Search:

Type: Posts; User: Sgt_B; Keyword(s):

Page 1 of 8 1 2 3 4

Search: Search took 0.11 seconds.

  1. Replies
    9
    Views
    6,046

    NMAP - www.insecure.org Nessus -...

    NMAP - www.insecure.org

    Nessus - www.nessus.com

    Those are the two that I use frequently. There are some others out there, but these get the job done for me.
  2. netstat -pant on linux machines will give you the...

    netstat -pant on linux machines will give you the application that is using the port. Have you tried all the commands for netstat?
  3. Replies
    42
    Views
    10,066

    Like I give a damn about negs. You're so...

    Like I give a damn about negs.

    You're so dramatic.

    I just feel sorry for you...seriously.
  4. Replies
    42
    Views
    10,066

    I almost feel sorry for you ck.

    I almost feel sorry for you ck.
  5. Replies
    42
    Views
    10,066

    Thanks for putting words in my mouth. I never...

    Thanks for putting words in my mouth. I never said people who don't want to sign it make me sick. If you don't want to sign it, then that's fine. You think that signing it is a signal to the US gov...
  6. Replies
    42
    Views
    10,066

    4MH - Thanks for the link. Its a great site, and...

    4MH - Thanks for the link. Its a great site, and I think its great to give people the chance to thank our men and women in the armed forces.

    For all those that say "thank them for what"....you're...
  7. Thread: Block P2P

    by Sgt_B
    Replies
    17
    Views
    8,797

    Lorenzo - Not having a username and password is a...

    Lorenzo - Not having a username and password is a bad idea. Leaving the default username and password is even worse. You might want to correct this on your linksys
  8. Thread: Linux behind ISA

    by Sgt_B
    Replies
    11
    Views
    6,858

    Here's a simple question, but sometimes these...

    Here's a simple question, but sometimes these things get overlooked. How is your browser set up on the clients? Are you specifying ISA as the proxy server?
    I know...pretty obvious, but I had to ask....
  9. Thread: Spam... or not?

    by Sgt_B
    Replies
    5
    Views
    5,293

    Wrong fourm. This for "How do I's" regarding this...

    Wrong fourm. This for "How do I's" regarding this site. Anyway, spammers suck. You're a spammer, therefore you suck. That being said. If you really want "intense hits" then you're going to have to...
  10. Thread: Block P2P

    by Sgt_B
    Replies
    17
    Views
    8,797

    I wish I could help there, but I've never used...

    I wish I could help there, but I've never used PIX so I can't tell you how really. Trust me though, find out how to view your log files. They are invaluable!
    What you can do, especially with this...
  11. Replies
    16
    Views
    9,670

    Tiger: The red ball in a pile of green ones is...

    Tiger: The red ball in a pile of green ones is not a correct analogy. I might not have described the feature properly. In the decoy list, you can specify publis as well as private IP addresses. So If...
  12. Replies
    16
    Views
    9,670

    Doesn't that go without saying? :p :p

    Doesn't that go without saying? :p :p
  13. Thread: Block P2P

    by Sgt_B
    Replies
    17
    Views
    8,797

    What FW are you using? Best way to test this...

    What FW are you using?

    Best way to test this is to install these apps on your machine. Block those ports that they use, and then try to log on. If you can't log on, then you've got it. If you can,...
  14. Replies
    16
    Views
    9,670

    Nmap and its decoy lists. This is probably the...

    Nmap and its decoy lists. This is probably the culprit. I can send a scan to a target, and set a decoy list as well. This sends my scan along with a number of spoofed IP's that show up in the...
  15. Thread: Linux behind ISA

    by Sgt_B
    Replies
    11
    Views
    6,858

    You have to allow use of the proxy for the RH...

    You have to allow use of the proxy for the RH machine.
    On the ISA, create a client address set using the RH's IP address. Then create Access Policy Rules (Protocol mainly) allowing http access, and...
  16. Replies
    5
    Views
    4,059

    Just in support of DjM....Snort!

    Just in support of DjM....Snort!
  17. Replies
    34
    Views
    40,421

    Hey Nebulus, I didn't know IDS's could block...

    Hey Nebulus,

    I didn't know IDS's could block traffic as well. What IDS were you referring to? I might check out that option....then supplement that with Tiger Shark's idea. :D

    Thanks everyone!
  18. Replies
    34
    Views
    40,421

    Hey Nebulus, I didn't know IDS's could block...

    Hey Nebulus,

    I didn't know IDS's could block traffic as well. What IDS were you referring to? I might check out that option....then supplement that with Tiger Shark's idea. :D

    Thanks everyone!
  19. Replies
    34
    Views
    40,421

    I know there's different options to achive the...

    I know there's different options to achive the same goal. Thats not what I was asking. Either way, best bet is to block their logon servers I guess. Simplest anyway, and doesn't give me a headache.
    ...
  20. Replies
    34
    Views
    40,421

    I know there's different options to achive the...

    I know there's different options to achive the same goal. Thats not what I was asking. Either way, best bet is to block their logon servers I guess. Simplest anyway, and doesn't give me a headache.
    ...
  21. Replies
    34
    Views
    40,421

    Thanks KC! Yes, the "they" in question are the...

    Thanks KC!

    Yes, the "they" in question are the IM's...shoulda clarified that. I'll probably just go with blocking thier logon servers for now I guess. Although they could easily create an "update"...
  22. Replies
    34
    Views
    40,421

    Thanks KC! Yes, the "they" in question are the...

    Thanks KC!

    Yes, the "they" in question are the IM's...shoulda clarified that. I'll probably just go with blocking thier logon servers for now I guess. Although they could easily create an "update"...
  23. Replies
    34
    Views
    40,421

    Yes, they do use specific ports, and if those...

    Yes, they do use specific ports, and if those ports are blocked then they will route through port 80 (ICQ also uses 21). Port 80 is used to access the internet via http. I can't really block that....
  24. Replies
    34
    Views
    40,421

    I know you can explicity deny access to the logon...

    I know you can explicity deny access to the logon servers, but if they change the logon server name, or if they add a new logon server, then its open season again for messengers.

    I haven't tested...
  25. Replies
    34
    Views
    40,421

    Blocking messengers

    I'm sure we've all heard it before, and I just did a search and didn't find anything recent or conclusive. So here it goes...

    AIM,MSNM,ICQ....how do you block these at the perimeter. The only...
Results 1 to 25 of 182
Page 1 of 8 1 2 3 4