Search:

Type: Posts; User: t3gilligan; Keyword(s):

Search: Search took 0.01 seconds.

  1. Replies
    6
    Views
    15,686

    We currently use Checkpoint's Pointsec product. ...

    We currently use Checkpoint's Pointsec product. I have mixed feelings about Pointsec. I think it is all around a great product, but a little difficult to manage. It works on quite a few different...
  2. Replies
    3
    Views
    6,140

    I really Don't see this happening to every...

    I really Don't see this happening to every machine. Especially for some time. I think there are a number of pitfalls for this type of Full Disk Encryption solution that need to be resolved first....
  3. Replies
    1
    Views
    3,028

    Workstation/Server Monitoring

    Does anyone have any suggestions for good workstation/server monitoring software. I am in need of a utility that monitors all of my users at all times, records what they are accessing, what they are...
  4. Replies
    3
    Views
    7,722

    thank you guys

    THanks guys!! The problem was the comma.
  5. Replies
    1
    Views
    4,620

    automating sshd2_config user creation

    I don't know if this is within the scope of this group, but I have a problem that has been nagging me for some time. I am by no means an excellent programmer, but I get by... I have created a...
  6. Replies
    3
    Views
    7,722

    moving files accross network with Perl

    I am relatively new at this, but here is the situation. I have a group of recordings at point A on our network (windows 2000 server box). They are placed there by a verification division after...
  7. Replies
    5
    Views
    5,517

    thank you both

    I tried both ideas, booting in safe mode, and running cws shredder. It seems to have worked beautifully. Thank you both
  8. Replies
    5
    Views
    5,517

    Ok Thx, I'll give those ideas a try, and post...

    Ok Thx, I'll give those ideas a try, and post back on the results
  9. Replies
    5
    Views
    5,517

    spyware nightmare

    I have been working on a spyware problem with a windows 2000 machine. I am at the end of my rope, and am out of Idea's. I have run adaware, pest patrol, spy bot, I've used msconfig to halt the...
  10. Replies
    1
    Views
    4,076

    email question

    I have a user who works with 2 different buisnesses. He needs to recieve his email at both locations, from both locations. The problem is, I do not trust his other buisness, as they are overidden...
  11. Replies
    18
    Views
    20,457

    sweet angel thank you so much for the root kit...

    sweet angel thank you so much for the root kit check. Thank all of you for your help. I am a fairly decent learner, but sometimes need to be pointed in the right direction. You're all great. Thx
  12. Replies
    18
    Views
    20,457

    That will be very usefull, I use slack at home. ...

    That will be very usefull, I use slack at home. Thank you
  13. Replies
    18
    Views
    20,457

    thank you msmittens, I am familiar with the...

    thank you msmittens, I am familiar with the securing linux document on tldp, but do you know of any other current helpful documents that focus on linux security.
  14. Replies
    18
    Views
    20,457

    Hacked Red Hat 7.3

    I have a Red Hat 7.3 server, and I have just noticed after reviewing log files that someone has obtained root access to my server. I have an ip address, and changed the root password. I have also...
  15. Replies
    28
    Views
    20,533

    I'm comfortable with most anything. I'm fairly...

    I'm comfortable with most anything. I'm fairly knowledgable, however, I've run linux for about 5-6 years so I dont often run across a lot of windows problems, expecially when dealing with...
  16. Replies
    28
    Views
    20,533

    It is running windows 2000. I also noticed the...

    It is running windows 2000. I also noticed the kernel was taking up the 30 percent cpu usage when idle. So I dont know if the cpu usage problem is actually due to spyware. The computer has a lot...
  17. Replies
    28
    Views
    20,533

    running processes

    these are the running processes

    C:\WINNT\System32\smss.exe
    C:\WINNT\system32\winlogon.exe
    C:\WINNT\system32\services.exe
    C:\WINNT\system32\lsass.exe
    C:\WINNT\system32\svchost.exe...
  18. Replies
    28
    Views
    20,533

    spyware killing me

    I am having an incredibly hard time getting rid of my spyware problem. My processor is running at 30 percent when idle, and I have purchased the professional version of adaware. Adaware has always...
  19. Replies
    7
    Views
    6,666

    thank you

    Thank you all very much!!
  20. Replies
    7
    Views
    6,666

    good packet sniffer

    I'm looking for a good packet sniffer, does anyone have any suggestions? I would prefer a free packet sniffer, but am willing to pay also. Thank you
  21. Replies
    27
    Views
    14,942

    thank you phishphreek80, i appreciate it. I...

    thank you phishphreek80, i appreciate it. I found what I am looking for.
  22. Replies
    27
    Views
    14,942

    I am sorry, it is they that dont care about...

    I am sorry, it is they that dont care about network security.
  23. Replies
    27
    Views
    14,942

    pitching network security

    I am a network admin looking for articles or text files stressing the extreme importance of security. I am running into a huge problem people over me not caring about network or system security. I...
Results 1 to 23 of 23