Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: golam; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.01 seconds.

  1. Replies
    38
    Views
    4,040

    The other problem with tracing IP addresses is...

    The other problem with tracing IP addresses is that if the person is up to no good, then they are probably operating from a compromised computer and not their own. In this case it is almost...
  2. Replies
    38
    Views
    4,040

    If you run a Google on the subject you will see...

    If you run a Google on the subject you will see that a bill was passed in the US to mandate that all cell companies must be able to locate anyone making a 911 call.
    You will also see that many cell...
  3. Spam filtering applications are also a good way...

    Spam filtering applications are also a good way to go for a medium to large business, or check with your ISP (if you use one) as many ISP's now provide spam filtering.

    Some applications to look at...
  4. Replies
    12
    Views
    1,921

    You need to have the domain admin of each company...

    You need to have the domain admin of each company add your laptop to their domain.

    Once an account for your laptop in each domain has been created, you should see the 3 options in the login...
  5. Thread: firewalls

    by golam
    Replies
    9
    Views
    809

    I would go with the Zone Alarm group - used it...

    I would go with the Zone Alarm group - used it for several years and is great as long as you turn off notifaction as suggested by ame1usn

    Golam
  6. Replies
    12
    Views
    1,921

    From memory this is not possible as the PC...

    From memory this is not possible as the PC registers with the domain controll or active directory server for authentication. You would have access to other domains if a trust has been set up between...
  7. Replies
    7
    Views
    869

    First off, there are a lot of reasons that you...

    First off, there are a lot of reasons that you may not be able to access the hard drives.

    Can other PCs access other drives on machines connected to the hub?

    Can other PCs access drives on the...
  8. Replies
    28
    Views
    2,347

    No worries - its been fun Cheers :) Golam

    No worries - its been fun

    Cheers :)

    Golam
  9. Replies
    13
    Views
    1,105

    phishphreek80 - great paranoids think alike ...

    phishphreek80 - great paranoids think alike

    Golam :D
  10. Replies
    28
    Views
    2,347

    Also with respect, what you say about PAT is...

    Also with respect, what you say about PAT is indeed true if you are using the device to hide many users accessing the Internet from an internal source out on one public IP address. This is how the...
  11. Replies
    13
    Views
    1,105

    If you really want to be secure, run either of...

    If you really want to be secure, run either of the software firewalls on your system (I prefer ZA, and have used it for years) then buy a NATing router like the Linksys BEFSR81 or similar and run...
  12. Replies
    4
    Views
    462

    I am not an expert at this but I have my Outlook...

    I am not an expert at this but I have my Outlook client setup to do both - connect to internal mail server when at work and connect to my ISP for external mail outside.

    In the client select Tools...
  13. Replies
    28
    Views
    2,347

    Sounds like you have a reasonably protected...

    Sounds like you have a reasonably protected connection arthurking. The best test is to go to another connection point on the net (at a friend's house for example) and run a scan from there. I don't...
  14. Thread: New computer

    by golam
    Replies
    24
    Views
    1,910

    I've always used Zone Alarm...

    I've always used Zone Alarm and found it to be great.

    There is a free version and a Pro version which costs around US$40


    Golam
  15. Replies
    28
    Views
    2,347

    Very true merrimand, unless that address is the...

    Very true merrimand, unless that address is the "external" address of a firewall or address translating router. Then you would not see the inside address as it will be changed on the outbound leg by...
  16. Replies
    28
    Views
    2,347

    If you know the internal IP ranges of a company...

    If you know the internal IP ranges of a company it is easy enough to craft an IP packet to access an internal resource, using the router as a gateway.

    Part of a true hackers task (not script...
  17. Replies
    3
    Views
    579

    If you selected to do a fresh install when you...

    If you selected to do a fresh install when you re-installed Windows (not a repair), and you agreed to install it in the same default partition (c:\winnt) then you may have problems re-claiming your...
  18. Replies
    2
    Views
    708

    Hi Faqt There is heaps of info on the web for...

    Hi Faqt

    There is heaps of info on the web for this ....try searching for Hayes modem AT command set
    on Google.

    Depending on the type of modem you are using (or emulator) you will need to...
  19. Thread: LAN Manager?

    by golam
    Replies
    11
    Views
    1,069

    Hi Another great product is nessus...

    Hi

    Another great product is nessus www.nessus.org
    The product only runs on versions of *nix but has good support, is open software, and is free.

    There are lots of support info on the WWW, and...
  20. I have just been evaluating Retina and have found...

    I have just been evaluating Retina and have found it to be an excellent vulnerability scanner, however it is not cheap.

    Check out the site http://www.eEye.com

    Cheers

    Golam :cool:
  21. Replies
    2
    Views
    535

    Check this out..its fairly good ;) ...

    Check this out..its fairly good ;)

    http://www.nsa.gov/snac/win2k/download.htm
  22. Replies
    29
    Views
    2,318

    It is very easy to "join" a website using some...

    It is very easy to "join" a website using some one else's details, or even totally fictitious details. (Unless credit card details are required, and even that can be achieved)

    At a previous...
  23. Replies
    7
    Views
    1,359

    I agree with T2K2 :) many proxy servers will...

    I agree with T2K2 :) many proxy servers will increase you access and download times if the pages you are trying to access are held in the proxies' cache. Many ISPs run caching servers as part of the...
  24. Replies
    6
    Views
    627

    In the past I have always found it easier to have...

    In the past I have always found it easier to have two boxes, one as the master (if you like) and the other which you can experiment on. If you have access to Ghost or a program simalar it makes...
  25. You are quite correct a cross over cable between...

    You are quite correct a cross over cable between two PCs that both have ethernet ports will work. You will need to configure the network connection on each PC with an IP address (that is different)...
Results 1 to 25 of 33
Page 1 of 2 1 2

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides