Type: Posts; User: ss2chef; Keyword(s):
Search took 0.03 seconds.
August 13th, 2010 12:02 PM
why not telnet to the ip and port
should be a simple y/n issue here
From what the OP wrote, I suggest the OP concentrate on networking fundamentals and put off diving into metasploit just yet.
November 25th, 2009 08:50 PM
The Fortigates should do as good as any.
Can you get one in on good RMA terms and try it?
Or do you have a spare boxe(s) around to give OpenVPN a spin? To test slowdown anyway...
November 25th, 2009 08:09 PM
How many concurrent users talking over links as an average?
What applications/protocols will be using links?
VPN overhead might chew up more avail bandwidth than you want.
Do you have budget? Do...
November 25th, 2009 08:02 PM
Not really a good time for emotion...Don't risk your job or the network.
Grab critical data and wipe it.
November 25th, 2009 07:34 PM
a high availability service from home = terms that contradict
Look into a reverse proxy where conditional rules can be applied
October 25th, 2006 03:51 PM
Yes, heat is quite often the reason for spontaneous shutdowns or reboots.
October 25th, 2006 03:45 PM
You have asked questions hitting on subjects where many volumes of information have been written. The lack of detail and subjective nature of your query leads me to conclude you may not be the right...
August 31st, 2005 04:33 PM
I gave up on the current beta after failed installs on 2 machines, VMWare, and Virtual PC 2004
Just not enough time to play these days..
You may have better luck in a "base" or "snort" forum.
1st this is neither a *NIX or security question. It's an apache configuration question.
In your httpd.conf are you sure you are binding httpd to an ip/interface other than
Will provide both spam and virus protection for a VERY low cost.
If you check it out and have any questions, let me know, I use it.
If your device can hit a radius server, win2k & 2k3 servers have it built in.
Is called IAS. It works great!!
I have built this one in the past with great fun and success..
It's just a couple bucks.
I think the best you can do is 1/2 until something...
Getting to be quite the popular storage solution platform....
If your information is useful and not just another 1/2 baked "tutorial" I'm sure it will be fine.
Oh, avoid dipshit hacker speak as a bonus... Be sure to use real words..
Posting a small example...
Well we are listed Nagios consultants...:)
Been using it since the Netsaint days before the name chance and re-design.... ;)
Currently we run it on Solaris boxes feeding a custom Cold Fusion...
KISS (Keep It Simple Silly) :)
Don't go looking to add complexity where you don't "NEED" it.
I would start by 1st defining what info you would like to have and then find the tool and/or method...
For many years now, we have always use the term "hardware" firewall to include only firewalls that used a flash ROM or read only RAM drive type of media to store OS and config information.
None of my drives will take an NTFS format....
Is this something that is vendor or drive specific?
edit: scratch that, I just did FAT32 1st and ran convert....
time to test...
AFAIK, the encryption via NTFS will be stripped and the file returned to normal if you mount the drive via alternate OS like Linux or BSD.
I know we discussed this a while back but might be a nice...
Is this a situation where you may have over promised and can't deliver?
There is NEVER a reason to create extraneous liabilities for yourself.
Part of your job/responsibility is to level with...
We have found that any webserver that has been running for more than a few years has a good chance of running a bad perl script like formmail. There was a time when a large percentage of "home pages"...
I can't comment on the Akamai traffic without more information but I would like to add...
I have found that reporting networks who bounce "abuse@" emails to:
hehe um no.... I do however like to use bug spray when I am operating around bugs.
Please re-read, maybe this time with your glasses on...
Bottom line here is I have never had a problem with your...