confirm subscribe to security-basics@securityfocus.com

2005-10-28 Thread security-basics-help
Hi! This is the ezmlm program. I'm managing the security-basics@securityfocus.com mailing list. I'm working for my owner, who can be reached at [EMAIL PROTECTED] To confirm that you would like archive@mail-archive.com added to the security-basics mailing list, please send an empt

Ipc$ share hack

2003-07-14 Thread security
We have a server that has been hacked. The hackers have put a tool that turns of the IPC$ share. We checked the registry nothing there. It seems to be time based but nothing comes up on the scheduler. When we reboot for a while everyone can connect to the server but in a minutes the ipc$ share dis

Proxy Server

2003-07-08 Thread NETWORK/SECURITY ENG. - GHAZANFER
Hello! I am looking for a good and secure Windows based Proxy Server other than ISA Server with features like QoS, firewall, DHCP support, Integrated with AD etc. Regards, --- Evaluating SSL VPNs' Consider NEOTERIS, chosen a

RE: Secure Media Destruction

2003-07-07 Thread security
Degauss the tape or burn it. Jeff. -Original Message- From: Birl [mailto:[EMAIL PROTECTED] Sent: Monday, July 07, 2003 11:29 AM To: [EMAIL PROTECTED] Subject: RE: Secure Media Destruction seaton: Date: Fri, 4 Jul 2003 08:01:38 +0800 seaton: From: Stephen Eaton <[EMAIL PROTECTED]> seat

Data erasing tool

2003-07-03 Thread security
We are looking for a tool that will erase all data beyond recovery from a hard drive. We going to get rid of few computers and do not want data to get into anyone's hand. Both freeware and commercial ware are ok. Would prefer a solution which is bootable from a cd (OS independent). (Would prefer n

Re: What is this port? is it a trojan?

2003-07-02 Thread Security
On Mon, 2003-06-30 at 10:52, Hyperion wrote: > Hello all :) > > I have been taking a more detailed interest in my pc's security of late, > and security for computers in general, and I am learning at quite a fast > rate, although there is a great, great deal of information

Hack?

2003-06-30 Thread Linux Security <[EMAIL PROTECTED]>
Hello all, My redhat 7.2 is getting hacked very frequently even i got a firewall.appended bellow is the nmap output. What may be the loophole? % nmap -sA 202.xxx.xxx.xxx Initiating ACK Scan against isp.com () The ACK Scan took 275 seconds to scan 1542 ports. Interesting ports on

RE: Simple Wireless Question

2003-06-27 Thread security
Checkpoint a good white paper on where put it. It is obviously for their product but you can use the paper as a knowledge base. -SKP -Original Message- From: Potter, Tim [mailto:[EMAIL PROTECTED] Sent: Thursday, June 26, 2003 1:50 PM To: [EMAIL PROTECTED] Subject: Simple Wireless Questi

RE: Firewall configuration statistics

2003-06-26 Thread security
e don't talk about their firewalls. 2-) It is, for the most part, illegal to run security tests on a network that is not yours. Be careful what you write about... you don't want to end up saying something silly like... "IDS is useless". On Fri, 2003-06-06 at 12:29, [EMAIL PROTE

Must read for everyone

2003-06-24 Thread security
http://www.bayarea.com/mld/siliconvalley/business/special_packages/security/ 6151122.htm SKP --- Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts! The Gartner Group just put Neoteris in the t

RE: Firewall configuration statistics

2003-06-24 Thread security
iness experience of people reading this thread. My question was clearly a marketing question regarding industry statistics. IT is quiet stupid for people to say that statistics don't matter. Almost all security projects are sold because someone read a statistic or does not want to become one.

RE: Center Control and Department's Firewall

2003-06-23 Thread security
I would no access besides logs. Have them create a ticket anytime they need a change. -SKP -Original Message- From: khan rohail [mailto:[EMAIL PROTECTED] Sent: Friday, June 20, 2003 12:45 PM To: [EMAIL PROTECTED] Subject: Center Control and Department's Firewall Hello We are in proc

RE: Firewall configuration statistics

2003-06-23 Thread security
n into one of opinion not fact. So folks, > as SKP gets more and more frustrated, and stops using the list for > serious business, maybe it has become time for us to get back to > business. Just my .005 worth. > > Greg Kane > SAIC > Senior Systems Security Engineer > CTS

RE: MS Service Packs

2003-06-21 Thread Shawn K. Hall (RA/Security)
diagnostics use MBSA ( http://www.microsoft.com/technet/security/tools/Tools/MBSAhome.asp ), which enables you to scan your system for *most* known flaws. Hit windows update every Thursday afternoon, as that is when 99% of the patches are released. Regards, Shawn K. Hall http://ReliableAnswers.com

RE: Firewall configuration statistics

2003-06-20 Thread security
more frustrated, and stops using the list for serious business, maybe it has become time for us to get back to business. Just my .005 worth. Greg Kane SAIC Senior Systems Security Engineer CTSF-IA Fort Hood, TX -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Sent

RE: Hard Drive Encrypting

2003-06-19 Thread security
Do you mean something more than what comes built in? The EFS? Jeff -Original Message- From: Martin Smith [mailto:[EMAIL PROTECTED] Sent: Wednesday, June 18, 2003 3:01 PM To: [EMAIL PROTECTED] Subject: Hard Drive Encrypting Good Day, I have a need to encrypt the har

RE: password protection in office XP documents

2003-06-18 Thread security
; if Word is used to protect certain parts of a document than it should not be possible to use Word to unprotect that document just by saving in a different format. A PDF is a good example. Once you set security on the PDF document all PDF readers honor that security they don't let you save it

RE: password protection in office XP documents

2003-06-18 Thread security
of the file. Using a Word doc as an example, I would take the Word doc, highlight everything, copy and paste it into a new Word doc and save it over the original "protected" document. It would be a heck of a lot faster than the methods that have been described. Brian -- Brian Eckman

RE: Scanner Software Question

2003-06-17 Thread security
How do vigilante software rate among scanning products? -SKP -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Sent: Tuesday, June 17, 2003 12:16 AM To: [EMAIL PROTECTED] Subject: Re: Scanner Software Question Importance: High Retina is great. Whenever you run it,

password protection in office XP documents

2003-06-13 Thread security
protection is gone. No need to know the password. Microsoft evens documents this in their help file. Should this not be considered a security violation from a user point of view SKP --- Evaluating SSL VPNs' Con

RE: Firewall configuration statistics

2003-06-09 Thread security
That makes absolutely no sense. Plus I am not looking for a philosophical answer. I was looking statistics for marketing. Does anyone know of a good reference site for firewall and other security statistics. SKP -Original Message- From: Justin Pryzby [mailto:[EMAIL PROTECTED] Sent

Firewall configuration statistics

2003-06-06 Thread security
I remember once reading that X amount of firewall's are misconfigured. Does anyone know where I can get this statistic from? We are making some new marketing material and I would like to include this stat in it. A quotable source would be great. Thanks SKP ---

Security training Teaching material

2003-05-31 Thread security
I have been looking for the source of security training teaching material. I was looking for teaching material in all fields of security including forensics, basic security, CISSP readiness etc. A point in the right direction will be very helpful. SKP ---

Re: Patch Amounts

2003-03-20 Thread security
The Hebrew University of Jerusalem maintain a very usable list of Microsoft hotfixes and service packs. http://secinfo.huji.ac.il/microsoft_patches.htm If you want the information direct "from the horses mouth", then go to the Microsoft Security site. You can pick your base OS or a

Re: Getting the message to Testers

2003-03-05 Thread security
that could get you into legal trouble) should be stored encrypted within the database. In addition to this, security features built into the database should be used and default accounts disabled. Oracle comes with up to thirty (30) default usernames and passwords, some of them with dba privelages

Re: Download Managers

2003-02-27 Thread Leo Security
about download managers- do they pose are security risk? Any known to be trojaned? The one I use is GetRight, does anyone know if this one has known security issues? Any thoughts appreciated, thanks. Leon

Re: Suggestions Needed

2003-02-26 Thread Leo Security
Go to sourceforge.net and search for Firewall floppy. You will get lots of already stripped down versions. You can run these firewalls from a floppy and also from a hard drive if you want to enable logging. Leo Justyn wrote: I'm a home user rather new to firewalls. I have a spare pc I want to u

Securing a webserver through reverse proxy?

