Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: spurious_inode; Keyword(s):

Page 1 of 10 1 2 3 4

Search: Search took 0.02 seconds.

  1. Okay, okay... :) Personally, I am going out to...

    Okay, okay... :)

    Personally, I am going out to the street to beat the kid up and take his laptop for my collection. I'll probably take his car battery too since you can always use a spare.
    ...
  2. Well. If there is a car you don't know parked...

    Well. If there is a car you don't know parked outside your house with an antenna on the roof, and a nervous looking dweeb with a laptop inside we don't need to many other variables to solve for X. ...
  3. I don't have a problem with this law actually. Of...

    I don't have a problem with this law actually. Of course it depends on what the network is; e.g. public hot spot offered by a shop or cafe.

    If I park outside your house on the street and freeload...
  4. Replies
    1
    Views
    890

    Do you have enough in your budget for a firewall...

    Do you have enough in your budget for a firewall on you client gateway? It's going to be a lot easier to filter traffic per-subnet or per-gateway than on each individual host. Of course, it's up to...
  5. Replies
    25
    Views
    7,161

    So ambitious! Why not slap Solaris 10 x86 on...

    So ambitious!

    Why not slap Solaris 10 x86 on there someplace too... :)
  6. Replies
    9
    Views
    2,062

    Realize that you are going to have to do this for...

    Realize that you are going to have to do this for TCP, UDP, 'and' ICMP.

    In an examle provided by frostedegg, on Linux you can just tell the kernel via /proc to ignore ICMP.

    But, if I am a...
  7. Replies
    12
    Views
    2,624

    Get BlueCoat proxy/content management hardware on...

    Get BlueCoat proxy/content management hardware on your network. I know, folks probably think I am pushing it a bit hard these
    days... :)

    Seriously, if you need to keep close tabs on what your...
  8. Replies
    10
    Views
    3,169

    16 ^ 4 ... or, the largest unsinged value of...

    16 ^ 4

    ... or, the largest unsinged value of one byte.

    Port 0 is a reserved port, you aren't 'supposed' to use it. But it is common practice
    in UNIX socket programming to use port 0 as a way...
  9. You'll have to forgive me LindaHewitt, i've had...

    You'll have to forgive me LindaHewitt, i've had too many beers with dinner and am a little confused about what you are asking. :)

    If you are looking for cost effective X86 server hardware, I would...
  10. Replies
    4
    Views
    850

    Check out the products from 'EdgeBlue'. They have...

    Check out the products from 'EdgeBlue'. They have some really nice products that won't kill your budget for the next two quarters.

    http://www.edgeblue.com/

    -- spurious
  11. Replies
    30
    Views
    5,151

    I guess by now we are way OT... :) But this has...

    I guess by now we are way OT... :) But this has turned into a semi-productive discussion in spite of itself.

    Okay, I believe you when you say that there is an article in a magazine that says...
  12. Replies
    30
    Views
    5,151

    Yikes! It is amazing to me how ignorant...

    Yikes! It is amazing to me how ignorant PC/Non-Mac users can be about Apple. Instead of just guessing and speculating about what will happen, and pulling rumors out of the air and believing them, why...
  13. First, let me thank you gore for telling us what...

    First, let me thank you gore for telling us what you really think. :)

    For me, this cuts to the chase on the whole question of 'secure' systems. Software and Computer Security are at odds with each...
  14. The enterprise security topics that I am pretty...

    The enterprise security topics that I am pretty hot on right now are Role Based Access Control (RBAC), and true privilege separation. Unfortunately both of these things have the same problem; they...
  15. There has been a definite decline in the...

    There has been a definite decline in the 'production' usage of OpenBSD. I think this is for two reasons. A) as you mentioned catch, the typical installation is on an enthusiasts machines; and many of...
  16. Replies
    6
    Views
    885

    What about computer/corporate espionage? Some...

    What about computer/corporate espionage? Some unscrupulous companies out there will pay well for someone to
    spy on their competitors... Dropping 5K on some unreleased exploits could just be a...
  17. Replies
    15
    Views
    1,880

    Couldn't agree more ... My chosen field is...

    Couldn't agree more ...

    My chosen field is UNIX Systems Design and Management. Given 15 years experience, and several large scale
    environments I have worked in; it is relatively easy to focus a...
  18. I can't believe anyone is running an IIS box...

    I can't believe anyone is running an IIS box without some kind of screen in front of it set up for reverse proxy...

    Unless of course
    a) this is your first time using IIS, and didn't know it is...
  19. Replies
    10
    Views
    951

    You mentioned nmap... Have you tried something...

    You mentioned nmap... Have you tried something like 'nmap -sF -P0 -p 1-65550 -vvv -O <ip-address>' ?

    There are lots of little ways to discover machines on a network, most of which require a good...
  20. Replies
    5
    Views
    1,403

    The list makes sense because those are the kinds...

    The list makes sense because those are the kinds of things that an externally facing Unix host is likely to be running. You don't see things like LDAP, NIS+, SMC and the like because only a Kamikaze...
  21. Hardware firewalls are overrated. Our guys just...

    Hardware firewalls are overrated. Our guys just spent the past 9 hours un-*****ing the network after a cisco pix HA pair **** the bed and then brought all interfaces online at the same time. Which by...
  22. .... Actually, most OS's have little quirks or...

    .... Actually, most OS's have little quirks or other uniqe things about the way they act when you try to build a connection on a closed TCP port. Add to this the implementation specific way that a...
  23. Replies
    2
    Views
    867

    You might also have a look at /etc/inputrc.

    You might also have a look at /etc/inputrc.
  24. That is going to be pretty damn tough to do...

    That is going to be pretty damn tough to do without the source code to the OS. What you need to understand is that these days, any worthy scanner uses specific characteristics of the IP implentation...
  25. SuSE is a fantastic distro, and Sun is steadily...

    SuSE is a fantastic distro, and Sun is steadily falling behind the curve compared to Linux. For large installations I really prefer Sun hardware over PC's because of OpenBoot and LightsOut and the...
Results 1 to 25 of 245
Page 1 of 10 1 2 3 4

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides