Search:

Type: Posts; User: brichards99; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.01 seconds.

  1. Zencoder, You're absolutely right,...

    Zencoder,

    You're absolutely right, particularly in your final comments, about scrutinizing my requirements. The development process I'm using right now however is to find the answer to the...
  2. configuring secure auth for a wireless LAN

    I administer a small LAN for my company and right now we have a nice little wireless setup that clients and co-workers can access using a simple WEP key. This is nice and all, but I'm not as...
  3. Replies
    3
    Views
    5,983

    There is also a product called Winstall, which I...

    There is also a product called Winstall, which I believe is from Veritas. There was a working demo version of it on the Windows Server 2000 CD-ROM, under the VALUEADD directory, I think. I'd have...
  4. Replies
    6
    Views
    9,624

    The main task is to simplify the construction of...

    The main task is to simplify the construction of the antenna itself, using one of the plans below, for example:

    The not-so-cheap route would be to get a kit from cantenna.com.

    Even cheaper,...
  5. Replies
    6
    Views
    4,844

    The trouble I have with this issue is that these...

    The trouble I have with this issue is that these companies are willingling and enthsiastically getting into the business of identity management. Why would they bother? What's their incentive? And...
  6. Replies
    12
    Views
    10,367

    Proceed carefully and with much planning with...

    Proceed carefully and with much planning with that Console installation. I've managed Symantec Corporate on a couple of networks, and the only thing that seems botch-able is the console. Once it's...
  7. Thread: Hitman Pro

    by brichards99
    Replies
    19
    Views
    13,693

    Bah. Who needs an English version? Just do a...

    Bah. Who needs an English version? Just do a spouse-mode installation (just say yes, dear everytime it looks like there's a button that should be clicked), and the actual tools are all...
  8. Thread: Hitman Pro

    by brichards99
    Replies
    19
    Views
    13,693

    Okay, I'm in favor of this, and here's why: I...

    Okay, I'm in favor of this, and here's why: I get way too many people asking me for help with their popup problems, and here's a fun little utility I can throw at them that simplifies my shopping...
  9. Replies
    20
    Views
    10,964

    Absolutely right, Pooh -- A honeypot is a...

    Absolutely right, Pooh --

    A honeypot is a simple concept, but only so much as 'programming' is a simple concept, or 'security' is a simple concept. A honeypot is a tool used to achieve a specific...
  10. Replies
    9
    Views
    7,939

    I've had similar frustrations with establishing...

    I've had similar frustrations with establishing very simple VPN connections, and my recommendation is to apply Occam's razor here: the simplest explanation is most likely to be the correct one.
    ...
  11. Replies
    7
    Views
    5,077

    The answer to your question 'am I too paranoid'...

    The answer to your question 'am I too paranoid' is yes, although that's not necessarily a bad thing.

    This kind of a situation depends a lot on the size of the network, the resources at risk, and...
  12. Replies
    11
    Views
    9,573

    Because not a lot of firewall products are...

    Because not a lot of firewall products are configured to block traffic based on whether it's dirty or may corrupt the minds of youth. Just if it'll fondle your Windows Messenger service.

    In...
  13. Replies
    16
    Views
    9,112

    (Getting the impression that none of us has done...

    (Getting the impression that none of us has done this in a long time, which is probably a good thing.)

    Isn't file and print sharing a component of Windows 98 that is not always installed by...
  14. Replies
    17
    Views
    10,714

    First of all, avoid software firewalls as much as...

    First of all, avoid software firewalls as much as possible if you are able to use a hardware one. It's just not worth this system resources.

    You might want to check the documentation on that...
  15. Replies
    26
    Views
    14,250

    Tiger Shark has a very good point about it being...

    Tiger Shark has a very good point about it being his network to run scans against at will. For you up and coming network admins keep that in mind -- know what you're doing as best you can (so you...
  16. Another way of describing a spider is to think of...

    Another way of describing a spider is to think of it as a specific piece of software designed to find exactly this kind of vulnerability in your site. In other words, a spider can be a...
  17. Replies
    26
    Views
    14,250

    I administer my DMZ as a seperate network, with a...

    I administer my DMZ as a seperate network, with a seperate interface on the firewall and its own network policy. It is not a border, just a different subnet with its own physical topology that makes...
  18. What VPN software are you...

    <ears perked>

    What VPN software are you referring to? I'm getting kind of sick of my VPN being really expensive and very dull.
  19. This is a nice idea and all, and if I could ever...

    This is a nice idea and all, and if I could ever get my SMS to behave like it ought to I might be more inclined to like my server automating security updates. But I just can't help but think, can't...
  20. Replies
    26
    Views
    14,250

    I have to pipe in about that last post. I...

    I have to pipe in about that last post.

    I agree!

    I used to work for a really big university, and so performing vulernability assessments was a big, fun project. I mean, at a unversity you have...
  21. Replies
    9
    Views
    6,640

    I'm impressed that you have both a short and a...

    I'm impressed that you have both a short and a long version of the terms and conditions for the site . . .

    I just ran a quick exodus analysis of the site and it seems pretty stable. The weak...
  22. Replies
    16
    Views
    10,085

    Within Windows you can either crank down the...

    Within Windows you can either crank down the NIC's speed by configuring the advanced properties of the network connection (although this really just lets you set a 10/100 card at 10) or you can...
  23. Replies
    17
    Views
    10,714

    If you're going to have this network on the...

    If you're going to have this network on the Internet, you should have a firewall no matter what. The lucky thing is that a number of wired and wireless routers have firewall or firewall-like...
  24. Replies
    14
    Views
    9,671

    Yep -- I do in fact have access to one external...

    Yep -- I do in fact have access to one external address enabled on my PIX, but I should have modified the line to show an internal interface before posting it here.

    In general I recommend closely...
  25. Replies
    14
    Views
    9,671

    I run a PIX 515 and I can't tell you how handy...

    I run a PIX 515 and I can't tell you how handy that web-based administration tool is. It's called the PDM (PIX Device Manager) and it does require that you configure the firewall to permit your IP...
Results 1 to 25 of 40
Page 1 of 2 1 2