-0900-9
I think it's a good book. I really enjoyed it and learned a lot from it.
Regards
Richard
- Original Message -
From: "Javier Quinteros" <[EMAIL PROTECTED]>
To: "Chad" <[
Hi,
You were right about the rb00?.cab files.
However, there are some strange dates for each of them, as follows:
28/11/2026 10:36 rb001.cab
29/11/2026 22:07 rb002.cab
30/11/2026 12:12 rb003.cab
02/12/2026 09:49 rb004.cab
24/02/2002 12:12
two way will work I think
1. open task manager and look at the time running for system idle process.
2 under system tools there is something along the lines of system
information. some where in there it should have a up time for the box.
just do the math and you should get a time
- Orig
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 21 Feb 2002 at 17:30, Sadler, Connie J wrote:
From: "Sadler, Connie J" <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject:Unclassified Disk "Sanitizers"
Date sent: Thu, 21 Feb 2002
My users want me to to give them POP3 access via
the firewall. We have an Exchange Server runnig with
a Checkpoint Firewall. Are there any security issues
that I need to watch out
Im not positive on this, but I think to send files a connection is
established between the two computers (which is why it won't work if both
ends are firewalled.) If you wanted to prevent file transfers, it might be
possible if you only allowed AIM connections from the chat server. I don't
know if
Hello,
I think you'd better make standalone server to reduce overhead.
Ben
On Fri, Feb 22, 2002 at 12:09:58AM, Gilberto Dallan wrote:
> First off, sorry for my newbie question.
>
> Which is a good (may be best?) and complete
> configuration of Xinetd for Apache and Postfix in a
> linux box l
Hello, Connie,
I have been doing a lot of this lately on Windows for just the purpose you are
decribing. I highly recommend WipeFree. It is, of course, a DOS program that
sanitizes the disk allowing you to select number of wipes, etc.
You can find it at:
http://www.uwe-sieber.de/util_e.html
It i
Some access points use dhcp to grab an address. They can then be
identified - sort of - by the mac address being in a range issued to a
vendor of wireless NICs.
Given a MAC, however, there is no easy way to figure out if it's an AP.
While the list of oui's is available from the IEEE, a correspon
On Thu, 21 Feb 2002, Mike Carney stated:
> Setting your browser to high disables this from happening but I figured I'd share
>this link to a Hungarian web site. I believe that the site has notified Microsoft of
>this problem.
>
> http://www.kurt.hu/iebug.htm
>
> I checked all the browsers in m
Hi,
> I am running Mandrake Linux 8.1, and I am trying to stop X from listening
> 0n port 6000.
Start your X server with the parameter "-nolisten tcp".
On Mandrake 8.1 you can edit the file /etc/X11/xdm/Xservers:
:0 local /usr/X11R6/bin/X -deferglyphs 16 -nolisten tcp
Then restart X and check
Here you go: www.faqs.org/faqs/cryptography-faq/
Google is your friend.
> What sources would you suggest for getting basic info on encryption? (How
> it works, software sources, best practices in business settings, etc.)
/Thomas
--
[EMAIL PROTECTED] | www.northernsecurity.net
PGP: 4315
On Fri 22 Feb 02 03:27, you wrote:
> [EMAIL PROTECTED]
-- ORIGNAL MESSAGE --
Hi all
i've been lurking this gracefull maillinglist for quite some time now, like
any newbie on security, i got a question about md5.
could anyone feed me with a simple example on how to encrypt data
IPCHAINS are getting old, you should try iptables. You can get them from here
http://www.iptables.org/
At 07:42 PM 2/21/2002 +, Chad wrote:
>Can anyone recommend a good resource for
>ipchains, ( Very thorough and low level ) for someone
>who is just learning to use it ? Meaning an
>
It is common knowledge that unencrypted messages sent over an unsecured
Internet connection *can* be viewed in clear text and thus the contents
compromised. My questions:
1. Is it really easy? How readily available are sniffing tools that
can do this?
Any common sniffing tool can allow to d
Connie,
I found no (reasonably priced) utility when I looked at this about 2 years
ago. I was an Air Force contractor at the time and had much the same problem
that you (probably) do.
My solution was to develop a Linux based solution to do this. The advantage of
this was it supports both SCSI
Hi all.
Most of the information on this lists regarding firewalls, sniffers etc seem
to be concerned with LANs, or computers using Ethernet cards.
I want to set up at least some basic IDS and firewall tools on my box at
home, which isn't on any sort of network.
Do the same rules apply to me, us
Hi,
why should I setup ACLs on a screening router for some kind of traffic (e.g. ICMP,
maybe restrict some ports) although the firewall itself filters that traffic? Why
should I setup ACLs on an internal screening router?
Regards,
--egonle
--
___
On Thursday 21 February 2002 09:34 am, Bassam ALHUSSEIN wrote:
> Hello all ...
> Every time I make a dial-up connection to the internet I see an unknown
> (for me) IP address that I am connected on port 80, in the out put of
> "netstat -an" on a win98SE box.