2003-02-19 Thread Security
Greetings, I've read about a way to secure webservers, which must not be directly exposed to the Internet, using a reverse proxy, e.g. MS ISA Server or Squid on a UNIX box. Now my question would be: Has anyone experience with that? Is it really more secure (compared to firewalling and port forwar

DMZ and VPN

2003-02-18 Thread Security Manager
I've been following the thread on FTP servers in the DMZ with interest. I'm curious as to how it applies to a server providing VPN access using Win2k Server's Routing and Remote Access. Given that the VPN is supposed to give access to the private network to external clients (who can authenticat

RE: Read Only Ethernet Cable

2003-02-13 Thread security
It seems this may be able to be done. Do a search for "Ethernet AUI Sniffer". What that amounts to is disabling the transmit portion of an AUI port. Sounds like you'll need a transceiver to convert from ethernet to aui though. Good luck. Jeff. -Original Message- From: Rory [mailto:[EMA

Re: Suggestions on free XP hard drive wiping utilities?

2003-02-12 Thread Leo Security
e a drive to a machine that's going to be donated or thrown away? Preferably something thorough? Thank You Steve Champion Sr. Data Security Analyst The Methodist Hospital. [EMAIL PROTECTED]

Re: nmap os detection!

2003-02-10 Thread Leo Security
It is generally not good to change the OS parameters. If its detectable, let it be. Best thing to do is to unplug all the holes on regular basis and configure your firewall to work at its optimum. Leo Ethan wrote: There was just a thread about this on the honeypot mailling list ([EMAIL PROTECT

Re: linux version

2003-01-23 Thread Leo Security
IMHO SuSE is the best. As regards security, thats something you will have to take care of yourself. All OSes are a bit insecure out of the box. SuSE is easy to install and configure. They have a configuration tool called YAST2 which is excellent. Its the most popular Linux distro in Europe

RE: ghostly mail ports

2003-01-10 Thread Security Newsletters-TM
nuary 7, 2003 7:45 PM To: [EMAIL PROTECTED] Subject: ghostly mail ports Hi, im new to security and this is my first post, so be gentle :) I have a fairly good understanding of the tcp/ip model and i think i understand what ports are for! but i cant understand that on my box, i have the 2 default

Login Banner

2002-12-30 Thread stray+security-basics
ituations but not others: 4. 4) This computer network belongs to the Grommie Corporation and may be used only by Grommie Corporation employees and only for work-related purposes. The Grommie Corporation reserves the right to monitor use of this network to ensure network security and to respond to

RE: Can't Resolve from behind firewall

2002-10-17 Thread Security Newsletters-TM
Are you Natting? If not you may have to open up the return UDP reply. -Original Message- From: Ahmed.Shazly [mailto:ahmed.shazly@;hotpop.com] Sent: October 16, 2002 8:15 PM To: [EMAIL PROTECTED] Subject: Can't Resolve from behind firewall Hi everyone, I Just got a PIX 501 for my compa

Re: Web Mail Vulnerabilities

2002-10-17 Thread Leo Security
In my opinion you can consider providing the option of secure / encrypted access to the mail through the web. regards Leo Link, Jennifer wrote: We are looking at provided mail access via internet connection (home, internet cafe, library etc.) and I'm trying to research what vulnerabilities ex

RE: Foundstone - keeping free tools from the public

2002-10-15 Thread security
catchier...) in order to appeal to their clients and score brownie points with their large government customer base who promote keeping the public in the dark. I'm going to have to write angry emails to all the Foundstone employees I know now... Regards, Greg van der Gaast Ordina Publi

RE: Somebody saw this trojan ?

2002-10-11 Thread Shawn K. Hall (RA/Security)
> And I'd say to visit Windows Update weekly, if not > daily. MS usually only posts updates on Thursday evenings - if updating is a hassle for you - or checking every day is not an option, I'd stick with Thursdays. Regards, Shawn K. Hall http://ReliableAnswers.com/Virus/

RE: Foundstone - keeping free tools from the public

2002-10-11 Thread security
Have you read the TRO? Foundstone is stopping use of their algorithm. I think they a right to do that. Netobjects is free to release a product with their own algorithm. -Sanjay -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] Sent: Thursday, October 10, 2002 11:45 A

RE: password cracking

2002-09-26 Thread Security
NT breaks its passwords into two - encrypting each half separately. Unfortunately, this makes it really easy to hack NT passwords, even if you think you are using a good one. -Original Message- From: netsec novice [mailto:[EMAIL PROTECTED]] Sent: Wednesday, September 25, 2002 5:13 PM To:

RE: BIG MAMA !!

2002-09-24 Thread Security Newsletters-TM
gt;BIG MAMA or BIG MAMMA > >Its a 60MEG text file! > >I CANNOT FIND IT ANYWHERE!!! PLEASE HELP!! > >If you have this file, PLEASE point me in the right direction >to download/retrieve it!! > >Thank you! >Kenny Ansel, Sytex Group >Network Security Instructor >

RE: File server getting DoSd by forged packets???

2002-09-20 Thread NT Security
that nothing, not even Veritas, was running at the time of this incident. Running a major backup during peak network usage is a sure formula for killing the file server! -Original Message- From: NT Security Sent: Wed 9/18/2002 8:59 PM To: [EMAIL

RE: Checkpoing NG on Linux or Windows?

2002-09-20 Thread Security Newsletters-TM
ised managed for the hardware, wherease CP fw mgmt is for the rulesets... -Original Message- From: Guerra, Ralph [mailto:[EMAIL PROTECTED]] Sent: September 19, 2002 2:05 PM To: 'Security Newsletters-TM'; 'Michael Bulebush'; [EMAIL PROTECTED] Subject: RE: Checkpoin

RE: Checkpoing NG on Linux or Windows?

2002-09-20 Thread Security Newsletters-TM
BTW: just wanted to point out that my Corporation does have full and current licenses for the number of devices we use NHM with :) Sorry, no blackmail or today. -P> -Original Message- From: Security Newsletters-TM Sent: September 19, 2002 2:12 PM To: 'Guerra, Ralph&#x

RE: Checkpoing NG on Linux or Windows?

2002-09-19 Thread Security Newsletters-TM
NOKIA is king. We run nothing but Nokia here. The hardware is robust, and we use VRRP between two units for redundancy. Can be expensive though ... -Patrick Best Wireless Data Network Specialist IP Engineering Telus Mobility (416) 684-3579 [EMAIL PROTECTED] -Original Message- Fro

RE: NMAP scan

2002-09-19 Thread Security Newsletters-TM
7;s going on port 21 during this (or just before, obviously)? That might shed some light on it. Greg van der Gaast Ordina Public West Security Services -Oorspronkelijk bericht- Van: Mel [mailto:[EMAIL PROTECTED]] Verzonden: Monday, September 16, 2002 12:43 PM Aan: [EMAIL PROTECTED] Onder

RE: Defense plan

2002-09-19 Thread Kenneth W. Kubiak, Information Security Officer
Chris, That's a very nice list indeed! I too am saving it for reference. My company also had no information security program to speak of when I started here last year, so we're both pretty much in similar situations. One area I didn't see you mention too much, although you d

File server getting DoSd by forged packets???

2002-09-19 Thread NT Security
Sorry for the length but this is a real problem to me! I've spent a lot of time reading this forum but only recently, due to budget cuts, been forced into a security position. And now I'm having a BIG problem! One of my networks (NOT Knightworld.net!) has a file server that is oc

RE: Strange situation with outlook

2002-05-17 Thread security
Doe you use pop or have a Exchange server? (does the best answer get a free cruise? :-) ) -Sanjay -Original Message- From: John D from Best Price Cruises [mailto:[EMAIL PROTECTED]] Sent: Wednesday, May 15, 2002 3:03 PM To: Security-Basics Mailing List Subject: Strange situation with

Re: Slackware or Redhat?

2002-05-16 Thread Security
> I've read differing opinions about the ease of use of Slackware - what > are your personal opinions? Is Slackware more secure 'out of the box'? > From what I gather Slackware is a little harder to learn than Redhat, > but a little more... configurable? Am I right? I have no problems with >

RE: Too much security?

2002-05-16 Thread security
] Subject: Too much security? Not sure if this is the right forum but here goes... I seem to have "too much security" when trying to set up a VPN between two offices. The setup: Remote user running Windows XP (or 2000, or 98, etc.) setting up a VPN to connect to a remote office. Corpor

Re: IMAP Secure ???

2002-05-12 Thread Security
found Becky2 for Win32 and Ximian Evolution for UNIX to suit most of my needs. Of course, for the command line freaks, I must also mention 'mutt', which can be compiled with Cyrus-SASL, too. - Jonas -- Security <[EMAIL PROTECTED]>

RE: Mail server

2002-05-12 Thread security
the LAN. The mail server inside the LAN will only talk to the mail server in the DMZ on port 25 only. If people need access to mail from outside the office than they should be restricted to a VPN solution only. Even for a web based solution. Most web based solutions have too many security issues

Downloading SamSpade

2002-05-10 Thread security
I wanted to download SamSpade from their website. Their website is down since last several days. Does anyone have any idea of any other place I can get it. Moreover please recommend any similar tools. I want to trace someone using proxy servers and would like to check the logs of proxy

Tracing someoen using proxies

2002-04-29 Thread security
How can one trace someone using proxy servers? Is there any tools available for windows as well as *nix platforms? Thanks

Re: IP AND NAT

2002-04-24 Thread Security
> Allowing any port (SSH included) go through the firewall\gateway to the > internal network is quite a back door , SSH is not immuned , and as we > seen not so long ago had a its share of security holes, I would suggenst , > if you need remote control over a computer , stick a

RE: IP AND NAT

2002-04-23 Thread security
Use product from fwbuilder.org nice gui to help you do Nat and port forwarding. Sanjay -Original Message- From: Giri Sandeep [mailto:[EMAIL PROTECTED]] Sent: Monday, April 22, 2002 12:08 PM To: Muhammad Faisal Rauf Danka Cc: snaqi; [EMAIL PROTECTED] Subject: Re: IP AND NAT Well, For

RE: IP AND NAT

2002-04-22 Thread Security Team
Glenn -- Glenn Schoonover, MCSE Director of Security and Internal Systems [EMAIL PROTECTED] http://www.inter.net 12120 Sunset Hills Road Inter.Net Suite 410Office : (703) 456-3917 R

Re: Zonealarm log - what is this?

2002-04-19 Thread Security
> I meant really in the background... I know that something's running if it's > in the system tray... ;) > > Can they run beyond the reach of ctrl-alt-del and the taskbar? If so, is > there some way of detecting this (and any other programs) that may be > lurking? Yes, its very well possible, bu

Re: nimda fun in linux/win2k network

2002-04-19 Thread Security
> The desktops are cleared and protected now, but the file server space keeps getting >chewed up by copies of the worm. Also, having an uncontained worm on the file >servers is no good for my sleeping habits. How the heck can I get Nimda off my >fileserver? Try something like ServerProtect f

Re: Searching Documentation

2002-04-18 Thread Security
> I'm reading more papers about "how generate exploits", but where I can find > good information about buffer overflow, smashing the stack, etc. I just recently found a good example, which is actually going into the details; http://www.radsoft.net/security/mudge.html Yo

What Programmming Language?

2002-04-11 Thread security
What programming language/s is/are used for developing a software firewall like ZoneAlarm or NIDS like Snort or Scanners like netcat, nmap etc.? Thanks

Re: OpenBSD 3.0 PF firewall: nics and videoconferencing

2002-04-11 Thread Security
> Try turning the MTU down to something like 1394 or similar. > This made a big difference on my home setup, running over a cable modem, > YMMV. Actually, the current recommendation of an MTU which should work in any case is a nice number: 1414 -- Security <[EMAIL PROTECTED]>

Re: Linux box as firewall

2002-04-08 Thread Security
on a open source UNIX or ignorant about ipf at all, please take a look at: http://www.obfuscation.org/ipf/ipf-howto.txt or the HTML version: http://www.obfuscation.org/ipf/ipf-howto.html IMO, talking about security and Linux in one breath seems to be a common issue on this list anyway. I suggest

Re: md5sum download

2002-03-28 Thread Security
Hi : The textutils package resembles the GNU text file (actually, file contents) processing utilities. Most of these programs have significant advantages over their Unix counterparts, such as greater speed, additional options, and fewer arbitrary limits. The programs that can be built with this p

RE: someone stole my mail account to spam others :-(

2002-03-19 Thread Security-news
Have you check for viruses? // Patric -Original Message- From: Netsult [mailto:[EMAIL PROTECTED]] Sent: den 17 mars 2002 07:00 To: Dean Fox; [EMAIL PROTECTED] Subject: RE: someone stole my mail account to spam others :-( It sounds like your email server is open to relay since someone

Re: Restricting cmd.exe access

2002-03-16 Thread VCC Security Admin
This is a fat32 format, there is no security tab. "J

Re: Restricting cmd.exe access

2002-03-16 Thread VCC Security Admin
With regards to the below, how do you restrict access to administrator only? "John R

RE: Political Challenges Using Nessus

2002-03-14 Thread Security Team
Did you say your boss was a moron about security... ;-)? First, be careful. Unfortunately it could be construed as illegal activity without a "get out of jail" note from your boss, your boss's boss or someone of authority in your company. Another possible approach might be to

Re: IDS

2002-03-14 Thread Security
Hello Pavel I refer to the mail from 'leon' which refers to the following link[1] which describes how you can sniff in a switched environment. Actually, the techniques described in there are not The Right Way[tm] to sniff out your switched environment, if you have access to your switch configura

Re: Any comments on using SNORT

2002-03-13 Thread Enphourell Security
While we're talking about snort, I have two questions. Is it better to give snort it's own machine, seeing that it will be in charge of about 15 machines, and I am looking at either Demarc or ACID. Any comments anyone? Thanks On Mon, 11 Mar 2002 13:18:39 -0500 "Mike Carney" <[EMAIL PROTECTED

RE: Antw: scary site

2002-03-11 Thread Security - MYNETFUTURES
Why would this be? REgular users can execute cmd.exe? -Original Message- From: Milan Goellner [mailto:[EMAIL PROTECTED]] Sent: Wednesday, March 06, 2002 11:34 PM To: [EMAIL PROTECTED] Subject: Antw: scary site This only works when being logged in as, at least, local Admin on 2k

URLScan

2002-03-09 Thread CHM Security
I am running Citrix nfuse on a IIS 5 server and attempted to install the urlscan.exe from M$. I have very limited knowledge on web servers and everytime I install the urlscan it kills the ability of clients to download the citrix web client (ica32t.exe) file. Like I said I have very limited

Re: IDS that retaliates.

2002-03-09 Thread InterceptiX Security
as they > act. > > What good does retaliation really get you though (apart from a whole > load of legal headache)? Wouldn't "recovery" be a better goal to aim > for? > > Mark. > -- > Mark CrosbieIDS/9000 Product Architect > http://www.hp

Re: detecting wireless access points

2002-03-07 Thread Security
here is the potential for > MiM attacks to your encrypted VPN traffic). > > - -- > Jon Erickson Cryptologist and Security Designer Caspian > 415.974.7081 D49B 4561 1078 0A72 DDF3 7250 8EF4 4681 587E 41DD 1728748 > > > -Original Message- > &g

Re: Internet Explorer 5.x/6

2002-03-06 Thread Security
You can do extactly this with the IEAK but if you ever had to use this thing to manage a site it really sucks. You could take away the url tool bar as well, and make a script that will launch IE. and only allow through policy that script to run. There are many options. - Original M

Re: A new book that I have found

2002-03-05 Thread Daniel F. Chief Security Engineer -
t; to this subject, as I am, or just want a good read, I would highly > recommend it. > > ISBN: 0-385-49531-5 > Doubleday Publishing -- Chief Security Engineer | Daniel Fairchild [EMAIL PROTECTED] Unix is like a wigwam -- no Gates, no Windows, and an Apache inside.

Further on Problem with ZoneAlarm

2002-03-04 Thread security
I have found the following information from arin.net about 4.0.0.0. This is regarding my earlier post on problem with zonealarm GENUITY (NET-GNTY-4-0) 3 Van de Graaff Dr. Burlington, MA 01803 US Netname: GNTY-4-0 Netblock: 4.0.0.0 - 4.255.255.255 Maintainer: GN

Problem With ZoneAlarm

2002-03-04 Thread security
I am using ZoneAlarm version 2.6.362. Now yesterday I updated my MSN messenger from 4.5 to version 4.6. After that whenever I connect through my ISP, I get the following message upon connection: "The firewall has blocked routed traffic from 4.0.0.0 (UDP Port 1028) to 4.0.0.0 (UDP Port

Re: detecting wireless access points

2002-02-26 Thread Security
r than the obvious, buy a laptop with a wireless card and search theory. Is there a network tool that would detect a wireless access point being plugged in? > > As a security administrator, I would like to have the ability to know if a user has purchased an access point and plugged it into m

