Search:
Type: Posts; User: Net2Infinity; Keyword(s):
Search:
Search took 0.02 seconds; generated 2 minute(s) ago.
-
March 11th, 2008, 08:32 AM
Isn't that why there are now IPS's? :)
-
February 21st, 2008, 11:51 PM
Instead of using a live cd, why don't you load linux on a laptop and compile your own tools. Even backtrack 2 has dated tools and signatures.
-
January 26th, 2008, 04:31 PM
Sorry for misunderstanding the original post.
-
January 26th, 2008, 09:14 AM
You shouldn't have to change the passwords of every other user if the solution was designed properly in the first place. Every remote user should have a different password, thus you merely disable...
-
November 9th, 2007, 06:24 AM
If you use Cisco switches you can use "bdpu guard" to prevent a loop from taking down a network.
-
October 10th, 2007, 04:08 AM
You agreed you can determine a physical address based on subpoenaing the ISP records for an IP address.
-
October 9th, 2007, 08:18 PM
How does this make me a dumbass? Heck you agreed that I was right ... lol.
You are correct that people shouldn't perceive an IP address as a guarded secret.
-
October 9th, 2007, 04:56 AM
When you are assigned an IP address by your ISP it does pinpoint you to a geographical location as they know what end node was assigned that ip address. The then cross reference that with their...
-
October 9th, 2007, 04:48 AM
You don't need a helper address if you are on the same subnet.
-
October 9th, 2007, 12:26 AM
In the corporate environment I recommend a Cisco ASA, a NetScreen, or Checkpoint on Nokia. I would never ever ever run any software firewall on a windows platform in a corporate environment.
-
October 5th, 2007, 03:57 AM
Hamachi is bidirectional, meaning that they can connect to you as well. If you do alot of remote support for them I would recommend a VPN capable firewall.
-
October 2nd, 2007, 04:54 AM
I use nbtscan as part of an enumeration for a internal security assessment. Even Angry IP Scanner has similar functionality.
-
September 26th, 2007, 12:12 AM
I have nothing of value to contribute ... other than those pics are funny as hell. lmao
-
September 18th, 2007, 09:11 AM
Thank you for your reply, but the IP address in question is actually a public IP address. I know that nslookup and dig are proper tools for DNS queries, but a ping was easier at the time ... haha.
-
September 18th, 2007, 03:11 AM
Thanks. Could you please clarify the significance of the "domain.tld" or is it merely a place holder?
-
September 18th, 2007, 12:45 AM
So in the process of conducting some network discovery for a new client I have discovered the following ...
C:\>ping -a x.x.x.10
Pinging 10.domain.tld [x.x.x.10] with 32 bytes of data:
Reply...
-
August 13th, 2007, 01:10 AM
For 3 grand, you should go buy a server from Dell, HP, or IBM.
-
July 25th, 2007, 07:37 PM
I always follow the following plan when addressing a network
.1-.10 = Network edge equipment
.15-.40 = Servers
.35-80 = Printers
.100-200 = DHCP Scope for Workstations
-
July 23rd, 2007, 10:59 PM
Google is your friend .....
http://www.softperfect.com/products/pinspector/
-
I agree, I bet there is a default gateway configured on each interface and the workstation is sending the traffic out the wrong interface.
-
June 23rd, 2007, 12:54 AM
I would reinstall 2003 and install Xampp or WAMP and be done with it.
-
June 23rd, 2007, 12:40 AM
I am going to go out on a limb and say your "wireless ap" is actually a wireless broadband router and has NAT enabled. Thus you cant ping from 0.x to 1.x , but you should be able to ping from 1.x to...
-
Well Steve, even though I am sympathetic to your situation I am failing to see how you have a claim against them just because you now receive spam. Sure you can claim you didn't receive spam before...
-
April 13th, 2007, 02:43 PM
I would say no to the surverys, but I would pull the stats from your gateway router. How many people do you have in your organization?
-
April 11th, 2007, 02:29 PM
Assume
Host A = Workstation
Host B = Server
Host C = Attacker
Basically the Cisco document is saying that if Host C wants to intercept the traffic that Host A is sending to Host B, then...
|
|