Search:

Type: Posts; User: sgtrush; Keyword(s):

Search: Search took 0.04 seconds.

  1. Replies
    36
    Views
    20,562

    Interesting discussion, I have tested this...

    Interesting discussion, I have tested this exploit in a controlled environment. It is far too easy to get access. Their is a threat noone has discussed. Firewalling will keep the external threats...
  2. Thread: Nat

    by sgtrush
    Replies
    19
    Views
    11,498

    I expect the Linksys line to undergo some changes...

    I expect the Linksys line to undergo some changes as they are now owned by Cisco.
    http://newsroom.cisco.com/dlls/hd_032003.html Most SOHO firewalls do considerably more than just NAT, most have...
  3. Replies
    8
    Views
    5,974

    Good tools, I use these for setting/reviewing...

    Good tools, I use these for setting/reviewing baseline security on customers machines. I have some issues with hfnetchk.exe not being completely accurate but thats a small issue compared with the...
  4. Replies
    11
    Views
    8,084

    Its not freeware but look into spinrite. I used...

    Its not freeware but look into spinrite. I used it many years ago, and apparently it is still available. Info should be at http://www.grc.com.
  5. Replies
    57
    Views
    92,082

    Arrghh, I missed the fact that the form action...

    Arrghh, I missed the fact that the form action was a relative not the actual one. I have been beating my head on this for 3 days.
  6. Replies
    2
    Views
    6,018

    The best vulnerability tool I use. I wonder if...

    The best vulnerability tool I use. I wonder if updating the plugins will be as worthwhile as upgrading the program. Thanks for the heads up.
  7. Replies
    9
    Views
    6,503

    It may be a lil cheesey, but create a host record...

    It may be a lil cheesey, but create a host record for www and point it at your webserver. I am sure there are better ways of doing it, but thats always worked for me.
  8. Thread: Pix and SysLog

    by sgtrush
    Replies
    9
    Views
    5,993

    I have had a similar problem at a number of...

    I have had a similar problem at a number of sites. I finally broke down and instead of setting syslog up at the cli I did it through the Pixs' PDM web interface. Not sure what is different about...
  9. Replies
    16
    Views
    18,448

    I am currently reading Counter Hack by Ed...

    I am currently reading Counter Hack by Ed Skoudis. It is a good read, in that it takes many of todays common exploits and explains them in detail followed by the appropriate defense. He also has,...
  10. Replies
    6
    Views
    4,915

    I have been reading Scene of the cybercrime,...

    I have been reading Scene of the cybercrime, computer forensics handbook by debra littlejohn schinder. It goes into more than just procedures, but an overview of what is and isn't allowed as...
  11. Replies
    16
    Views
    9,208

    Type "net help" The list of available commands...

    Type "net help"
    The list of available commands are listed for you. If you need help with the individual command type "net help <insert command here>"
    Hope this helps.
  12. Replies
    8
    Views
    11,036

    Doh, nice reply networker, I stand corrected....

    Doh, nice reply networker, I stand corrected. Those stats would give you a quick indication of overutilization. :)
  13. Replies
    4
    Views
    5,727

    Detroit huh? Tell the Nuge I said Hi. Thanks for...

    Detroit huh? Tell the Nuge I said Hi. Thanks for the help.
  14. Replies
    8
    Views
    11,036

    Cisco's use of the acronym span stands for switch...

    Cisco's use of the acronym span stands for switch port analyzer, it is synonamous with other vendors use of the term "port mirroring". In essence it forwards a copy of all traffic seen on the...
  15. Replies
    4
    Views
    5,727

    Your right it is his AD server. Makes me wonder...

    Your right it is his AD server. Makes me wonder if its normal behavior. I will have to check all my customers servers to see if that's a normal condition. It seems a bit much to me for a single...
  16. Thread: Hacking Myths

    by sgtrush
    Replies
    30
    Views
    21,344

    I have no comment on 9, but 10 is fairly valid....

    I have no comment on 9, but 10 is fairly valid. Spoofed IP addresses are basically blind attacks. The return packet is sent to the spoofed IP address. DDOS is usually the only use for a spoofed IP....
  17. Thread: Hello

    by sgtrush
    Replies
    0
    Views
    3,242

    Hello

    Allow me to introduce myself. I am a Network Security Engineer working in the St. Louis metro area. I have been in the IT industry for 13 years or so. I can't believe I hadn't found this forum until...
  18. Replies
    4
    Views
    5,727

    Have you seen these symptoms?

    First some background.
    Win2k server that was infected with the tk worm. I was able to remove the bot fairly easily, followed by speach no. 106 regarding the importance of virus protection and...
Results 1 to 18 of 18