Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: t3gilligan; Keyword(s):

Search: Search took 0.02 seconds.

  1. Replies
    6
    Views
    4,714

    We currently use Checkpoint's Pointsec product. ...

    We currently use Checkpoint's Pointsec product. I have mixed feelings about Pointsec. I think it is all around a great product, but a little difficult to manage. It works on quite a few different...
  2. Replies
    3
    Views
    1,754

    I really Don't see this happening to every...

    I really Don't see this happening to every machine. Especially for some time. I think there are a number of pitfalls for this type of Full Disk Encryption solution that need to be resolved first....
  3. Replies
    1
    Views
    565

    Workstation/Server Monitoring

    Does anyone have any suggestions for good workstation/server monitoring software. I am in need of a utility that monitors all of my users at all times, records what they are accessing, what they are...
  4. Replies
    3
    Views
    1,225

    thank you guys

    THanks guys!! The problem was the comma.
  5. Replies
    1
    Views
    959

    automating sshd2_config user creation

    I don't know if this is within the scope of this group, but I have a problem that has been nagging me for some time. I am by no means an excellent programmer, but I get by... I have created a...
  6. Replies
    3
    Views
    1,225

    moving files accross network with Perl

    I am relatively new at this, but here is the situation. I have a group of recordings at point A on our network (windows 2000 server box). They are placed there by a verification division after...
  7. Replies
    5
    Views
    854

    thank you both

    I tried both ideas, booting in safe mode, and running cws shredder. It seems to have worked beautifully. Thank you both
  8. Replies
    5
    Views
    854

    Ok Thx, I'll give those ideas a try, and post...

    Ok Thx, I'll give those ideas a try, and post back on the results
  9. Replies
    5
    Views
    854

    spyware nightmare

    I have been working on a spyware problem with a windows 2000 machine. I am at the end of my rope, and am out of Idea's. I have run adaware, pest patrol, spy bot, I've used msconfig to halt the...
  10. Replies
    1
    Views
    714

    email question

    I have a user who works with 2 different buisnesses. He needs to recieve his email at both locations, from both locations. The problem is, I do not trust his other buisness, as they are overidden...
  11. Replies
    18
    Views
    3,266

    sweet angel thank you so much for the root kit...

    sweet angel thank you so much for the root kit check. Thank all of you for your help. I am a fairly decent learner, but sometimes need to be pointed in the right direction. You're all great. Thx
  12. Replies
    18
    Views
    3,266

    That will be very usefull, I use slack at home. ...

    That will be very usefull, I use slack at home. Thank you
  13. Replies
    18
    Views
    3,266

    thank you msmittens, I am familiar with the...

    thank you msmittens, I am familiar with the securing linux document on tldp, but do you know of any other current helpful documents that focus on linux security.
  14. Replies
    18
    Views
    3,266

    Hacked Red Hat 7.3

    I have a Red Hat 7.3 server, and I have just noticed after reviewing log files that someone has obtained root access to my server. I have an ip address, and changed the root password. I have also...
  15. Replies
    28
    Views
    4,494

    I'm comfortable with most anything. I'm fairly...

    I'm comfortable with most anything. I'm fairly knowledgable, however, I've run linux for about 5-6 years so I dont often run across a lot of windows problems, expecially when dealing with...
  16. Replies
    28
    Views
    4,494

    It is running windows 2000. I also noticed the...

    It is running windows 2000. I also noticed the kernel was taking up the 30 percent cpu usage when idle. So I dont know if the cpu usage problem is actually due to spyware. The computer has a lot...
  17. Replies
    28
    Views
    4,494

    running processes

    these are the running processes

    C:\WINNT\System32\smss.exe
    C:\WINNT\system32\winlogon.exe
    C:\WINNT\system32\services.exe
    C:\WINNT\system32\lsass.exe
    C:\WINNT\system32\svchost.exe...
  18. Replies
    28
    Views
    4,494

    spyware killing me

    I am having an incredibly hard time getting rid of my spyware problem. My processor is running at 30 percent when idle, and I have purchased the professional version of adaware. Adaware has always...
  19. Replies
    7
    Views
    829

    thank you

    Thank you all very much!!
  20. Replies
    7
    Views
    829

    good packet sniffer

    I'm looking for a good packet sniffer, does anyone have any suggestions? I would prefer a free packet sniffer, but am willing to pay also. Thank you
  21. Replies
    27
    Views
    1,849

    thank you phishphreek80, i appreciate it. I...

    thank you phishphreek80, i appreciate it. I found what I am looking for.
  22. Replies
    27
    Views
    1,849

    I am sorry, it is they that dont care about...

    I am sorry, it is they that dont care about network security.
  23. Replies
    27
    Views
    1,849

    pitching network security

    I am a network admin looking for articles or text files stressing the extreme importance of security. I am running into a huge problem people over me not caring about network or system security. I...
Results 1 to 23 of 23