Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: TechGrunt; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.02 seconds.

  1. Replies
    22
    Views
    1,936

    I would also probably adjust the display...

    I would also probably adjust the display interface a little. Make the mouse point larger at least. Have just gone through something similar and one of the main problems these user had was locating...
  2. Replies
    12
    Views
    1,816

    A lot also depends upon what you are attempting...

    A lot also depends upon what you are attempting to achieve with encryption. If, as you post suggests, you are looking at encryption to prevent data retrieval after the hard drive has left your...
  3. Replies
    6
    Views
    1,014

    Hi there Sounds like a nasty scenario. 5768.. is...

    Hi there
    Sounds like a nasty scenario. 5768.. is very correct in the assessments he puts forward regarding the vulnerabilities you face. In short, physical access = compromise. Regardless of what...
  4. Replies
    3
    Views
    964

    US Rainbow Series

    Hi there
    Does anyone know of a location where I can find the US Rainbow series of documents. I am specifically after the Yellow and Orange books. The one site I am aware of
    ...
  5. Hi Nihil Sadly most things are more complicated...

    Hi Nihil
    Sadly most things are more complicated these days I suppose.

    The scenarios I proposed in the paper is as follows:
    Windows 2003 Standard Edition
    Pasword length of 7 characters
    Password...
  6. Hi Nihil Not looking for anything too specific...

    Hi Nihil
    Not looking for anything too specific here. What I am writing isn't specifically on password security just an element of a larger computer security paper. Ideally what I am after is a stat...
  7. Statistic on password cracking speed needed

    Hi everyone
    As part of a university assignment, I am in need of statistics on speed of password cracking software (ie number of passwords/second).

    I have googled and searched AO and the most I...
  8. Replies
    8
    Views
    2,414

    Always thought of the 8th layer as the...

    Always thought of the 8th layer as the "management" layer myself. The layer where most communications problems or disruptions exist. However the suggestion of politics sounds reasonable. How about...
  9. Replies
    19
    Views
    2,024

    Hi there Robo You can set it so that Windows XP...

    Hi there Robo
    You can set it so that Windows XP logs in automatically to a predetermined set of credentials (username and password) that are hard coded into the Windows registry.

    This article...
  10. Replies
    9
    Views
    1,815

    Hi there Guan-Di This isn't a magic fix for your...

    Hi there Guan-Di
    This isn't a magic fix for your problem, but it might help you along. The following are some links to resources for risk management. I have done some work with risk management in my...
  11. Replies
    17
    Views
    1,450

    Thanks for the responses everyone. Given me a bit...

    Thanks for the responses everyone. Given me a bit to go on

    Tek
  12. Replies
    17
    Views
    1,450

    Microsoft SQL and IIS on the same server

    Hi everyone
    I have heard this said by people in passing but am trying to confirm it. Are there any security issues with putting MS SQL 2000 on the same server as IIS (current version)? I have...
  13. Replies
    5
    Views
    719

    Thanks for trying Texan. You helped confirmed my...

    Thanks for trying Texan. You helped confirmed my nil result search. While not conclusively turning up a "no it can't be done" I think we have determined that it is something that hasn't yet been...
  14. Replies
    5
    Views
    719

    Spoofing GUIDs

    Hi everyone
    I have checked around on google and search this forum but can't find a specific reference to it (which could well be my answer), however this does seem at least theoretically possible.
    ...
  15. Replies
    12
    Views
    1,806

    Cabby80 has a good point here. I think...

    Cabby80 has a good point here. I think independance is important. You need to be separate from the business process, because ultimately security is something that will detract from business. Often...
  16. Replies
    12
    Views
    1,806

    Not impossible, just hard to implement. I work in...

    Not impossible, just hard to implement. I work in a large organisation that is currently looking at a self assessment program for certain aspects of ICT operations. However, the program also comes...
  17. Thread: Knoppix STD

    by TechGrunt
    Replies
    20
    Views
    2,811

    Check the link in the post from Trevoke. It gives...

    Check the link in the post from Trevoke. It gives you a list of download sites to a number of distros (Knoppix included).
  18. Thread: Knoppix STD

    by TechGrunt
    Replies
    20
    Views
    2,811

    Hey there pshannon If you are fairly new to...

    Hey there pshannon
    If you are fairly new to linux, some of the Knoppix STD tools will definately be a little hard to handle. However, as far as a distro designed for security goes, it is one of the...
  19. One disadvantage to using a thematic naming...

    One disadvantage to using a thematic naming schemes is it doesn't scale very well. It might work in the early stages of your network, but as time goes on you may run out of names. Also if you have...
  20. Replies
    17
    Views
    2,192

    You may also want to take an audit of permissions...

    You may also want to take an audit of permissions and users within your organisation. If you have someone deleting files there is a good chance they don't have a legitimate need or business...
  21. Got some more info (from the www.infowarrior.org...

    Got some more info (from the www.infowarrior.org list) on the event:

    http://www.schneier.com/blog/archives/2005/07/cisco_harasses.html

    And if you check the link you posted earlier you will find...
  22. Hear what you are saying here Infernon, but use...

    Hear what you are saying here Infernon, but use of an application like IM in the hands of generally users who don't realise the ramifications of what they are doing is not really good. I understand...
  23. I would think a big one would be the "house"...

    I would think a big one would be the "house" (company running the site) doesn't make good on winnings, disappears and sets themselves up again under a different name and does the same thing.

    You...
  24. Replies
    12
    Views
    1,607

    I agree with nihil. If you have an environment...

    I agree with nihil. If you have an environment where this is an issue, you need to look at a holistic solution to plug all holes. Also you need to essentially look for a balance of functionality of...
  25. Replies
    10
    Views
    1,443

    Hi genXer Sniffing traffic for login information...

    Hi genXer
    Sniffing traffic for login information really depends upon the type of system they are using. If they are using protocols that transmit the information in clear text (rather unlikely in...
Results 1 to 25 of 47
Page 1 of 2 1 2

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides