Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: iNViCTuS; Keyword(s):

Page 1 of 19 1 2 3 4

Search: Search took 0.03 seconds.

  1. Replies
    7
    Views
    1,125

    Why is ti that nobody seems to have heard of...

    Why is ti that nobody seems to have heard of Checkpoint?

    They have been the market leader in enterprise firewall/VPN software for many years and have a great product. yes they are going into...
  2. Replies
    10
    Views
    3,948

    Not if you configure your firewall correctly. ...

    Not if you configure your firewall correctly.

    An access-list or firewall policy should be configured to expect certain IP addresses from certain interfaces. For example, if your firewall gets a...
  3. Replies
    4
    Views
    1,751

    If it is an internship, they most likely will not...

    If it is an internship, they most likely will not be at all concerned with your technical skills. They will understand that you are essentially a "rookie" and have some learning to do. What they...
  4. Replies
    8
    Views
    805

    a single * also is very common when the packet...

    a single * also is very common when the packet times out because it has to ARP for the IP address the first time. If you a traceroute back-to-back, does the second one do the same thing?
  5. Replies
    7
    Views
    647

    I have quite a bit of experience with the...

    I have quite a bit of experience with the Neoteris IVE. let me know what specific info you are looking for and I will be glad to assist. Just to let you know in advance, we have been very happy...
  6. Replies
    16
    Views
    2,035

    You do not need to buy a router for the CCNA...

    You do not need to buy a router for the CCNA exam. Unless of course you have extra money you want to spend.

    There are plenty of good router sim apps available, and they would be much cheaper. ...
  7. Replies
    10
    Views
    1,578

    Well...I think the previous post just about...

    Well...I think the previous post just about saysit all, but lets assume for a minute that you really do have root access and really do want the firewalls configs for auditing. Like I said before, I...
  8. Replies
    10
    Views
    1,578

    The reason you can't do this as an unpriveleged...

    The reason you can't do this as an unpriveleged user is because YOU ARE NOT SUPPOSED TO. Don't you think it would defeat the purpose of a security device, if the configs were not secured?

    If you...
  9. Replies
    16
    Views
    4,133

    Wow....I also had to join in on the laughs!!! ...

    Wow....I also had to join in on the laughs!!!

    You should also read the advisory put out by ISS (http://xforce.iss.net/xforce/alerts/id/147). The Windows RPC/DCOM vulnerability also includes UDP...
  10. Replies
    9
    Views
    1,306

    I think there is a disconnect because I did not...

    I think there is a disconnect because I did not read the lesson :)

    You are right that you can spoof a MAC address, but it is even easier to spoof an IP address. Also, my take on the address thing...
  11. Replies
    9
    Views
    1,306

    I see where you are going with this, but...

    I see where you are going with this, but regardless, a multicast address is still an IP address....
  12. Replies
    9
    Views
    1,306

    Question #11 "In order to communicate using...

    Question #11

    "In order to communicate using TCP/IP each Host must have a unique IP address."

    It must also have a unique MAC address. There are 2 possible answers to this question.

    An IP...
  13. Replies
    8
    Views
    829

    The way it needs to be set up is as follows...

    The way it needs to be set up is as follows (assuming you are using DSL or Cable):

    INTERNET----->DSL/CABLE MODEM----->HUB----->WIRELESS ROUTER----->LAN
  14. Replies
    6
    Views
    1,238

    Tell your ISP (or whoever is hosting your mail)...

    Tell your ISP (or whoever is hosting your mail) to disable SMTP relaying, or configure it correctly. This should resolve the problem
  15. Replies
    8
    Views
    829

    This really has nothing to do with the router. ...

    This really has nothing to do with the router. The best way to do what you are trying to do, is to use a hub (not a switch) outside your router. You can then put a second interface in your IDS...
  16. Thread: Nat

    by iNViCTuS
    Replies
    19
    Views
    1,281

    ammo, first let me qualify my previous...

    ammo,

    first let me qualify my previous response by stating that I was referring to NAT as a 1-to-1 static translation and PAT as a many-to-1 translation.

    to answer your question, NAT itself...
  17. Replies
    3
    Views
    704

    I was a security consultant for several years,...

    I was a security consultant for several years, and to answer your question, no you don't have to know everything. Consulting definately exposes you to a wide range of environments and you will learn...
  18. Thread: Nat

    by iNViCTuS
    Replies
    19
    Views
    1,281

    While I would certainly agree that PAT (not NAT)...

    While I would certainly agree that PAT (not NAT) does provide protection, I would not go so far as to say that it is a firewall or a replacement for a firewall. As defined in the RFC for NAT, the...
  19. Thread: Firewall

    by iNViCTuS
    Replies
    8
    Views
    922

    You may want to search the dictionary, or at the...

    You may want to search the dictionary, or at the bare minimum take a lesson or two in english ;)
  20. Replies
    12
    Views
    1,119

    Another argument to this is why use a RAS server...

    Another argument to this is why use a RAS server and pay for toll calls when you can use an existing internet connection at no additional cost.

    I also don't buy the argument that a everything...
  21. Replies
    12
    Views
    1,119

    A bit of advice. Do not use shared folders...

    A bit of advice.

    Do not use shared folders from a dial-up connection....far too risky in my opinion. You may want to take a look at some time of VPN solution.

    Having a dial-up connection to...
  22. Replies
    12
    Views
    1,361

    If there is no trojan detected from a virus scan...

    If there is no trojan detected from a virus scan (the obvious possibility), there also could be a chance that this user is in a position to sniff network traffic from your host. Are you on any kind...
  23. Thread: RPM problem

    by iNViCTuS
    Replies
    9
    Views
    1,413

    try removing the file extension from the package...

    try removing the file extension from the package when doing a rpm -e.

    The best way to do this is to first run rpm -qa |grep synaptic*. This will show you the RPM package name as it is...
  24. Replies
    10
    Views
    2,243

    You can certainly connection multiple WAN...

    You can certainly connection multiple WAN connections with the use of a hub or switch, but the bigger question is how the Internet connections will be used. Are they both going to remain active...
  25. Replies
    4
    Views
    1,244

    netcat could be considered a trojan i guess, as...

    netcat could be considered a trojan i guess, as stated in Lithium's post, but it can be used for many other legitimate purposes as well. I use it mainly for port redirection for outbound traffic...
Results 1 to 25 of 462
Page 1 of 19 1 2 3 4