Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: aciscorouter; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.01 seconds.

  1. Replies
    21
    Views
    10,102

    Where did the .zip file go? Anyone know where I...

    Where did the .zip file go? Anyone know where I can find this? Haven't seen the attachment since the site was updated a year ago...
  2. Replies
    8
    Views
    1,091

    Where did he tutorial go?

    Since the site was updated last year I can no longer find the tutorial...
  3. Replies
    24
    Views
    1,330

    What is the current sustained backplane bandwidth...

    What is the current sustained backplane bandwidth on your existing layer2 device? One advantage of the layer3 switch approach is the ability to VLAN and route traffic on the same backplane while...
  4. Replies
    21
    Views
    18,235

    Superscan!...

    Superscan! http://www.foundstone.com/resources/freetooldownload.htm?file=superscan4.zip
  5. We have layer 2, 802.1x encapsulating MS-CHAPv2...

    We have layer 2, 802.1x encapsulating MS-CHAPv2 in a Protected EAP session (PEAP) to a Microsoft IAS (RADIUS) server which in turn provides Active Directory challenge response to both user and...
  6. Replies
    4
    Views
    1,127

    Consider the following: * Servers - OS, Web, DB...

    Consider the following:
    * Servers - OS, Web, DB hardening / bastioning / latest patches
    * Firewall rules and DMZ location (Web server should not be on the same segment as the SQL server if the Web...
  7. Replies
    5
    Views
    780

    The problem with most content is that you need to...

    The problem with most content is that you need to download it to view it. If you share it as PPS or PPT the users still have to download locally to view it. Even if you were to go as far as to use...
  8. Replies
    14
    Views
    2,082

    In terms of security, there are a number of...

    In terms of security, there are a number of vulnerabilities that exist for both OOP languages. What sort of audience will be viewing your site? A lot of corporate security policies turn both Java...
  9. Replies
    25
    Views
    5,260

    Many governments secretly sanction the use of...

    Many governments secretly sanction the use of antiforensics and countersurveillance and have been in the state of developing tools, standards and protocols for some time, it's not something you hear...
  10. Replies
    14
    Views
    1,645

    As alleyCat suggested earlier: Portscanning...

    As alleyCat suggested earlier:

    Portscanning
    From Wikipedia , the free encyclopedia
    Jump to: navigation, search
    A Port Scan is one of the most popular reconnaissance techniques attackers use to...
  11. Replies
    25
    Views
    2,845

    I personally love the fact I can go anywhere in...

    I personally love the fact I can go anywhere in my Vibe with my laptop and pringle can and find Internet access! I'm at the park with my kid and can check my email, I go on vacation and we can check...
  12. Replies
    14
    Views
    1,645

    I defo stand corrected on this one. I have...

    I defo stand corrected on this one. I have misused the meaning in the past and have recently read that very article on Port Knocking that you referred me to, but obviously hadn't digested it. ...
  13. Replies
    14
    Views
    1,645

    Reconnaissance is the first thing that an...

    Reconnaissance is the first thing that an attacker will do to find a juicey target. Port scans (aka port knocking) is only one form of recon (war-dialing is another example) and it serves the...
  14. Replies
    32
    Views
    2,547

    He might have been running Cain & Abel to crack...

    He might have been running Cain & Abel to crack IE's MRU hashes, He may have been running a plugin on the browser that remembers passwords (without prompting the user), possibly the keylogger or else...
  15. MadAxe, may I suggest you build yourself a Linux...

    MadAxe, may I suggest you build yourself a Linux gateway and implement IPtables? There are tons of resources and HOWTO's out there that will help you understand the basics. Then there are a...
  16. Replies
    6
    Views
    4,219

    Here's the command syntax for resolving netbios names:

    CMD> nbtstat -a xxx.xxx.xxx.xxx <-- X being the IP address

    If you are using Linux there is a cool Linux NBTSTAT client created by BindView who was just aquired by Symantec (but the tool is still...
  17. Replies
    15
    Views
    2,545

    Hey I agree with the other suggestions. Go to...

    Hey I agree with the other suggestions. Go to SANS reading room, do some social engineering but the real work is getting your corporate echelons to agree and ratify standards. We were tasked with...
  18. Replies
    10
    Views
    1,720

    PIX hardening guide...

    And no firewall administrator is complete without a hardening guide foucussed on the PIX and some methodology behind firewall administration - Get the Guide Here :D
  19. Totally agree with that. Unless you are a...

    Totally agree with that. Unless you are a government agency or have conversations with users on your LAN about the Caramilk secret, encrypting the data is overkill. MAC filtering will not allow...
  20. Thread: HACK inn

    by aciscorouter
    Replies
    58
    Views
    2,977

    Hey there, I posted a tutorial/guideline last...

    Hey there, I posted a tutorial/guideline last year for hardening the configuration of a Cisco router - My Tutorial

    Hope this helps...

    Gary
  21. Replies
    3
    Views
    1,799

    Linux SecAdmin - Look Who's Knocking

    Linux SecAdmin - Look Who's Knocking
    Written By Gary Freeman - a.k.a. Aciscorouter
    Tuesday February 7 2006 @ 17:35

    DISCLAIMER: This is a tutorial of sorts that takes you through a day-to-day...
  22. Replies
    8
    Views
    1,091

    Wow, thanks phernandez... I didn't think to look...

    Wow, thanks phernandez... I didn't think to look at the spotlight articles until today and came across the link to Enterprise IT Planet's review. This is great :D

    Cheers,
  23. Replies
    12
    Views
    2,624

    Nice one mate! I have finished the investigation...

    Nice one mate! I have finished the investigation already and I'm looking for a way to justify my numbers but I know the average website visit is between 6 and 12 GET requests per page (did a dirty...
  24. Replies
    12
    Views
    2,624

    :D Damn skippy! I agree 100%. HR are such...

    :D Damn skippy! I agree 100%. HR are such techno-phobes that everything is taken literally and they see 100 alerts as 100 visits to a website. Try explaining anything to them and their eyes glaze...
  25. Replies
    12
    Views
    2,624

    No, we have ISA implemented for our call centers...

    No, we have ISA implemented for our call centers but in the main data center the users can access the Internet without any caching or proxying. We tried caching and sending the data to a log...
Results 1 to 25 of 35
Page 1 of 2 1 2

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides