Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: z0mbi3; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.01 seconds.

  1. Thread: UDP port 1189

    by z0mbi3
    Replies
    1
    Views
    1,280

    UDP port 1189

    Recently I've been seeing a lot of UDP port 1189 probes to my workstation agent from various unrelated IP addresses. This activity looks like filesharing or maybe a new trojan. The port is listed as...
  2. Replies
    6
    Views
    1,193

    New unidentified trojan

    Check out the following articles. Does anybody have any idea when or what this new virus is?

    http://www.eweek.com/article2/0,3959,1130754,00.asp -New Trojan...
  3. Thread: Kuang2

    by z0mbi3
    Replies
    4
    Views
    1,863

    Kuang2

    I've recently noticed a large increase in Kuang2 port probes against my network. I done my research and it seems that more people that just myself are expericencing this increase in port 17300...
  4. Replies
    1
    Views
    656

    Checkpoint Management Client

    Can Windows XP support the Checkpoint Management Client(GUI)?
  5. Replies
    3
    Views
    487

    Novice apache permisions question

    I believe there are two (if not more) levels of permission to run apache under. I think one is equivalent to anonymous or a very restricted user. I think the other is equivalent to root, running...
  6. Thread: A+

    by z0mbi3
    Replies
    16
    Views
    1,905

    One thing I have to say about the A+ exam is that...

    One thing I have to say about the A+ exam is that its really not a measure of how much you know but of how well you can study.
  7. Replies
    1
    Views
    930

    Searching through ethereal

    Does anyone know the filter to use to search for a string of characters in the Ethereal data view pane?
  8. Replies
    2
    Views
    838

    Has anyone tried this out yet? I'm on question...

    Has anyone tried this out yet? I'm on question number 7 and seem to be stuck. What exactly am I looking for that would indicate part of a botnet?
  9. Replies
    1
    Views
    812

    If anyone cares, here's the article detailing...

    If anyone cares, here's the article detailing how.
    http://support.microsoft.com/default.aspx?scid=kb;en-us;216482
  10. Replies
    1
    Views
    812

    Disabling weak ciphers on IIS

    How do you disable weak SSLv3 & TSLv1 ciphers on IIS 5.0 server?
  11. Replies
    34
    Views
    2,903

    There is absolutely no way that this person...

    There is absolutely no way that this person worked for your ISP. Nobody from your ISP would identify themselves as a CCNP, how stupid. Most likely they are the person you were having trouble with...
  12. Replies
    2
    Views
    1,444

    here you go ...

    here you go

    http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=22029
  13. Replies
    2
    Views
    1,444

    WebDav Remote IIS Vulnerability exploit

    I've just seen the vulnerability warning and am curious if anyone knows where I could find the tool ISS or CERT talks about, or even the source code would be great, I'd be very thankful. I don't...
  14. Help me understand what Citrix does & how to secure it

    Recently I heard about a service called Citrix. I did some research about this and basically my understanding of this is a centralized management system for allowing access to applications on a...
  15. Replies
    1
    Views
    599

    Denying telnet access to Cisco routers

    Does anybody know the command to deny all telnet access to a router? I know how to specify it in the access list but I've heard that theres a simple command.
  16. Replies
    5
    Views
    827

    What's a red disk?

    Has anybody heard the term "red disk"? If so do you know what it means? I'm guessing it has something to do with hacking a Windows box if you have physical access but I really don't know if thats...
  17. Replies
    4
    Views
    1,176

    All reserved subnets???

    I'm looking for a complete list of all the reserved subnets. I know about
    10.0.0.0 - 10.255.255.255
    172.16.0.0 - 172.31.255.255
    192.168.0.0 - 192.168.255.255
    but I know...
  18. Thread: port 2417

    by z0mbi3
    Replies
    4
    Views
    862

    I know where its coming from but I need to know...

    I know where its coming from but I need to know why and what it does.
  19. Thread: port 2417

    by z0mbi3
    Replies
    4
    Views
    862

    port 2417

    I've noticed that lately I've been getting a lot of port probes directed at port 2417. I did some research and found out that it was Composit Server. I can't seem to find any sources on what this...
  20. Replies
    9
    Views
    852

    Thank you very much for this. I am taking my...

    Thank you very much for this. I am taking my Security+ tommorrow.
  21. Thread: Telnet abuse

    by z0mbi3
    Replies
    5
    Views
    1,311

    Telnet abuse

    I know you can telnet to SMTP, POP, IMAP, and FTP, send mail, download mail and download files with these services. I know this is a security concern and there are several ways to protect this from...
  22. Replies
    1
    Views
    457

    Obtaining Solaris

    Perhaps you guys could help me out. I've just got my Linux basics down and would now like to start playing around with Solaris x86. Peferrably 8 or 9. I know that Sun used to allow the download...
  23. Replies
    9
    Views
    1,510

    In order to correctly spoof an IP address you...

    In order to correctly spoof an IP address you must not only use the -P0 option but you must also specify what interface you are you using. Like so:


    nmap -sS -e eth0 -P0 -S 255.255.255.255...
  24. Replies
    4
    Views
    1,214

    The reason I want to find known vulnerabilities...

    The reason I want to find known vulnerabilities with the program is because I am a jr security analyst at a security consulting firm. We are doing an asessment for a client who uses this program and...
  25. Replies
    4
    Views
    1,214

    Netilla vulnerabilities

    Is anyone one aware of any vulnerabilities for the Netilla program? Not the Gnutella file sharing program but the alternative VPN solution. Any default passwords or any other known weaknesses would...
Results 1 to 25 of 26
Page 1 of 2 1 2