Search:
Type: Posts; User: bArGuS_4_$; Keyword(s):
Search:
Search took 0.01 seconds.
-
September 12th, 2002, 02:42 PM
I would be curious if you have a URL to find more information on the exam. I am a little wrapped up with some SANS certs right now, however I would be interested in seeing more on this cert.
-
September 11th, 2002, 03:30 PM
W32.Chet@mm
Discovered on: September 10, 2002
Last Updated on: September 10, 2002 08:20:55 PM PDT
-
September 9th, 2002, 11:03 PM
I arrived at work and a co-worker told me that a plane hit the first tower. Then I watched as the second tower was hit on a computer hooked up to pick up tv channels. I work at a technical support...
-
September 9th, 2002, 10:56 PM
Windows 2000 DNS is actually fairly simple to set-up and configure. Quicker than Solaris (although I prefer Solaris personally) I set-up one of my training rooms with 3 MSE machines in two domains...
-
September 9th, 2002, 10:17 PM
Not to be an intigator but maybe he wanted to start an energy plant utilizing nuculear materials. After all they are being embargoed from heck.
We know he gassed those people and did the acid...
-
September 9th, 2002, 04:37 PM
I think that the positive effects were only seen in a small number of people, realizing they were not as safe as they previously thought and allowing them to change their lifestyle a little bit.
...
-
September 9th, 2002, 04:18 PM
my new desktop!! That rocks
-
September 9th, 2002, 03:52 PM
Where did it find the virus? Directory location if you do not mind. Did it locate the virus in any other places?
If it found the virus in an old directory, a manual scan does not report the...
-
September 9th, 2002, 03:26 PM
If you do not mind, what is the directory where the malicious code is being found?
-
September 9th, 2002, 02:58 PM
I like everything but the Zoo.... Way to go..
-
September 9th, 2002, 02:56 PM
kadeng stated that Email Server scanning would only catch common mail viruses. I think you may have over simplified and generalized this a bit. If a reputable virus scanning program is implemented...
-
September 7th, 2002, 06:23 PM
Submit the file to sn AV company. If you have a test box, throw up some monitoring utilities and let it infect and see what's going on. Then develop removal instructions on that.
Disclaimer: ...
-
September 7th, 2002, 06:20 PM
Detox is absolutely right about the capabilities of heuristics. They are not as effective as advertised and can lead to many more false detections that actual detections. They often lead to a waste...
-
September 6th, 2002, 10:51 PM
I would say that most AV systems will look at the first 32 bits of code on a document to see if it matches a known virus signature and if not then they will apply some form of heuristics.
...
-
September 6th, 2002, 10:38 PM
It is a totally different environment over there. Iraqi people and their culture seems totally different. Check out this site if you do not believe me. Different values and beliefs. According to...
-
September 6th, 2002, 09:52 PM
I suggest if your randomly going to open files...Due it on a test machine for which you have imaged so that if you get stuck you can reimage it. Also, make sure it is on a service network so that...
-
September 6th, 2002, 09:20 PM
You may want to set up a Honey Pot to find out if another machine is hosting Sircam. Sircam is a worm and thus can propagate itself. It may be accessing a share or going through a known security...
-
September 6th, 2002, 09:10 PM
You may want to look into another Mailer AV program as well. If you are an ISP that is using something similiar to MSE 5.5 or 2k or something along that lines, you should be able to find an AV that...
-
September 6th, 2002, 09:05 PM
Not to be annoying or anything...may I recommend that if you suspect a trojan or unathorized internet access try a netstat -an see what is going on and who is holding the ports open. Research those...
-
September 6th, 2002, 09:01 PM
AV Companies will not intentionally attempt to prevent another software company (legitamate) from selling or distributing a product.
With that in mind.
If you knew what ISpy did, and they...
-
September 6th, 2002, 08:55 PM
Most AV companies will not touch the Commercial Spy software. Reason--Because you purchase it knowing what your getting into. You installed it knowing what it was, therefore it was not a malicious...
-
September 6th, 2002, 08:50 PM
In todays paridigm it is necessary to offer multiple tiers of AV and Intrusion Protection. A company that makes you pay for this "Feature" should be considered shady, as this would seem to violate...
-
September 6th, 2002, 08:44 PM
Klez.E and any other worm is always very difficult to remove from a network environment. Your IRT (Incident Response Team) needs to react fast and decisive to eliminate the threat. If only one node...
-
September 6th, 2002, 08:39 PM
Sounds like that would not be a good thing to occur. You very well may have been hacked or Trojaned. Task Manager should not request a socket. It is used to schedule a program or task to run, and...
-
September 6th, 2002, 08:34 PM
Personal Opinion on NT 4.0 AV would be Symantec Anti-Virus Corporate Edition 8.0. It has package rollout capabilities, Central Management (meaning scalable) and it incorporates Heuristics with...
|
|