Re: DHCP Server solutions

2002-02-25 Thread Security
Assign reservations IP to the MAC address's through your DHCP client on what ever OS you are running.. Donot assign any IP's to any not hardcoded address's. It is alot of work to do manualy but if you build a script it should not be that hard. If you are using Windows NT/2000/.NET D

Re: command execution on router

2002-02-21 Thread Daniel F. Chief Security Engineer -
all i get is a menu with 10 options. I can > choose any of them & they do the normal stuff like port forwarding, etc. > > Is their a way to get the prompt on the router. I mean what i may wanna try > is to maybe install a sniffer or something like that on the router. In > other wo

Re: port 1214 on win2K

2002-02-19 Thread Daniel F. Chief Security Engineer -
thanks for your help > > > > Ermelir -- Chief Security Engineer | Daniel Fairchild [EMAIL PROTECTED] Unix is like a wigwam -- no Gates, no Windows, and an Apache inside.

Software Firewall Development

2002-02-12 Thread security
I am new in security but experienced in software development. I am thinking of developing a software firewall for desktops. I want it to work like ZoneAlarm. Do you think C and C++ will be the best languages to develop this software as well as the techniques of socket programming

Re: firewalls

2002-01-28 Thread Enphourell Security
:47 +0100 DocValde <[EMAIL PROTECTED]> wrote: > Hallo Enphourell Security, > am Samstag, 26. Januar 2002 um 10:27:50 schrieben Sie: > > ES> Which OS do you guys think would make the best firewall, OpenBSD or Linux? > > What a question! My first thought was "The

firewalls

2002-01-26 Thread Enphourell Security
Which OS do you guys think would make the best firewall, OpenBSD or Linux?

RE: Vulnerability analysis tools

2002-01-25 Thread Aaron C. Newman (Application Security, Inc.)
ven more serious attacks exist in the external procedure server, listener, and database instance. >From the database perspective, you can download a free evaluation of AppDetective for Oracle from www.oraclesecurity.net. It does pen testing and va against an Oracle database. Takes both an inside-ou

Re: seeking a better understanding

2002-01-22 Thread Enphourell Security
not in the > right conference / newsgroup. If this is so, please let me know. Otherwise, > the two following questions would scoot me along to understanding what I > need about basic security. Thanks. > > 1. Given port 80 (and only port 80) is open to the outside world, if someone &

ms-sql service scanning

2002-01-17 Thread Security
I was contacted by a company stating my sql server was probing their network. the log files are as follows log record count for source ip 10.10.10.2 10.10.10.2: 255 (this is the ip address of my sql server) log record count for destination ip log record count for destination nets 172.21.0.0 :

Re: relaying in exchange 2000

2001-12-04 Thread Enphourell Security
> A few options: > 1) Citrix server - my guess is you don't want to set this up or pay for > it, and you don't have the time. I'll skip it. > > 2) OWA - Outlook web access. This requires a proxy (works best with MS > Proxy or ISA,) and a web server (IIS is built f

Re: Encrypted POP3 Access?

2001-12-02 Thread Enphourell Security
ll be encrypted from the get go and we will live in a happier world... heh -- -- Enphourell Security [EMAIL PROTECTED] www.enphourell.com --- Content of this electro

Re: Unix Environments and Malicious Code

2001-11-29 Thread Enphourell Security
do not offer server or desktop products for the > Unix-based OSes. > > Thanks, > > Rich Richenberg > Technical Security Manager > Peregrine Systems, Inc. > > 3611 Valley Centre Drive > San Diego, California 92130 > (858) 350-5792 > fax (858) 481- 1751 > www.p

Re: W2k Blues

2001-11-08 Thread CHM Security
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/ tools/stkintro.asp Links exist for both a new and existing installation. - Original Message - From: "Walter Wart" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Thursday, November 01

Re: W2k where to start??

2001-10-25 Thread CHM Security
New Install http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/ tools/w2knew.asp Existing Install http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/ tools/w2knew.asp You might also want to check out cert.org and securityfocus.com as they both

Penetration testing

2001-10-22 Thread Security
, Intranet and Internet. I’m unsure if anyone has developed this kind of document before, but if anyone has anything that they feel may help, please pass it on. Can anyone help? Thanks _ CSIRT.WS (Computer Security Incident Response Team

Hotmail policy

2001-09-26 Thread Security
_ CSIRT.WS (Computer Security Incident Response Team - World Site)