Search:

Type: Posts; User: banshee; Keyword(s):

Search: Search took 0.02 seconds.

  1. Replies
    3
    Views
    4,667

    Hi, not to sound pessimistic, but there are a...

    Hi,
    not to sound pessimistic, but there are a lot of variables to take into account in setting up secure networks. Yes, the software you mentionned is a great start, but what is the most...
  2. Replies
    12
    Views
    9,086

    Nokia: yes, you are right, a lot of networks DO...

    Nokia: yes, you are right, a lot of networks DO depend on it... I assumed that it was a stand alone computer. However, networks that do require to have netbios open should do close monitoring of its...
  3. Replies
    12
    Views
    9,086

    Hi, yes, netbios could be viewed, up to a...

    Hi,
    yes, netbios could be viewed, up to a certain extent as a 'trojan' (though the term trojan is probably not what you meant). It is however a well know vulnerability (and very well...
  4. Hi, degaussing your HD is the way to go... ...

    Hi,
    degaussing your HD is the way to go... Thats what we did in the Gov when we had classified information. However, be warned, degaussers are very expensive.
    Putting it in the microwave, as...
  5. Replies
    20
    Views
    14,845

    Hi, if you want to do a one time audit, I'd...

    Hi,
    if you want to do a one time audit, I'd also take a look at Elcomsoft's Proactive Windows Security Explorer... its very similar to LC and you can download a free 30 trial with no...
  6. Replies
    43
    Views
    32,958

    hi, you should definetely tell them. I...

    hi,
    you should definetely tell them. I believe that you have a certain moral responsability in protecting innocents (the bank's customers) against possible harm.

    However, I do understand the...
  7. Replies
    21
    Views
    11,572

    I really doubt that its an attack (even though...

    I really doubt that its an attack (even though our system has a few known vulnerabilities).
    I've watched the log files grow only when I was 'active' on the computer.

    For instance, I leave the...
  8. Replies
    21
    Views
    11,572

    Yes, I think thats a good idea. I'll reread the...

    Yes, I think thats a good idea. I'll reread the AUP again and then voice my concerns with the sys admin. I doubt that he will agree with my views but hey, what do I have to lose!

    cgkanchi: yeah,...
  9. Replies
    21
    Views
    11,572

    Soda: i do agree with you that its not my network...

    Soda: i do agree with you that its not my network and they certainly do have and should have administrative rights. However, I believe that its not right to not a user know that their session is...
  10. Replies
    21
    Views
    11,572

    thanks a lot for your reply. i know this...

    thanks a lot for your reply.

    i know this because i found the 'hidden' log files on my share. It had a '.' before the filename to prevent normal display if done by an 'ls -l' call.
    I've checked...
  11. Replies
    21
    Views
    11,572

    question about privacy and keylogging

    Hi,
    I've recently discovered that my university is logging every keystrokes that are typed into bash, whether the user is on a unix machine or using X-Win32. I do see the use of this from both a...
  12. Replies
    2
    Views
    4,424

    you may also want to check...

    hi, this is my first post on AO, so i hope it makes sense!

    i would also recommend checking NIST publications. They have tons of security documents posted on their website and i'm sure some it ...
Results 1 to 12 of 12