Search:

Type: Posts; User: TechGrunt; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.02 seconds.

  1. Replies
    22
    Views
    14,355

    I would also probably adjust the display...

    I would also probably adjust the display interface a little. Make the mouse point larger at least. Have just gone through something similar and one of the main problems these user had was locating...
  2. Replies
    12
    Views
    10,834

    A lot also depends upon what you are attempting...

    A lot also depends upon what you are attempting to achieve with encryption. If, as you post suggests, you are looking at encryption to prevent data retrieval after the hard drive has left your...
  3. Replies
    6
    Views
    7,050

    Hi there Sounds like a nasty scenario. 5768.. is...

    Hi there
    Sounds like a nasty scenario. 5768.. is very correct in the assessments he puts forward regarding the vulnerabilities you face. In short, physical access = compromise. Regardless of what...
  4. Replies
    3
    Views
    5,808

    US Rainbow Series

    Hi there
    Does anyone know of a location where I can find the US Rainbow series of documents. I am specifically after the Yellow and Orange books. The one site I am aware of
    ...
  5. Hi Nihil Sadly most things are more complicated...

    Hi Nihil
    Sadly most things are more complicated these days I suppose.

    The scenarios I proposed in the paper is as follows:
    Windows 2003 Standard Edition
    Pasword length of 7 characters
    Password...
  6. Hi Nihil Not looking for anything too specific...

    Hi Nihil
    Not looking for anything too specific here. What I am writing isn't specifically on password security just an element of a larger computer security paper. Ideally what I am after is a stat...
  7. Statistic on password cracking speed needed

    Hi everyone
    As part of a university assignment, I am in need of statistics on speed of password cracking software (ie number of passwords/second).

    I have googled and searched AO and the most I...
  8. Replies
    8
    Views
    12,490

    Always thought of the 8th layer as the...

    Always thought of the 8th layer as the "management" layer myself. The layer where most communications problems or disruptions exist. However the suggestion of politics sounds reasonable. How about...
  9. Replies
    19
    Views
    11,456

    Hi there Robo You can set it so that Windows XP...

    Hi there Robo
    You can set it so that Windows XP logs in automatically to a predetermined set of credentials (username and password) that are hard coded into the Windows registry.

    This article...
  10. Replies
    9
    Views
    8,511

    Hi there Guan-Di This isn't a magic fix for your...

    Hi there Guan-Di
    This isn't a magic fix for your problem, but it might help you along. The following are some links to resources for risk management. I have done some work with risk management in my...
  11. Replies
    17
    Views
    11,909

    Thanks for the responses everyone. Given me a bit...

    Thanks for the responses everyone. Given me a bit to go on

    Tek
  12. Replies
    17
    Views
    11,909

    Microsoft SQL and IIS on the same server

    Hi everyone
    I have heard this said by people in passing but am trying to confirm it. Are there any security issues with putting MS SQL 2000 on the same server as IIS (current version)? I have...
  13. Replies
    5
    Views
    5,333

    Thanks for trying Texan. You helped confirmed my...

    Thanks for trying Texan. You helped confirmed my nil result search. While not conclusively turning up a "no it can't be done" I think we have determined that it is something that hasn't yet been...
  14. Replies
    5
    Views
    5,333

    Spoofing GUIDs

    Hi everyone
    I have checked around on google and search this forum but can't find a specific reference to it (which could well be my answer), however this does seem at least theoretically possible.
    ...
  15. Replies
    12
    Views
    15,344

    Cabby80 has a good point here. I think...

    Cabby80 has a good point here. I think independance is important. You need to be separate from the business process, because ultimately security is something that will detract from business. Often...
  16. Replies
    12
    Views
    15,344

    Not impossible, just hard to implement. I work in...

    Not impossible, just hard to implement. I work in a large organisation that is currently looking at a self assessment program for certain aspects of ICT operations. However, the program also comes...
  17. Thread: Knoppix STD

    by TechGrunt
    Replies
    20
    Views
    20,868

    Check the link in the post from Trevoke. It gives...

    Check the link in the post from Trevoke. It gives you a list of download sites to a number of distros (Knoppix included).
  18. Thread: Knoppix STD

    by TechGrunt
    Replies
    20
    Views
    20,868

    Hey there pshannon If you are fairly new to...

    Hey there pshannon
    If you are fairly new to linux, some of the Knoppix STD tools will definately be a little hard to handle. However, as far as a distro designed for security goes, it is one of the...
  19. One disadvantage to using a thematic naming...

    One disadvantage to using a thematic naming schemes is it doesn't scale very well. It might work in the early stages of your network, but as time goes on you may run out of names. Also if you have...
  20. Replies
    17
    Views
    12,813

    You may also want to take an audit of permissions...

    You may also want to take an audit of permissions and users within your organisation. If you have someone deleting files there is a good chance they don't have a legitimate need or business...
  21. Got some more info (from the www.infowarrior.org...

    Got some more info (from the www.infowarrior.org list) on the event:

    http://www.schneier.com/blog/archives/2005/07/cisco_harasses.html

    And if you check the link you posted earlier you will find...
  22. Replies
    8
    Views
    7,549

    Hear what you are saying here Infernon, but use...

    Hear what you are saying here Infernon, but use of an application like IM in the hands of generally users who don't realise the ramifications of what they are doing is not really good. I understand...
  23. I would think a big one would be the "house"...

    I would think a big one would be the "house" (company running the site) doesn't make good on winnings, disappears and sets themselves up again under a different name and does the same thing.

    You...
  24. Replies
    12
    Views
    11,907

    I agree with nihil. If you have an environment...

    I agree with nihil. If you have an environment where this is an issue, you need to look at a holistic solution to plug all holes. Also you need to essentially look for a balance of functionality of...
  25. Replies
    10
    Views
    9,317

    Hi genXer Sniffing traffic for login information...

    Hi genXer
    Sniffing traffic for login information really depends upon the type of system they are using. If they are using protocols that transmit the information in clear text (rather unlikely in...
Results 1 to 25 of 47
Page 1 of 2 1 2