Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: Sgt_B; Keyword(s):

Page 1 of 8 1 2 3 4

Search: Search took 0.02 seconds.

  1. Replies
    9
    Views
    903

    NMAP - www.insecure.org Nessus -...

    NMAP - www.insecure.org

    Nessus - www.nessus.com

    Those are the two that I use frequently. There are some others out there, but these get the job done for me.
  2. netstat -pant on linux machines will give you the...

    netstat -pant on linux machines will give you the application that is using the port. Have you tried all the commands for netstat?
  3. Replies
    42
    Views
    2,819

    Like I give a damn about negs. You're so...

    Like I give a damn about negs.

    You're so dramatic.

    I just feel sorry for you...seriously.
  4. Replies
    42
    Views
    2,819

    I almost feel sorry for you ck.

    I almost feel sorry for you ck.
  5. Replies
    42
    Views
    2,819

    Thanks for putting words in my mouth. I never...

    Thanks for putting words in my mouth. I never said people who don't want to sign it make me sick. If you don't want to sign it, then that's fine. You think that signing it is a signal to the US gov...
  6. Replies
    42
    Views
    2,819

    4MH - Thanks for the link. Its a great site, and...

    4MH - Thanks for the link. Its a great site, and I think its great to give people the chance to thank our men and women in the armed forces.

    For all those that say "thank them for what"....you're...
  7. Thread: Block P2P

    by Sgt_B
    Replies
    17
    Views
    1,226

    Lorenzo - Not having a username and password is a...

    Lorenzo - Not having a username and password is a bad idea. Leaving the default username and password is even worse. You might want to correct this on your linksys
  8. Thread: Linux behind ISA

    by Sgt_B
    Replies
    11
    Views
    799

    Here's a simple question, but sometimes these...

    Here's a simple question, but sometimes these things get overlooked. How is your browser set up on the clients? Are you specifying ISA as the proxy server?
    I know...pretty obvious, but I had to ask....
  9. Thread: Spam... or not?

    by Sgt_B
    Replies
    5
    Views
    965

    Wrong fourm. This for "How do I's" regarding this...

    Wrong fourm. This for "How do I's" regarding this site. Anyway, spammers suck. You're a spammer, therefore you suck. That being said. If you really want "intense hits" then you're going to have to...
  10. Thread: Block P2P

    by Sgt_B
    Replies
    17
    Views
    1,226

    I wish I could help there, but I've never used...

    I wish I could help there, but I've never used PIX so I can't tell you how really. Trust me though, find out how to view your log files. They are invaluable!
    What you can do, especially with this...
  11. Replies
    16
    Views
    1,140

    Tiger: The red ball in a pile of green ones is...

    Tiger: The red ball in a pile of green ones is not a correct analogy. I might not have described the feature properly. In the decoy list, you can specify publis as well as private IP addresses. So If...
  12. Replies
    16
    Views
    1,140

    Doesn't that go without saying? :p :p

    Doesn't that go without saying? :p :p
  13. Thread: Block P2P

    by Sgt_B
    Replies
    17
    Views
    1,226

    What FW are you using? Best way to test this...

    What FW are you using?

    Best way to test this is to install these apps on your machine. Block those ports that they use, and then try to log on. If you can't log on, then you've got it. If you can,...
  14. Replies
    16
    Views
    1,140

    Nmap and its decoy lists. This is probably the...

    Nmap and its decoy lists. This is probably the culprit. I can send a scan to a target, and set a decoy list as well. This sends my scan along with a number of spoofed IP's that show up in the...
  15. Thread: Linux behind ISA

    by Sgt_B
    Replies
    11
    Views
    799

    You have to allow use of the proxy for the RH...

    You have to allow use of the proxy for the RH machine.
    On the ISA, create a client address set using the RH's IP address. Then create Access Policy Rules (Protocol mainly) allowing http access, and...
  16. Replies
    5
    Views
    466

    Just in support of DjM....Snort!

    Just in support of DjM....Snort!
  17. Replies
    34
    Views
    2,259

    Hey Nebulus, I didn't know IDS's could block...

    Hey Nebulus,

    I didn't know IDS's could block traffic as well. What IDS were you referring to? I might check out that option....then supplement that with Tiger Shark's idea. :D

    Thanks everyone!
  18. Replies
    34
    Views
    2,259

    Hey Nebulus, I didn't know IDS's could block...

    Hey Nebulus,

    I didn't know IDS's could block traffic as well. What IDS were you referring to? I might check out that option....then supplement that with Tiger Shark's idea. :D

    Thanks everyone!
  19. Replies
    34
    Views
    2,259

    I know there's different options to achive the...

    I know there's different options to achive the same goal. Thats not what I was asking. Either way, best bet is to block their logon servers I guess. Simplest anyway, and doesn't give me a headache.
    ...
  20. Replies
    34
    Views
    2,259

    I know there's different options to achive the...

    I know there's different options to achive the same goal. Thats not what I was asking. Either way, best bet is to block their logon servers I guess. Simplest anyway, and doesn't give me a headache.
    ...
  21. Replies
    34
    Views
    2,259

    Thanks KC! Yes, the "they" in question are the...

    Thanks KC!

    Yes, the "they" in question are the IM's...shoulda clarified that. I'll probably just go with blocking thier logon servers for now I guess. Although they could easily create an "update"...
  22. Replies
    34
    Views
    2,259

    Thanks KC! Yes, the "they" in question are the...

    Thanks KC!

    Yes, the "they" in question are the IM's...shoulda clarified that. I'll probably just go with blocking thier logon servers for now I guess. Although they could easily create an "update"...
  23. Replies
    34
    Views
    2,259

    Yes, they do use specific ports, and if those...

    Yes, they do use specific ports, and if those ports are blocked then they will route through port 80 (ICQ also uses 21). Port 80 is used to access the internet via http. I can't really block that....
  24. Replies
    34
    Views
    2,259

    I know you can explicity deny access to the logon...

    I know you can explicity deny access to the logon servers, but if they change the logon server name, or if they add a new logon server, then its open season again for messengers.

    I haven't tested...
  25. Replies
    34
    Views
    2,259

    Blocking messengers

    I'm sure we've all heard it before, and I just did a search and didn't find anything recent or conclusive. So here it goes...

    AIM,MSNM,ICQ....how do you block these at the perimeter. The only...
Results 1 to 25 of 182
Page 1 of 8 1 2 3 4