Search:

Type: Posts; User: alanmott; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.02 seconds.

  1. Replies
    2
    Views
    7,250

    Why Phishing Works

    Hi all,

    Found a link to this paper on the SecurityFocus website. Definitely worth a read. In short, it concludes that browser design needs significantly revamping to help users determine when they...
  2. Replies
    4
    Views
    6,215

    Thanks people. The comments posted thus far are...

    Thanks people. The comments posted thus far are things I've already considered. My feeling is that i'll allow the filetypes internally, but block them them externally (e.g. block them from the...
  3. Replies
    4
    Views
    6,215

    Shockwave Vulnerabilities

    Hi all,

    Does anyone know of any security issues with Macromedia Shockwave, both from the persepective of the browser plugin and the contents of the filetype itself? I have a request from our user...
  4. As you are conducting an investigation, you...

    As you are conducting an investigation, you should really image the HDD using a forensics tool like EnCase or Vogon, and analyse the data from the image, not from the original HDD. Otherwise your...
  5. Replies
    25
    Views
    17,220

    Try booting into SAFE mode and deleting the...

    Try booting into SAFE mode and deleting the unwanted exe.
  6. Replies
    12
    Views
    7,449

    Hi, First off, I'd like to express my support...

    Hi,

    First off, I'd like to express my support for your attempt to get "user buy-in" to IT security by educating them. It pays dividends, and I speak from experience. I'll quote you an example. In...
  7. Replies
    49
    Views
    33,115

    Hi all, Just to add to the debate, I'll give...

    Hi all,

    Just to add to the debate, I'll give you my organisations view of this matter. Hopefully it'll fuel the discussion surrounding Negative's comments.

    In our organisation (as I guess in...
  8. Replies
    13
    Views
    9,208

    Hello all, In this particular scenario, I...

    Hello all,

    In this particular scenario, I can't see any added benefit to having the link between CAPTAIN and GRUNT encrypted. Before accessing CAPTAIN, a hacker would first have to have control,...
  9. Replies
    10
    Views
    7,287

    Hi all, These are known as Nigerian 419 Scams....

    Hi all,

    These are known as Nigerian 419 Scams. Nigerian, because they first originated in Nigeria, and 419 because that is the element of the Nigerian penal code that forbids this type of...
  10. Replies
    34
    Views
    17,500

    Tedob1 is right. If you need help from this...

    Tedob1 is right. If you need help from this thread then we need lots more detail on the topology of the network and how it connects to other systems, such as the Internet. But for you, the first...
  11. This seems like a very cunning ploy. As a matter...

    This seems like a very cunning ploy. As a matter of interest, what was the nature of the attachment that was referenced by the CID?
  12. Stopping Kazaa loading at start up for specific users on a 2K box

    Hi all,

    I have a Win2K box at home, with seperate accounts for the three of us living there. However, one user (a teenager...groan!) has downloaded Kazaa.

    I'd like to stop Kazaa loading at...
  13. Replies
    25
    Views
    14,881

    Many thanks for your replies people, they've...

    Many thanks for your replies people, they've helped greatly. However I am concerned that the use of these two accounts is not only badly documented by M$, but the accounts themselves are hidden. The...
  14. Replies
    25
    Views
    14,881

    I have Norton's Security Suite installed for both...

    I have Norton's Security Suite installed for both AV and Firewall.

    My real reason for posting this query is that it appears to be "feature" of XP that I cannot find any reference to on the web,...
  15. Replies
    25
    Views
    14,881

    Hidden Accounts In XP PRO

    Hi all,

    I've just installed Windows XP Professional on my laptop. At the command prompt, if I type in the NET USERS command XP reports the existance of two accounts that are not of my making. They...
  16. Replies
    12
    Views
    9,728

    Following on from the advice above, we too only...

    Following on from the advice above, we too only allow access to the network if employees sign up to our Security Policies document. In the first instance, a username and pasword is not supplied by...
  17. Replies
    1
    Views
    3,695

    Security Boundary in Active Directory

    Hi all,

    I'm interested in the forums views on where the Security Boundary exists in MS Windows Active Directory.

    MS assert that this exists at the Forest level, as this is the only point at...
  18. Replies
    5
    Views
    4,175

    In response to your questions, For a start, Im...

    In response to your questions,

    For a start, Im running NT4.

    I cant set up a trust to the original domain because my test server is not part of our global production network. I'm not in the...
  19. Replies
    5
    Views
    4,175

    Importing SAM to another domain

    Hi all,

    I have a problem investigating an IT security breach in my organisation. I have restored the shared folder area of a file and print server on our network to a test server such that I can...
  20. Replies
    13
    Views
    11,082

    I think we need to be clear about the threat...

    I think we need to be clear about the threat here. The title of the thread is "First Wirelesss Virus".

    This is a misnomer, however. The virus referred to doesn't target wireless networks, it...
  21. Replies
    5
    Views
    10,165

    POST Memory Test

    Hi all,

    Can anyone tell me exactly what happens when a PC's BIOS tests RAM? Does the POST merely identify how much RAM is present, or does it do a read/write test to each memory location in order...
  22. Replies
    5
    Views
    5,085

    Data Hidden In Word Documents

    Hi all,

    As you may all be aware, MS Word stores a lot of hidden information in saved documents that details a number of things about that document. Such information includes paragraph formatting...
  23. Replies
    6
    Views
    7,711

    To answer the original query, HTW files are part...

    To answer the original query, HTW files are part of the Index Server service that comes bundled with IIS. This service allows you to build a search engine on your web site.

    As the SysAdmin of an...
  24. Replies
    15
    Views
    9,711

    I think all bases have been covered by this...

    I think all bases have been covered by this thread, and the articles listed. I would like to add one thing though - and thats why ADSs exist in the first place.

    ADS is supported by NTFS for...
  25. Replies
    10
    Views
    6,927

    I've also heard that OWA is reasonably OK...

    I've also heard that OWA is reasonably OK provided you lock down Exchange and the OS in the usual way.

    Has anyone any experience in using OWA via SSL to give limited privacy protection when...
Results 1 to 25 of 37
Page 1 of 2 1 2