Search:
Type: Posts; User: brichards99; Keyword(s):
Search:
Search took 0.04 seconds.
-
January 17th, 2005, 07:23 PM
Zencoder,
You're absolutely right, particularly in your final comments, about scrutinizing my requirements. The development process I'm using right now however is to find the answer to the...
-
January 17th, 2005, 03:47 PM
I administer a small LAN for my company and right now we have a nice little wireless setup that clients and co-workers can access using a simple WEP key. This is nice and all, but I'm not as...
-
January 12th, 2005, 06:53 PM
There is also a product called Winstall, which I believe is from Veritas. There was a working demo version of it on the Windows Server 2000 CD-ROM, under the VALUEADD directory, I think. I'd have...
-
January 12th, 2005, 06:43 PM
The main task is to simplify the construction of the antenna itself, using one of the plans below, for example:
The not-so-cheap route would be to get a kit from cantenna.com.
Even cheaper,...
-
November 23rd, 2004, 02:29 PM
The trouble I have with this issue is that these companies are willingling and enthsiastically getting into the business of identity management. Why would they bother? What's their incentive? And...
-
November 23rd, 2004, 02:25 PM
Proceed carefully and with much planning with that Console installation. I've managed Symantec Corporate on a couple of networks, and the only thing that seems botch-able is the console. Once it's...
-
November 19th, 2004, 03:55 PM
Bah. Who needs an English version? Just do a spouse-mode installation (just say yes, dear everytime it looks like there's a button that should be clicked), and the actual tools are all...
-
November 18th, 2004, 08:02 PM
Okay, I'm in favor of this, and here's why: I get way too many people asking me for help with their popup problems, and here's a fun little utility I can throw at them that simplifies my shopping...
-
September 14th, 2004, 01:46 PM
Absolutely right, Pooh --
A honeypot is a simple concept, but only so much as 'programming' is a simple concept, or 'security' is a simple concept. A honeypot is a tool used to achieve a specific...
-
June 23rd, 2004, 01:09 PM
I've had similar frustrations with establishing very simple VPN connections, and my recommendation is to apply Occam's razor here: the simplest explanation is most likely to be the correct one.
...
-
The answer to your question 'am I too paranoid' is yes, although that's not necessarily a bad thing.
This kind of a situation depends a lot on the size of the network, the resources at risk, and...
-
Because not a lot of firewall products are configured to block traffic based on whether it's dirty or may corrupt the minds of youth. Just if it'll fondle your Windows Messenger service.
In...
-
(Getting the impression that none of us has done this in a long time, which is probably a good thing.)
Isn't file and print sharing a component of Windows 98 that is not always installed by...
-
First of all, avoid software firewalls as much as possible if you are able to use a hardware one. It's just not worth this system resources.
You might want to check the documentation on that...
-
Tiger Shark has a very good point about it being his network to run scans against at will. For you up and coming network admins keep that in mind -- know what you're doing as best you can (so you...
-
Another way of describing a spider is to think of it as a specific piece of software designed to find exactly this kind of vulnerability in your site. In other words, a spider can be a...
-
I administer my DMZ as a seperate network, with a seperate interface on the firewall and its own network policy. It is not a border, just a different subnet with its own physical topology that makes...
-
<ears perked>
What VPN software are you referring to? I'm getting kind of sick of my VPN being really expensive and very dull.
-
This is a nice idea and all, and if I could ever get my SMS to behave like it ought to I might be more inclined to like my server automating security updates. But I just can't help but think, can't...
-
I have to pipe in about that last post.
I agree!
I used to work for a really big university, and so performing vulernability assessments was a big, fun project. I mean, at a unversity you have...
-
I'm impressed that you have both a short and a long version of the terms and conditions for the site . . .
I just ran a quick exodus analysis of the site and it seems pretty stable. The weak...
-
Within Windows you can either crank down the NIC's speed by configuring the advanced properties of the network connection (although this really just lets you set a 10/100 card at 10) or you can...
-
If you're going to have this network on the Internet, you should have a firewall no matter what. The lucky thing is that a number of wired and wireless routers have firewall or firewall-like...
-
Yep -- I do in fact have access to one external address enabled on my PIX, but I should have modified the line to show an internal interface before posting it here.
In general I recommend closely...
-
I run a PIX 515 and I can't tell you how handy that web-based administration tool is. It's called the PDM (PIX Device Manager) and it does require that you configure the firewall to permit your IP...
|
|