Search:
Type: Posts; User: sgtrush; Keyword(s):
Search:
Search took 0.02 seconds.
-
August 11th, 2003, 08:54 PM
Interesting discussion, I have tested this exploit in a controlled environment. It is far too easy to get access. Their is a threat noone has discussed. Firewalling will keep the external threats...
-
July 16th, 2003, 02:46 PM
I expect the Linksys line to undergo some changes as they are now owned by Cisco.
http://newsroom.cisco.com/dlls/hd_032003.html Most SOHO firewalls do considerably more than just NAT, most have...
-
July 10th, 2003, 02:10 PM
Good tools, I use these for setting/reviewing baseline security on customers machines. I have some issues with hfnetchk.exe not being completely accurate but thats a small issue compared with the...
-
Its not freeware but look into spinrite. I used it many years ago, and apparently it is still available. Info should be at http://www.grc.com.
-
Arrghh, I missed the fact that the form action was a relative not the actual one. I have been beating my head on this for 3 days.
-
The best vulnerability tool I use. I wonder if updating the plugins will be as worthwhile as upgrading the program. Thanks for the heads up.
-
It may be a lil cheesey, but create a host record for www and point it at your webserver. I am sure there are better ways of doing it, but thats always worked for me.
-
I have had a similar problem at a number of sites. I finally broke down and instead of setting syslog up at the cli I did it through the Pixs' PDM web interface. Not sure what is different about...
-
June 25th, 2003, 07:04 PM
I am currently reading Counter Hack by Ed Skoudis. It is a good read, in that it takes many of todays common exploits and explains them in detail followed by the appropriate defense. He also has,...
-
June 20th, 2003, 06:22 PM
I have been reading Scene of the cybercrime, computer forensics handbook by debra littlejohn schinder. It goes into more than just procedures, but an overview of what is and isn't allowed as...
-
June 17th, 2003, 05:57 PM
Type "net help"
The list of available commands are listed for you. If you need help with the individual command type "net help <insert command here>"
Hope this helps.
-
June 17th, 2003, 04:23 PM
Doh, nice reply networker, I stand corrected. Those stats would give you a quick indication of overutilization. :)
-
June 17th, 2003, 03:32 PM
Detroit huh? Tell the Nuge I said Hi. Thanks for the help.
-
June 17th, 2003, 03:26 PM
Cisco's use of the acronym span stands for switch port analyzer, it is synonamous with other vendors use of the term "port mirroring". In essence it forwards a copy of all traffic seen on the...
-
June 17th, 2003, 03:04 PM
Your right it is his AD server. Makes me wonder if its normal behavior. I will have to check all my customers servers to see if that's a normal condition. It seems a bit much to me for a single...
-
June 17th, 2003, 02:58 PM
I have no comment on 9, but 10 is fairly valid. Spoofed IP addresses are basically blind attacks. The return packet is sent to the spoofed IP address. DDOS is usually the only use for a spoofed IP....
-
June 17th, 2003, 02:35 PM
Allow me to introduce myself. I am a Network Security Engineer working in the St. Louis metro area. I have been in the IT industry for 13 years or so. I can't believe I hadn't found this forum until...
-
June 17th, 2003, 02:26 PM
First some background.
Win2k server that was infected with the tk worm. I was able to remove the bot fairly easily, followed by speach no. 106 regarding the importance of virus protection and...
|
|