Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: w-mellon; Keyword(s):

Search: Search took 0.01 seconds.

  1. Thread: record voip

    by w-mellon
    Replies
    12
    Views
    2,603

    I'm not a programmer nor script writer (working...

    I'm not a programmer nor script writer (working to correct script part) but I would investigate a script that could capture and record (more append) the voip packets to a file which at the same time...
  2. Thread: record voip

    by w-mellon
    Replies
    12
    Views
    2,603

    This is all a theoretical exercise... One would...

    This is all a theoretical exercise...
    One would assume part of this task is getting to/at the voip packets. Physical access to the wire - insert a hub, MAC flood the switch, etc. a man-in-the-middle...
  3. Replies
    21
    Views
    3,610

    One thing stood out in a previous message... ...

    One thing stood out in a previous message...

    The test equipment the telco used was T-bird equipment. They run 0's 1's and a mix of it...if they set it to Terminate they got all kinds of errors,...
  4. Replies
    4
    Views
    1,107

    If thats the way you think you can learn best...

    If thats the way you think you can learn best then go ahead - personnally I agree and I'm trying to go down the same track (or as I say moving up the stack). May I recommend several tools to assist...
  5. Replies
    2
    Views
    834

    It was only a matter of time as VoIP deployments...

    It was only a matter of time as VoIP deployments continued to increase over the past two years in both the home and business marketplace.
  6. Replies
    2
    Views
    1,065

    Microsoft Smart Tags?

    Recently received an email with a word in it underlined by a dotted red line....strange. Further investigation denotes this as a Microsoft 'smart tag'. Further reading (on Microsoft website) shows...
  7. Replies
    21
    Views
    2,568

    Cisco security hole...

    If anyone has seen and reviewed his (Lynn's) information - what impact does/would this have on the Cisco security products such as the PIX? I can only guess that the underlying IOS is similar in some...
  8. Replies
    16
    Views
    1,096

    Hack phone system...

    Interesting!
    First off - do you know for certain that this gent being transferred to IT is doing anything your company believes criminal? I don't think you have established that..

    However for the...
  9. Replies
    2
    Views
    1,076

    VoIP security

    Try searching for these at www.pbxinfo.com (alittle old but good)

    "Breaking through IP telephony" and "VoIP security tools are lacking"

    Also lookup "http://www.ee.oulu.fi/research/ouspg/" they...
  10. Thread: IKE in IPSec

    by w-mellon
    Replies
    4
    Views
    786

    IKE and IPSec

    Best book I have ever seen/read on IKE and IPSec was " IPSec - the new security standard for the internet, intranets and virtual private networks" ISBN - 0-13-011898-2. Helped me out several times in...
  11. Replies
    11
    Views
    1,516

    I'm new to wireless but ...(o'reilly book very...

    I'm new to wireless but ...(o'reilly book very good and I think they produce a wireless hacks book too)
    My understanding of WEP cracking is that you need multiple captures of the associations and...
  12. Replies
    19
    Views
    1,315

    May I suggest you change the situation to a rogue...

    May I suggest you change the situation to a rogue wireless pc driving thru a major metroplitan area (having previously gained info on sites thru the route and already prepared to access thru them at...
  13. Replies
    13
    Views
    1,311

    I had read some time ago on the securityfocus...

    I had read some time ago on the securityfocus website about certain hardware equipment vulnerabilities in the tcp/ip stack concerning port 0 (old code in use on equipment could reset by port 0...
  14. Replies
    5
    Views
    1,191

    DoS is a serious concern in VoIP networks. Its...

    DoS is a serious concern in VoIP networks. Its unlikely a vendors voip code will be virus infected (but you never know). As mentioned by Lansing you could separate your voip servers on a different...
  15. Replies
    5
    Views
    1,191

    You will need to treat the voip gateway pc as any...

    You will need to treat the voip gateway pc as any other pc asset in the network (maybe even tighter security). Schedule OS upgrades and patches, install anti-virus (run it, upgrade it) and you should...
  16. Replies
    4
    Views
    697

    vpn equipment

    I haven't used the cisco vpn equipment but have used the nortel CES equipment in the past. If the cisco is as scalable as the nortel you shouldn't have expansion issues with either, its just a matter...
  17. Replies
    9
    Views
    635

    mpls

    You mentioned a past attempt at voip - if you don't mind i'm curious as to who's voip equipment was deployed that didn't work over the frame and when?
  18. Replies
    9
    Views
    635

    mpls

    I don't think mpls is qos aware on it's own - provider will still need to traffic engineer this with you. mpls has several standards -rfc's - already at the ieft.
  19. Replies
    53
    Views
    3,907

    loaded any new software or freeware lately? had...

    loaded any new software or freeware lately?
    had a problem once with nic software being messed up by recent freeware install (port / socket conflict).
    Removed freeware, removed nic and drivers and...
  20. Replies
    7
    Views
    732

    Next step? next tool?

    Recently downloaded Nmapwin and ran scan tests on my local communications equipment. I have found open ports that really shouldn't be there. Next step is to test vulnerability (can they be connected...
Results 1 to 20 of 20

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides