Search:
Type: Posts; User: aciscorouter; Keyword(s):
Search:
Search took 0.05 seconds; generated 25 minute(s) ago.
-
February 9th, 2008, 06:45 PM
Where did the .zip file go? Anyone know where I can find this? Haven't seen the attachment since the site was updated a year ago...
-
February 9th, 2008, 06:40 PM
Since the site was updated last year I can no longer find the tutorial...
-
March 19th, 2007, 08:57 PM
What is the current sustained backplane bandwidth on your existing layer2 device? One advantage of the layer3 switch approach is the ability to VLAN and route traffic on the same backplane while...
-
March 19th, 2007, 08:30 PM
Superscan! http://www.foundstone.com/resources/freetooldownload.htm?file=superscan4.zip
-
March 19th, 2007, 08:23 PM
We have layer 2, 802.1x encapsulating MS-CHAPv2 in a Protected EAP session (PEAP) to a Microsoft IAS (RADIUS) server which in turn provides Active Directory challenge response to both user and...
-
February 13th, 2007, 08:27 PM
Consider the following:
* Servers - OS, Web, DB hardening / bastioning / latest patches
* Firewall rules and DMZ location (Web server should not be on the same segment as the SQL server if the Web...
-
February 13th, 2007, 06:39 PM
The problem with most content is that you need to download it to view it. If you share it as PPS or PPT the users still have to download locally to view it. Even if you were to go as far as to use...
-
March 24th, 2006, 06:47 PM
In terms of security, there are a number of vulnerabilities that exist for both OOP languages. What sort of audience will be viewing your site? A lot of corporate security policies turn both Java...
-
March 24th, 2006, 04:38 PM
Many governments secretly sanction the use of antiforensics and countersurveillance and have been in the state of developing tools, standards and protocols for some time, it's not something you hear...
-
February 22nd, 2006, 04:24 PM
As alleyCat suggested earlier:
Portscanning
From Wikipedia , the free encyclopedia
Jump to: navigation, search
A Port Scan is one of the most popular reconnaissance techniques attackers use to...
-
February 21st, 2006, 06:01 PM
I personally love the fact I can go anywhere in my Vibe with my laptop and pringle can and find Internet access! I'm at the park with my kid and can check my email, I go on vacation and we can check...
-
February 21st, 2006, 04:52 AM
I defo stand corrected on this one. I have misused the meaning in the past and have recently read that very article on Port Knocking that you referred me to, but obviously hadn't digested it. ...
-
February 21st, 2006, 01:59 AM
Reconnaissance is the first thing that an attacker will do to find a juicey target. Port scans (aka port knocking) is only one form of recon (war-dialing is another example) and it serves the...
-
February 21st, 2006, 01:42 AM
He might have been running Cain & Abel to crack IE's MRU hashes, He may have been running a plugin on the browser that remembers passwords (without prompting the user), possibly the keylogger or else...
-
February 21st, 2006, 01:34 AM
MadAxe, may I suggest you build yourself a Linux gateway and implement IPtables? There are tons of resources and HOWTO's out there that will help you understand the basics. Then there are a...
-
February 21st, 2006, 01:07 AM
CMD> nbtstat -a xxx.xxx.xxx.xxx <-- X being the IP address
If you are using Linux there is a cool Linux NBTSTAT client created by BindView who was just aquired by Symantec (but the tool is still...
-
February 9th, 2006, 11:49 PM
Hey I agree with the other suggestions. Go to SANS reading room, do some social engineering but the real work is getting your corporate echelons to agree and ratify standards. We were tasked with...
-
February 9th, 2006, 11:14 PM
And no firewall administrator is complete without a hardening guide foucussed on the PIX and some methodology behind firewall administration - Get the Guide Here :D
-
February 9th, 2006, 09:02 PM
Totally agree with that. Unless you are a government agency or have conversations with users on your LAN about the Caramilk secret, encrypting the data is overkill. MAC filtering will not allow...
-
February 9th, 2006, 06:04 AM
Hey there, I posted a tutorial/guideline last year for hardening the configuration of a Cisco router - My Tutorial
Hope this helps...
Gary
-
February 8th, 2006, 06:55 PM
Linux SecAdmin - Look Who's Knocking
Written By Gary Freeman - a.k.a. Aciscorouter
Tuesday February 7 2006 @ 17:35
DISCLAIMER: This is a tutorial of sorts that takes you through a day-to-day...
-
April 21st, 2005, 03:09 PM
Wow, thanks phernandez... I didn't think to look at the spotlight articles until today and came across the link to Enterprise IT Planet's review. This is great :D
Cheers,
-
April 5th, 2005, 02:52 PM
Nice one mate! I have finished the investigation already and I'm looking for a way to justify my numbers but I know the average website visit is between 6 and 12 GET requests per page (did a dirty...
-
April 4th, 2005, 09:12 PM
:D Damn skippy! I agree 100%. HR are such techno-phobes that everything is taken literally and they see 100 alerts as 100 visits to a website. Try explaining anything to them and their eyes glaze...
-
April 4th, 2005, 08:53 PM
No, we have ISA implemented for our call centers but in the main data center the users can access the Internet without any caching or proxying. We tried caching and sending the data to a log...
|
|