Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: bArGuS_4_$; Keyword(s):

Search: Search took 0.02 seconds.

  1. Replies
    5
    Views
    701

    I would be curious if you have a URL to find more...

    I would be curious if you have a URL to find more information on the exam. I am a little wrapped up with some SANS certs right now, however I would be interested in seeing more on this cert.
  2. Replies
    7
    Views
    861

    W32.Chet@mm Discovered on: September 10, 2002...

    W32.Chet@mm
    Discovered on: September 10, 2002
    Last Updated on: September 10, 2002 08:20:55 PM PDT
  3. Replies
    11
    Views
    1,012

    I arrived at work and a co-worker told me that a...

    I arrived at work and a co-worker told me that a plane hit the first tower. Then I watched as the second tower was hit on a computer hooked up to pick up tv channels. I work at a technical support...
  4. Replies
    3
    Views
    519

    Windows 2000 DNS is actually fairly simple to...

    Windows 2000 DNS is actually fairly simple to set-up and configure. Quicker than Solaris (although I prefer Solaris personally) I set-up one of my training rooms with 3 MSE machines in two domains...
  5. Replies
    66
    Views
    3,289

    Not to be an intigator but maybe he wanted to...

    Not to be an intigator but maybe he wanted to start an energy plant utilizing nuculear materials. After all they are being embargoed from heck.

    We know he gassed those people and did the acid...
  6. Replies
    11
    Views
    1,012

    I think that the positive effects were only seen...

    I think that the positive effects were only seen in a small number of people, realizing they were not as safe as they previously thought and allowing them to change their lifestyle a little bit.
    ...
  7. Replies
    6
    Views
    921

    my new desktop!! That rocks

    my new desktop!! That rocks
  8. Replies
    15
    Views
    1,121

    Where did it find the virus? Directory location...

    Where did it find the virus? Directory location if you do not mind. Did it locate the virus in any other places?

    If it found the virus in an old directory, a manual scan does not report the...
  9. Replies
    15
    Views
    1,121

    If you do not mind, what is the directory where...

    If you do not mind, what is the directory where the malicious code is being found?
  10. Replies
    14
    Views
    1,964

    I like everything but the Zoo.... Way to go..

    I like everything but the Zoo.... Way to go..
  11. Replies
    10
    Views
    1,532

    Poll: kadeng stated that Email Server scanning would...

    kadeng stated that Email Server scanning would only catch common mail viruses. I think you may have over simplified and generalized this a bit. If a reputable virus scanning program is implemented...
  12. Replies
    6
    Views
    768

    Submit the file to sn AV company. If you have a...

    Submit the file to sn AV company. If you have a test box, throw up some monitoring utilities and let it infect and see what's going on. Then develop removal instructions on that.


    Disclaimer: ...
  13. Replies
    6
    Views
    901

    Detox is absolutely right about the capabilities...

    Detox is absolutely right about the capabilities of heuristics. They are not as effective as advertised and can lead to many more false detections that actual detections. They often lead to a waste...
  14. Replies
    11
    Views
    1,618

    I would say that most AV systems will look at the...

    I would say that most AV systems will look at the first 32 bits of code on a document to see if it matches a known virus signature and if not then they will apply some form of heuristics.
    ...
  15. Replies
    66
    Views
    3,289

    It is a totally different environment over there....

    It is a totally different environment over there. Iraqi people and their culture seems totally different. Check out this site if you do not believe me. Different values and beliefs. According to...
  16. Replies
    14
    Views
    1,964

    I suggest if your randomly going to open...

    I suggest if your randomly going to open files...Due it on a test machine for which you have imaged so that if you get stuck you can reimage it. Also, make sure it is on a service network so that...
  17. Replies
    15
    Views
    1,121

    You may want to set up a Honey Pot to find out if...

    You may want to set up a Honey Pot to find out if another machine is hosting Sircam. Sircam is a worm and thus can propagate itself. It may be accessing a share or going through a known security...
  18. Replies
    3
    Views
    759

    You may want to look into another Mailer AV...

    You may want to look into another Mailer AV program as well. If you are an ISP that is using something similiar to MSE 5.5 or 2k or something along that lines, you should be able to find an AV that...
  19. Replies
    14
    Views
    1,964

    Not to be annoying or anything...may I recommend...

    Not to be annoying or anything...may I recommend that if you suspect a trojan or unathorized internet access try a netstat -an see what is going on and who is holding the ports open. Research those...
  20. Replies
    6
    Views
    901

    AV Companies will not intentionally attempt to...

    AV Companies will not intentionally attempt to prevent another software company (legitamate) from selling or distributing a product.

    With that in mind.

    If you knew what ISpy did, and they...
  21. Thread: i spy.

    by bArGuS_4_$
    Replies
    2
    Views
    703

    Most AV companies will not touch the Commercial...

    Most AV companies will not touch the Commercial Spy software. Reason--Because you purchase it knowing what your getting into. You installed it knowing what it was, therefore it was not a malicious...
  22. Replies
    10
    Views
    1,532

    Poll: In todays paridigm it is necessary to offer...

    In todays paridigm it is necessary to offer multiple tiers of AV and Intrusion Protection. A company that makes you pay for this "Feature" should be considered shady, as this would seem to violate...
  23. Replies
    3
    Views
    759

    Klez.E and any other worm is always very...

    Klez.E and any other worm is always very difficult to remove from a network environment. Your IRT (Incident Response Team) needs to react fast and decisive to eliminate the threat. If only one node...
  24. Replies
    14
    Views
    1,964

    Sounds like that would not be a good thing to...

    Sounds like that would not be a good thing to occur. You very well may have been hacked or Trojaned. Task Manager should not request a socket. It is used to schedule a program or task to run, and...
  25. Replies
    3
    Views
    660

    Personal Opinion on NT 4.0 AV would be Symantec...

    Personal Opinion on NT 4.0 AV would be Symantec Anti-Virus Corporate Edition 8.0. It has package rollout capabilities, Central Management (meaning scalable) and it incorporates Heuristics with...
Results 1 to 25 of 25

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides