Search:

Type: Posts; User: DerekK; Keyword(s):

Page 1 of 8 1 2 3 4

Search: Search took 0.02 seconds.

  1. Replies
    2
    Views
    8,497

    Cryptography limitations in USA

    Hi,

    I'm responsible for network administration and security in an European company which has begun to open offices in USA. All our european sites are connected through a IPSec VPN. We use 3DES and...
  2. Replies
    6
    Views
    8,826

    BTW, what about untagged VLAN's, could you...

    BTW, what about untagged VLAN's, could you consider using that and propagating them via wired uplinks?
  3. Replies
    6
    Views
    8,826

    Ok, I know I'm not Picasso, but come on! ;) ...

    Ok, I know I'm not Picasso, but come on! ;)



    That's true... But I consider worst the over head of change wires everytime you change a rol of a server (if you are in a dinamyc environment).
    ...
  4. Replies
    6
    Views
    8,826

    Any thought?

    Any thought?
  5. Replies
    6
    Views
    8,826

    Hi, while Nelson it's probably right, that shows...

    Hi, while Nelson it's probably right, that shows me how bad I exposed my question. It may be my awful english :)

    I attach an image that I hope will help me to explain the issue. The small...
  6. Replies
    6
    Views
    8,826

    Tagged/Trunk VLAN DMZ?

    Hi, I'm planning a network which will have several networks connected through a Nokia IP Firewall. These networks are implemented on a 3com switches. Since the servers are distributed along several...
  7. Replies
    2
    Views
    8,963

    Audit file access on ext3 systems

    Hi all, I would like to know if is there any way to audit the last modification of a file in ext3. I know when was it thanks to stat, but, how could I know who was it?

    Thank you.
  8. Hi, few updates: - My reseller service sucks,...

    Hi, few updates:

    - My reseller service sucks, I'm working to change that but for now is how it is.
    - I think that finally I figured out whats wrong. Indeed it's impossible to install the...
  9. Replies
    4
    Views
    5,412

    Thank you Raiden. I guess then, that while for...

    Thank you Raiden. I guess then, that while for IPSec you need either a hardware equipment or a client software to establish a connection, with the SSL you don't? How do you connect then, I mean, how...
  10. Replies
    4
    Views
    5,412

    VPN: SSL vs. IPSEC

    Hi all, I've to start a VPN project and I was just wondering which are the pros and cons of both systems... Any thought?
  11. Installing checkpoint in a brand new Nokia IP390

    Hi all, we've just purchased a Nokia IP390 with Checkpoint License. I've been trying to install without success. The firewall it's flash-based but it has additional disk installed as well. My doubts...
  12. Replies
    5
    Views
    7,880

    I undesrtand that, but then you loose a lot of...

    I undesrtand that, but then you loose a lot of memory volume (1 GB flash vs 40 GB hdd). :confused:



    I still don't have a formal budget but you can check it out in froogle so you can have...
  13. Replies
    3
    Views
    10,899

    Re: Software Access Point

    Hi,

    You may want check this out.

    Regards.
  14. Replies
    5
    Views
    7,880

    Hi! Yes, I know, as I said I've been...

    Hi!



    Yes, I know, as I said I've been dealing with a IP110 Nokia Firewall until know. It had its own HDD so everyting was stored in the firewall.

    What I'm wondering now is hoe it works in a...
  15. Replies
    5
    Views
    7,880

    Let's go shopping: Nokia Firewalls

    Hi, I'm going to buy a Nokia Firewall. Actually, I'm plannig to buy two of them so I can build some kind of high avaibility cluster. My candidates are IP260 or IP265 or, if the budget allows it,...
  16. Replies
    1
    Views
    6,189

    NAT and ISA Server 2004

    Hi all. I've here really weird configuration I must deal with. The thing is that I must quick replace a Checkpoint/NOKIA device which is actually dying (I had cars which sounds less than this hard...
  17. Thread: SPAM methods

    by DerekK
    Replies
    14
    Views
    10,638

    Hi! Thank you very much for your answers. Now I'm...

    Hi! Thank you very much for your answers. Now I'm quite close to undertand it :)

    I can see the relation between "cid " tag and the image embedded on the message, this is from the headers of the...
  18. Thread: SPAM methods

    by DerekK
    Replies
    14
    Views
    10,638

    Really interesting, but... what's the actual...

    Really interesting, but... what's the actual mechanism for that, I mean, I can't see any web address on the img tag. What's the meaning of cid??
  19. Thread: SPAM methods

    by DerekK
    Replies
    14
    Views
    10,638

    Ok, here it is then. I receive one each day,...

    Ok, here it is then.

    I receive one each day, from different hosts. We purge around 2000 spam/virus messages every day, and this ones are the only I receive. They look like an embedded image with...
  20. Thread: SPAM methods

    by DerekK
    Replies
    14
    Views
    10,638

    SPAM methods

    Hi all,

    we've been receiving very anoning spam email messages in our company lately and our filters doesn't seem to work with them.

    I've been investigating a little and I would like to discuss...
  21. Replies
    5
    Views
    6,014

    Indeed that was the command! What I want to do...

    Indeed that was the command!

    What I want to do is not to set an expiring password policy but force the user to set a proper password the first time he/she logs in. After some man reading (it isn't...
  22. Replies
    5
    Views
    6,014

    Hi, thank you for the answer. I found this...

    Hi, thank you for the answer.

    I found this "-e" googling but it doesn't work for fedora :confused:

    Any suggestion?
  23. Replies
    5
    Views
    6,014

    Forcing users to change their passwords

    I guess that I'm not the first who ask that but i didn't found anything.

    I'm running FC 3 and I would like to create a user account that forces the user to change his/her password the first time...
  24. Thread: Is NLB secure?

    by DerekK
    Replies
    19
    Views
    9,781

    As far as I know (is that expression correct?)...

    As far as I know (is that expression correct?) nobody...

    I dont know very much english but I'm pretty sure that



    the if its conditional ;)

    Forget it, probably it was too early to write...
  25. Thread: Is NLB secure?

    by DerekK
    Replies
    19
    Views
    9,781

    Since we're using SSL of course I was only able...

    Since we're using SSL of course I was only able to see the headers, but I was wondering what could happen I we didn't use it. Could you imagine someone in that circumstances download CAIN? ;)
    ...
Results 1 to 25 of 177
Page 1 of 8 1 2 3 4