> The thing that I don't understand is
Sure, but there are many 10s and possibly hundreds of different IP
addresses. The only way I was able to successfully block IM is to block
entire blocks of IP addresses owned by AOL. It is overkill but, I have yet
to find anything useful on AOL so I am not missing anything.
Bob
- Original
I can vouch that this is true. I'm currently undergoing "processing" at the
NSA for employment in the area of network security.
The way it was explained to me during my initial processing was that the NSA
will pay for an advanced degree. It wasn't specifically mentioned that you
must attend an ap
On Thursday 21 February 2002 11:24 am, sege wrote:
> Hello Folks:
> I am running Mandrake Linux 8.1, and I am trying to stop X from listening
> 0n port 6000. Any hint on how to do this will be appreciated.
> TIA,
>
> Qv6
start X with the "-nolisten tcp" , if you're starting x manually with startx
[You forgot to quote the original message so I have no idea what's]
[this about. I assume it's about whois tools.]
[EMAIL PROTECTED] wrote:
>
> Bejon,
>
> Saw your post about the pilfering and whois...just as an FYI, I
> used to use a dedicated app on win32 machines but frequently found
> mys
-BEGIN PGP SIGNED MESSAGE-
Hmmm... my school is doing it through the NSF (National Science Foundation). Perhaps
NSA is a typo?
Here are a couple of links:
http://www.cs.uidaho.edu/sfs/
http://www.nsf.gov/od/lpa/news/press/01/pr0145.htm
- --phil
- --
phil park
system administrator
[EM
Hi Again thank you all for answering, but I've got some news
I didn't use fport ( which was a proposition of someone of you ), but I
tried to block this address by ZoneAlarm Pro that is installed and running.
ZApro gave me then an alert every 20 seconds, and said that Microsoft
outlo
If one where to find, say, 44 networks in one night while war driving, and
with net stumbler and windows, is able to jump on those networks using those
networks bandwidth free of charge, is there a way LEGALLY to tell these
people how bad the security is without getting shot. I don't want to g
Assign reservations IP to the MAC address's through your DHCP client on
what ever OS you are running.. Donot assign any IP's to any not hardcoded
address's.
It is alot of work to do manualy but if you build a script it should not
be that hard.
If you are using Windows NT/2000/.NET D
On Thu, 2002-02-21 at 01:09, Stefan Kaysersberg wrote:
> > Hello,
> >
> > Does anybody know about a network backup tool which
> > performs a backup
> > on disk and tape devices? I've already searched for these kind of
> > softwares, such as afbackup, burt, amanda, arkeia, etc. but they wr
The book "Linux Firewalls" (New Riders publishing I
believe) is a decent beginning reference for ipchains.
The new edition focuses on iptables however, so if
by any chance you do get the book, make sure it's the
right one. It contains thoroughly explained step-by-
step details on how to set up a f
Hi,
I have a problem with a Redhat firewall using the Monmothas firewall script.
On my internal network I have several dual boot machines. When booted in to
Redhat they connect through the gateway firewall server as if they have a
direct connection to the internet. When they are booted in to W
I recently moved from sendmail to qmail, and so far I'm amazed at A> The
ease of use of "qmail the easy way 1.51" B> The annoyance of Maildir. My
travels across the internet and to various qmails sites tell of vast
security promises and the like, and the changelogs for qmail show there
isn't
At 07:36 AM 22/02/2002, [EMAIL PROTECTED] wrote:
>Hello,
>
>Does anyone know how to find out when a Windows 98 machine was last
>booted?
>I have access to the machine in cause, which is up and running.
>
>
>many thanks,
>Florentin
Just get the uptime and subtract it from the current time :)
This
Hi Carmelo,
Micromuse has just released "Netcool for Security Management". It is a
customized version of Netcool used to manage security related events from
across an Enterprise. If you are not familiar with Netcool, it is the
leading fault management system used to provide end-to-end network a
All Policies and Procedures should be treated as a
work in progress. Just because you have one does not
mean that you are done. These P&P's need to be
continually reviewed, tested and updated. Security
does not stop once a program is in place.
I work for the US Navy and have learned throughout
I believe that you could just look at the Last Modified date of
autoexec.bat. that would work unless someone actually modified the
file after the last time it was rebooted.
>
> Hello,
>
> Does anyone know how to find out when a Windows 98 machine was last
> booted?
> I have access to the m
What commands would we use on a Cisco 1710 to report the IP address it has received
back to a syslog server? I also need to report the hostname of the device.
Any help would be appreciated.
Best Regards,
Jerry Roy
Systems Engineer
Axcelerant, Inc.
w. 949-221-7208
c. 562-305-9545
>-Orig
I'm in the process of researching a similar solution. I've found netreg a
GNU licensed application.
http://www.southwestern.edu/ITS/netreg/
Haven't had to much time to play with it yet
Regards
Chad
At 03:41 PM 2/20/2002, Michael Bulebush wrote:
>Hi all,
>
>I'm looking for product suggestions o
46 matches
Mail list logo