Search:
Type: Posts; User: TechGrunt; Keyword(s):
Search:
Search took 0.01 seconds.
-
January 20th, 2007, 08:56 AM
I would also probably adjust the display interface a little. Make the mouse point larger at least. Have just gone through something similar and one of the main problems these user had was locating...
-
October 22nd, 2006, 03:09 PM
A lot also depends upon what you are attempting to achieve with encryption. If, as you post suggests, you are looking at encryption to prevent data retrieval after the hard drive has left your...
-
Hi there
Sounds like a nasty scenario. 5768.. is very correct in the assessments he puts forward regarding the vulnerabilities you face. In short, physical access = compromise. Regardless of what...
-
June 28th, 2006, 02:44 PM
Hi there
Does anyone know of a location where I can find the US Rainbow series of documents. I am specifically after the Yellow and Orange books. The one site I am aware of
...
-
Hi Nihil
Sadly most things are more complicated these days I suppose.
The scenarios I proposed in the paper is as follows:
Windows 2003 Standard Edition
Pasword length of 7 characters
Password...
-
Hi Nihil
Not looking for anything too specific here. What I am writing isn't specifically on password security just an element of a larger computer security paper. Ideally what I am after is a stat...
-
Hi everyone
As part of a university assignment, I am in need of statistics on speed of password cracking software (ie number of passwords/second).
I have googled and searched AO and the most I...
-
Always thought of the 8th layer as the "management" layer myself. The layer where most communications problems or disruptions exist. However the suggestion of politics sounds reasonable. How about...
-
April 25th, 2006, 06:59 AM
Hi there Robo
You can set it so that Windows XP logs in automatically to a predetermined set of credentials (username and password) that are hard coded into the Windows registry.
This article...
-
April 16th, 2006, 09:15 AM
Hi there Guan-Di
This isn't a magic fix for your problem, but it might help you along. The following are some links to resources for risk management. I have done some work with risk management in my...
-
January 10th, 2006, 03:53 AM
Thanks for the responses everyone. Given me a bit to go on
Tek
-
January 9th, 2006, 10:00 AM
Hi everyone
I have heard this said by people in passing but am trying to confirm it. Are there any security issues with putting MS SQL 2000 on the same server as IIS (current version)? I have...
-
November 22nd, 2005, 02:12 PM
Thanks for trying Texan. You helped confirmed my nil result search. While not conclusively turning up a "no it can't be done" I think we have determined that it is something that hasn't yet been...
-
November 21st, 2005, 07:30 AM
Hi everyone
I have checked around on google and search this forum but can't find a specific reference to it (which could well be my answer), however this does seem at least theoretically possible.
...
-
November 18th, 2005, 08:41 AM
Cabby80 has a good point here. I think independance is important. You need to be separate from the business process, because ultimately security is something that will detract from business. Often...
-
November 17th, 2005, 11:29 AM
Not impossible, just hard to implement. I work in a large organisation that is currently looking at a self assessment program for certain aspects of ICT operations. However, the program also comes...
-
September 21st, 2005, 10:45 PM
Check the link in the post from Trevoke. It gives you a list of download sites to a number of distros (Knoppix included).
-
September 10th, 2005, 08:28 AM
Hey there pshannon
If you are fairly new to linux, some of the Knoppix STD tools will definately be a little hard to handle. However, as far as a distro designed for security goes, it is one of the...
-
August 30th, 2005, 10:02 AM
One disadvantage to using a thematic naming schemes is it doesn't scale very well. It might work in the early stages of your network, but as time goes on you may run out of names. Also if you have...
-
August 1st, 2005, 02:25 PM
You may also want to take an audit of permissions and users within your organisation. If you have someone deleting files there is a good chance they don't have a legitimate need or business...
-
July 30th, 2005, 04:10 AM
Got some more info (from the www.infowarrior.org list) on the event:
http://www.schneier.com/blog/archives/2005/07/cisco_harasses.html
And if you check the link you posted earlier you will find...
-
July 22nd, 2005, 02:07 PM
Hear what you are saying here Infernon, but use of an application like IM in the hands of generally users who don't realise the ramifications of what they are doing is not really good. I understand...
-
July 21st, 2005, 05:41 PM
I would think a big one would be the "house" (company running the site) doesn't make good on winnings, disappears and sets themselves up again under a different name and does the same thing.
You...
-
July 21st, 2005, 04:59 PM
I agree with nihil. If you have an environment where this is an issue, you need to look at a holistic solution to plug all holes. Also you need to essentially look for a balance of functionality of...
-
July 21st, 2005, 04:41 PM
Hi genXer
Sniffing traffic for login information really depends upon the type of system they are using. If they are using protocols that transmit the information in clear text (rather unlikely in...
|
|