Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: cybermike_dk; Keyword(s):

Search: Search took 0.01 seconds.

  1. Ip adresses as one entire decimale number

    I saw that once, where you could use : 12345678 instead of 0.188.97.78 but i cant remember how to translate from the fully decimale number to the dot-seperated ip adress.

    plz tell me.
  2. I dont think you got the message :=)

    There are 16 ports on the switch

    they are named 1 to 16.

    If i discover a person abusing the network and i know he´s mac adress is 00-54-FC-80-C0-56 then i want to ask the switch, "in which port...
  3. Replies
    3
    Views
    1,041

    !

    hehbris>Im talking nice to you, then i except you to do the same

    IchNiSan> i will check out snort


    But i dont need a filter, i need a program that can "sniff" the network. If i use ip-chains i...
  4. Tracking mac adresses on my fujang-switches

    Hi

    i have a couple of these switches(i have attached the data sheet in a zip file)

    I realy need a way to figure out which mac adresses are assigned with what ports.


    Mike
  5. Replies
    3
    Views
    1,041

    Network flood detection/protection

    I need a program that runs on our router(a linux box) that can watch all our four segments and send out an alert(eg. an email or something like that) if someone starts to flood the network with e.g....
  6. Replies
    14
    Views
    1,596

    Easy

    As far as i know it works in Slackware,mandrake,redhat,debian and suse(might now be sure about that one)

    The fix is easy, edit the /etc/lilo.conf remove the line "prompt" and the "bug" will be...
  7. Thread: A newbie?

    by cybermike_dk
    Replies
    0
    Views
    761

    A newbie?

    What is a newbie?

    A newbie is someone who have something left to learn, and are willing to learn it, are trying to learn it and a person that realize that he wil never be perfekt!
  8. Thread: Firewall

    by cybermike_dk
    Replies
    15
    Views
    1,747

    :)

    i´ll look into it.

    The reason why i picked ipchains is that when i installed my slack on the firewall box, i could choce between iptabels and ipchains,(which ofcourse was different kernels i...
  9. Thread: Firewall

    by cybermike_dk
    Replies
    15
    Views
    1,747

    duh

    nebivedu: You havent been listening have you?
  10. Replies
    3
    Views
    1,024

    More like this

    I haven´t checked all the links yet, but i was thinking of something like this:

    download a file e.g. rsafs.o

    insmod rsafs.o
    mkefs.rsa /dev/hde1

    and then put the following in fstab
    ...
  11. Thread: Firewall

    by cybermike_dk
    Replies
    15
    Views
    1,747

    Re: firewall

    Thats for sure, but i just dont know if there exists a uptables-howto.

    I haven´t got a internet connection at home so i only have the howtos that goes along with slack 8.0
  12. Thread: Ftp

    by cybermike_dk
    Replies
    1
    Views
    1,097

    oups

    should have been an answer to http://www.antionline.com/showthread.php?s=&threadid=114255
  13. Replies
    6
    Views
    1,381

    Oups

    http://www.antionline.com/showthread.php?s=&threadid=114533

    i gotta get used to use this board :)
  14. Thread: Ftp

    by cybermike_dk
    Replies
    1
    Views
    1,097

    Ftp

    Set up a ftp server on one of the machines, that should work.

    The only other way i can think of(there maybe be specifik software that can de excatly what you´re talking about) is using somekind of...
  15. Thread: Firewall

    by cybermike_dk
    Replies
    15
    Views
    1,747

    firewall?

    a software-on-box firewall is no god.

    Go to the local dump and find you´re self a 386´er or something like that. Go out and by two netcard adapters, and kick a linux dist into it, read the...
  16. Replies
    3
    Views
    1,024

    Encrypted filesystem

    Does such a thing exist? and how does it works?
    what about performance? what kind of encryption does it use? how secure is it? how does it store the key?


    Can anybody give me some answers? ...
  17. Replies
    6
    Views
    1,090

    /bin/login trojan!

    if the administrator uses logrotation AND tjek hi´s logfiles, he would proberly check (or used automated software) the size and crc of the most (or all) of the importent system programs.
  18. Replies
    0
    Views
    878

    Yo Whatsup? Mike is on the field!

    Hey my name is Mike im from Denmark, i have been working alot with network and different unix os´es lately.

    I know a lot but im sure some of you people know more than me, so i hope to learn...
Results 1 to 18 of 18

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides