Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: organ; Keyword(s):

Search: Search took 0.02 seconds.

  1. Replies
    2
    Views
    1,065

    If I follow, you want to "fuzz" your PIX to test...

    If I follow, you want to "fuzz" your PIX to test for isakmp vulnerabilities. If so, you may be interested in the protos isakmp fuzzer. ...
  2. Replies
    3
    Views
    1,331

    In regards to port security, I have seen...

    In regards to port security, I have seen companies (or more commonly government agencies) go down the road of specifically defining the "secure MACs" for each port and only allowing those MACs. This...
  3. Very good questions, it looks like you are well...

    Very good questions, it looks like you are well on your way. Of course there is no single report that says "we are PCI compliant". If you find one, you'd be a rich man. :)
    What I refer to are...
  4. Don't get me wrong, a PCI audit is a time...

    Don't get me wrong, a PCI audit is a time consuming, costly, political, frustrating process but at the end of the day don't seem to truly increase security. At the size of business I work with,...
  5. Not too bad

    Maybe Im used to PCI (or what had been CISP) audits, but they aren't bad. Most of the PCI requirements are pretty common sense, and depending on how large of a processor you are dealing with the...
  6. Replies
    7
    Views
    1,285

    Sure there are firewalls with 4 interfaces, but...

    Sure there are firewalls with 4 interfaces, but my question is how you intend to address your routing issue? With two internet connections you are talking two default routes and two different ISP...
  7. Replies
    18
    Views
    4,047

    Ah crap. Don't I feel stupid replying to a 4...

    Ah crap. Don't I feel stupid replying to a 4 month old post. Sorry.
  8. Replies
    18
    Views
    4,047

    As Pecosian mention, this looks to be a standard...

    As Pecosian mention, this looks to be a standard assymetric encryption algorithm in the one-way function family:
    "Fy,n(X) =Y^X mod N"

    As most are probably aware, RSA and Diffie Hellman algorithms...
  9. Replies
    11
    Views
    1,904

    nmap MAC discovery?

    Perhaps I missed something, but how does one use NMAP to get MAC addresses remotely (ie when there is a router/layer 3 device between yourself and the scanned target)? If truly possible, that could...
  10. Replies
    12
    Views
    3,393

    netscreen?

    disregard, sorry.
Results 1 to 10 of 10

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides