Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: lessthanzero; Keyword(s):

Page 1 of 5 1 2 3 4

Search: Search took 0.01 seconds.

  1. Replies
    9
    Views
    1,610

    re: VS8.0i new features

    @ric-o

    Are you using ePO to manage your AV deployment and subsequent updates (both DAT, engine, and component)? If not, NAI has two other options:

    1. Protection Pilot - think of this as a...
  2. re: MS purchase of Giant and Sunbelt CounterSpy

    What I find particularly interesting about this aquisition is the following link...pay attention to topic #2 - Microsoft:

    http://www.stusnews.com/

    Personally, I've been prototyping CounterySpy...
  3. Replies
    9
    Views
    1,610

    re: VS8.0i

    My experiences w/ VS8.0i are mixed, mostly due to the overwhelming let down of the integrated anti-spyware/adware module as a vialbe solution. Overall, I do like the newest version but sometimes I...
  4. Replies
    14
    Views
    1,621

    don't forget about snmp...

    if private and/or public are still configured as snmp-server community strings (or you know what the non-default configured string might be), then one can grab the configuration via snmp. I believe...
  5. Replies
    9
    Views
    803

    re: installing software...

    I agree with Tedob1...

    There's no need to edit the Registry manually to achieve your goal.

    You can use Local Policy, use Group Policy if you're in a network/domain, and the easiest/best method...
  6. re: AntiSniff

    First, I have to agree and echo Catch's statement. Data is most vulnerable whilst in transit. The most popular and efficient means of protecting data in transit is encryption.

    Secondly, I agree...
  7. Replies
    1
    Views
    454

    setup checklist

    There are so many variables to consider and variations from organization to organization, you'll be much better off to simply build your own matrix.

    My suggestions (and how I've built 'checklists'...
  8. Replies
    3
    Views
    418

    re: Linux as VMWare Guest

    Yes, it is completely and definitely possible. I, and many many other people, run Linux distros as Guest OS's. I run Slackware, Redhat (two different versions), and Gentoo as VMWare Guests.

    What...
  9. Replies
    11
    Views
    1,924

    re: Tomdaq

    They did - it is stated right in the documentation. In fact, there are 3 ways to run it...

    1. console (./msfconsole)
    2. commandl line
    3. web gui (./msfweb)

    On to the point of the thread...
    ...
  10. Thread: Ids

    by lessthanzero
    Replies
    5
    Views
    1,627

    re: Mac IDS

    here is a thread from Neohapsis which may give you the answer or at least some clues:

    http://archives.neohapsis.com/archives/sf/ids/2001-q2/0631.html

    Cheers,
    <0
  11. Replies
    2
    Views
    575

    re: securing linux

    Well, you can start by reading this:

    http://www.linuxsecurity.com/docs/LDP/Security-HOWTO/

    That should get you as far as understanding what goes into securing a linux host and take you through...
  12. Replies
    1
    Views
    573

    how about being more specific....

    What is the output from ifconfig (ifconfig eth0)?

    dmesg? Any specific errors here?

    What does 'redhat-config-network' show? Did you configure the network during the installation procudure?
    ...
  13. Replies
    2
    Views
    678

    re: DNS server

    I'm assuming that you're referring to running a DNS server yourself....

    depends on what OS the host machine is running:

    1. Windows - run the native DNS component.
    2. *Nix - BIND

    No cost...
  14. Replies
    5
    Views
    957

    re: applications and registry

    perhaps not exactly on topic, but you can also us EzClean, which is called Ashampoo now I believe, to track changes during an installation and/or uninstallation process. And not only can you track...
  15. Replies
    5
    Views
    889

    re: firewall hardware

    I'm biased for the Cisco PIX. I run a redundant 525 pair at my core edge and several 520's out in the field as remote VPN terminators.

    However, as others have pointed out, I believe any of the...
  16. Replies
    3
    Views
    1,089

    re: Kismet and wi-fi card

    Personally, I use a Orinoco Gold with my laptop and a ambicom CF with my sharp zaurus. Both were easy to get Kismet to work with and haven't had any issues since I purchased them.

    Cheers,
    <0
  17. Replies
    12
    Views
    1,196

    re: getting hit...?

    Sorry, but I have to ask to obvious question...

    Is there anyone else in your living space who might have used the machine? Brother, sister, mom, son, grandpa...etc.

    Also, have you checked any...
  18. Replies
    3
    Views
    523

    re: eye of god

    Indeed, very cool.

    I've always kinda dug this one:

    http://www.ne.jp/asahi/stellar/scenes/object_e/horse.htm

    reminds me of something out of a lovecraft story...perhaps 'at the mountains of...
  19. Replies
    5
    Views
    1,240

    re: Vorlin

    Thanks.

    That answers my question :)

    Cheers,
    <0
  20. Replies
    4
    Views
    1,118

    re: packet injection for Windows

    Not sure if Hping has a port but I know nemesis does...

    http://nemesis.sourceforge.net/

    Cheers,
    <0
  21. Replies
    5
    Views
    1,240

    re: what distro

    My question is distro neutral/generic.

    I'm just curious if 'Linux' logs a time and/or date change as a default behavior.
  22. Replies
    2
    Views
    1,119

    re: Security Warrior

    I actually almost purchased it a few weekends ago...

    Standing in line at the local Borders, I started to actually page through the book and look at details. To be honest, I didn't see anything...
  23. Replies
    5
    Views
    1,240

    does Linux log time/date changes?

    Thanks in advance to all who respond - it's been a long day and I'm not up to scouring google for my answer tonight (a quick initial search didn't yield any positive results) :)

    Simple question:...
  24. Replies
    4
    Views
    697

    re: VPN devices

    I've not used anything other than Cisco personally. Within that, I've only used routers and PIX firewalls- no Concentrators. But i've run the gamut of PIXes (515's, 520's, 525's) and routers...
  25. Replies
    4
    Views
    685

    re: NeuTron

    Safe from what? This is bad advice and makes assumptions that are not based in fact.

    The simple truth is that everyone is at some level of risk, irrespective of being corporate or a home user. As...
Results 1 to 25 of 105
Page 1 of 5 1 2 3 4