Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: utahlanman; Keyword(s):

Search: Search took 0.01 seconds.

  1. Provided you've disabled remote management on the...

    Provided you've disabled remote management on the DSL/Cable router, and you're routinely updating your SyGate firewall & discontinue use of IE (as was just mentioned), I'd see no reason to replace...
  2. Replies
    8
    Views
    572

    Ensure that authentication is disabled (via...

    Ensure that authentication is disabled (via NWAdmin32). In addition, are you doing any type of NAT via the BorderManager solution? If not, you may need to implement your NAT rule to convert your...
  3. Replies
    5
    Views
    819

    Having been through and performed several audits,...

    Having been through and performed several audits, your recommendation should be something like:

    ICMP and ICMP echo will be disabled via the implementation of xxx filtering using xxx technology. We...
  4. Replies
    3
    Views
    541

    Looks like the site is in Korea. I've sent an...

    Looks like the site is in Korea. I've sent an email to the site owner indicating they have 3 days to resolve before authorities are contacted..

    We'll see what happens.
  5. Replies
    3
    Views
    541

    eBay Phishing Scam..

    Got this email today.. What a joke. If I wasn't in InfoSec, I'd be tempted to take their site down via nefarious means:

    ---



    Dear valued customer Need Help?
  6. Replies
    26
    Views
    1,691

    An alternative to logging into AD without...

    An alternative to logging into AD without installing Windows is to use VMWare and create a Windows VMSession with the appopriate config to authenticate to AD.

    At work, they use eDirectory...
  7. Replies
    11
    Views
    2,177

    I personally prefer PGP 8.1. I used the...

    I personally prefer PGP 8.1. I used the commercial version (paid for it). THe most useful component has to be the PGPDisk.. I've created a 6gb PGP Disk using a 4096 bit keylength.
  8. Replies
    29
    Views
    3,209

    Tiger.. To respond to the FTP questions: ...

    Tiger..

    To respond to the FTP questions:

    Yes, the FTP account(s) can be defined with rights to any portion of the filesystem (mount points).

    As to the level of access, there is no "admin"...
  9. Replies
    29
    Views
    3,209

    Both of you are still missing a basic point in...

    Both of you are still missing a basic point in the security of this server..

    Just by brute-forcing an FTP password does not provide 'root' equivalency. What was the transition from FTP to...
  10. Replies
    29
    Views
    3,209

    As an InfoSec consultant, I would tend to agree...

    As an InfoSec consultant, I would tend to agree that containing the incident now is probably the most prudent approach.

    However, with that being said - this individual obviously could use some...
  11. Replies
    29
    Views
    3,209

    I'm just curious how this person gained "root"...

    I'm just curious how this person gained "root" level access via your FTP site. Was some form of buffer-overflow exploited in addition to the FTP account brute-forcing? Also.. I assume you HAD to have...
  12. Replies
    15
    Views
    751

    You're not alone being half geek / half redneck....

    You're not alone being half geek / half redneck.

    While I'm certainly no redneck, I am an uber-geek, punctuated by massive
    weight lifting, duck/goose hunting and a huge amount of offroading (both...
  13. Replies
    0
    Views
    660

    Greetings from Utah!

    Just joined.. Living in grey/chilly Salt Lake City, Utah.

    InfoSec Consultant (for the moment) with Military background.
Results 1 to 13 of 13

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides