Type: Posts; User: iNViCTuS; Keyword(s):
Search took 0.04 seconds.
December 19th, 2003, 02:04 PM
Why is ti that nobody seems to have heard of Checkpoint?
They have been the market leader in enterprise firewall/VPN software for many years and have a great product. yes they are going into...
November 26th, 2003, 03:21 PM
Not if you configure your firewall correctly.
An access-list or firewall policy should be configured to expect certain IP addresses from certain interfaces. For example, if your firewall gets a...
October 24th, 2003, 02:53 PM
If it is an internship, they most likely will not be at all concerned with your technical skills. They will understand that you are essentially a "rookie" and have some learning to do. What they...
October 24th, 2003, 02:46 PM
a single * also is very common when the packet times out because it has to ARP for the IP address the first time. If you a traceroute back-to-back, does the second one do the same thing?
October 22nd, 2003, 02:58 PM
I have quite a bit of experience with the Neoteris IVE. let me know what specific info you are looking for and I will be glad to assist. Just to let you know in advance, we have been very happy...
October 14th, 2003, 02:29 PM
You do not need to buy a router for the CCNA exam. Unless of course you have extra money you want to spend.
There are plenty of good router sim apps available, and they would be much cheaper. ...
October 7th, 2003, 12:32 PM
Well...I think the previous post just about saysit all, but lets assume for a minute that you really do have root access and really do want the firewalls configs for auditing. Like I said before, I...
October 6th, 2003, 07:51 PM
The reason you can't do this as an unpriveleged user is because YOU ARE NOT SUPPOSED TO. Don't you think it would defeat the purpose of a security device, if the configs were not secured?
October 6th, 2003, 07:43 PM
Wow....I also had to join in on the laughs!!!
You should also read the advisory put out by ISS (http://xforce.iss.net/xforce/alerts/id/147). The Windows RPC/DCOM vulnerability also includes UDP...
September 2nd, 2003, 07:08 PM
I think there is a disconnect because I did not read the lesson :)
You are right that you can spoof a MAC address, but it is even easier to spoof an IP address. Also, my take on the address thing...
September 2nd, 2003, 06:57 PM
I see where you are going with this, but regardless, a multicast address is still an IP address....
September 2nd, 2003, 06:43 PM
"In order to communicate using TCP/IP each Host must have a unique IP address."
It must also have a unique MAC address. There are 2 possible answers to this question.
July 24th, 2003, 04:48 PM
The way it needs to be set up is as follows (assuming you are using DSL or Cable):
INTERNET----->DSL/CABLE MODEM----->HUB----->WIRELESS ROUTER----->LAN
July 23rd, 2003, 08:21 PM
Tell your ISP (or whoever is hosting your mail) to disable SMTP relaying, or configure it correctly. This should resolve the problem
July 23rd, 2003, 08:17 PM
This really has nothing to do with the router. The best way to do what you are trying to do, is to use a hub (not a switch) outside your router. You can then put a second interface in your IDS...
July 16th, 2003, 08:19 PM
first let me qualify my previous response by stating that I was referring to NAT as a 1-to-1 static translation and PAT as a many-to-1 translation.
to answer your question, NAT itself...
July 16th, 2003, 02:15 PM
I was a security consultant for several years, and to answer your question, no you don't have to know everything. Consulting definately exposes you to a wide range of environments and you will learn...
July 16th, 2003, 01:53 PM
While I would certainly agree that PAT (not NAT) does provide protection, I would not go so far as to say that it is a firewall or a replacement for a firewall. As defined in the RFC for NAT, the...
You may want to search the dictionary, or at the bare minimum take a lesson or two in english ;)
June 25th, 2003, 12:28 PM
Another argument to this is why use a RAS server and pay for toll calls when you can use an existing internet connection at no additional cost.
I also don't buy the argument that a everything...
June 23rd, 2003, 07:16 PM
A bit of advice.
Do not use shared folders from a dial-up connection....far too risky in my opinion. You may want to take a look at some time of VPN solution.
Having a dial-up connection to...
June 23rd, 2003, 07:13 PM
If there is no trojan detected from a virus scan (the obvious possibility), there also could be a chance that this user is in a position to sniff network traffic from your host. Are you on any kind...
June 23rd, 2003, 07:05 PM
try removing the file extension from the package when doing a rpm -e.
The best way to do this is to first run rpm -qa |grep synaptic*. This will show you the RPM package name as it is...
June 23rd, 2003, 07:01 PM
You can certainly connection multiple WAN connections with the use of a hub or switch, but the bigger question is how the Internet connections will be used. Are they both going to remain active...
netcat could be considered a trojan i guess, as stated in Lithium's post, but it can be used for many other legitimate purposes as well. I use it mainly for port redirection for outbound traffic...