Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: jadetiger; Keyword(s):

Search: Search took 0.01 seconds.

  1. Replies
    4
    Views
    1,188

    I have had the same problem on different...

    I have had the same problem on different distributions with sendmail doing that, and I have found that the delay occurs when sendmail is trying to figure out (resolve) the domain name. In the...
  2. Replies
    23
    Views
    1,493

    http://www.overstock.com, i picked up two...

    http://www.overstock.com, i picked up two emachines for my kids for less than 600.00 all day. The more you buy the bigger the discount you get.
  3. Replies
    9
    Views
    846

    Do Redhat 7.3 atleast, 7.2 if you will be using...

    Do Redhat 7.3 atleast, 7.2 if you will be using wireless, since 7.3's support of wireless is nil. Go to 9.0 if at all possible, it is great...except for some PERL module compliation problems.
  4. Thread: Ip scanners

    by jadetiger
    Replies
    23
    Views
    2,062

    Still, I would like to know how the guy knows...

    Still, I would like to know how the guy knows he's been hacked. What operating system and what were the symptoms that he drew the conclusion that he had been hacked. I have so many people ask...
  5. In my corporate environment I use ethtereal for...

    In my corporate environment I use ethtereal for packet sniffing, and started with ISO17799 (BS7799 in UK) as the starting point for considering what Security Policies I wanted to initially define. I...
  6. Replies
    44
    Views
    3,046

    It depends on what you have on that machine, do...

    It depends on what you have on that machine, do you have something other than the event log that would record traffic/connections to your machine? If not you should install something like the win32...
  7. Replies
    50
    Views
    4,377

    One reason for keeping the IP private would be if...

    One reason for keeping the IP private would be if you're running an exchange server and you have stealth DNS configured and you don't want outsiders to figure out your only WAN facing IP. Many small...
  8. Thread: Server ?

    by jadetiger
    Replies
    14
    Views
    1,330

    On http://www.linuxiso.org/ you might look at the...

    On http://www.linuxiso.org/ you might look at the SME server. I have three servers, 1 RedHat 9.0 (testing on a laptop), 2 RedHat 7.3, and one SME 5.5 (Counter Strike Server). I have found the...
  9. Replies
    44
    Views
    3,046

    Not to thread jack, but why do you have to spread...

    Not to thread jack, but why do you have to spread them around, its like a "politicly correct" thing to do, when points should be used to indicate the worthiness of a topic, or a reply.
  10. Replies
    0
    Views
    537

    Somewhere I belong

    ::angel2:: Tired of fark.com, looking for a more worthy community and decided to settle here. Looking to share knoweledge and find some good code.
  11. Replies
    6
    Views
    1,193

    I would recommend using Accessdata's FTK...

    I would recommend using Accessdata's FTK (Forensic Toolkit) at http://www.accessdata.com/Product04_Overview.htm?ProductNum=04 which is expensive, but cheaper than their competitor. I purchased the...
Results 1 to 11 of 11

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides