Search:
Type: Posts; User: r04dki11; Keyword(s):
Search:
Search took 0.02 seconds.
-
September 11th, 2003, 02:20 AM
doesn't it all boil down to people who dont want to take responsibility for their own actions? it is more convenient to blame something or someone else. this is very similar to the murders over a...
-
September 10th, 2003, 11:36 PM
I think the costs are a little skewed. These reports tend to be over inflated and very hard to delineate. I would prefer to see the "most damaging" decision be solely based on how wide-spread,...
-
September 10th, 2003, 09:49 PM
I think entirely too much has been based solely off assumptions on the first post. We don't know what network (if any) he or she is working with/around. Is this their personal system with a...
-
September 10th, 2003, 07:57 AM
I have to admit, the local community does get to say what is and is not acceptable dress in public. It is this that sets us apart as a society. We have to all realise that not everyone wants to see...
-
September 10th, 2003, 07:46 AM
I'd be curious to see where u work catch - interesting concept. I have seen networks where the servers (web, mail etc.) were set in the DMZ between either routers or firewalls (or both) where the...
-
September 10th, 2003, 07:30 AM
Hiya, ascii.
The answer changes very little based on the firewall you are using. If you are using a tool like ZoneAlarm you will simply have to tell it that outbound connections from 'kazaa.exe"...
-
September 10th, 2003, 07:20 AM
That is an impressive layout, catch. This is running completely on an AI based IDS???
I see the benefit behind the redundancy in the IDS sensors but I don't fully follow your layout (allowing...
-
September 10th, 2003, 07:09 AM
Sounds to me the server properties are messed up. Check the Outlook icon on your desktop. Highlight and right-click > Properties > select the server in the window (should say something about...
-
September 10th, 2003, 07:02 AM
You can find comparisons between different products on the VirusBulletin site. They do a fair good job of independent testing and reviews. There are other sites as well such as the one run by...
-
September 10th, 2003, 06:57 AM
I am an AVG fan myself. It has a smaller footprint on the hd and ram - updates are easily scheduled or handled manually and you gotta love the price-tag.
Sgear, you can also d/l the signatures...
-
September 10th, 2003, 06:46 AM
Between the two it is Code Red but I think the current winner is either Sobig.xxx or Blaster (and all it's renditions). I know my customer is still dealing with several infections of Blaster-like...
-
September 10th, 2003, 06:37 AM
Good point DA, would you then logically assume it is either A) the level of the payload's intervention in the infected system or B) the programming language level that would determine the threat...
-
September 7th, 2003, 03:25 AM
Would the source code necessarliy prove what hat the writer is wearing? There are many who would say the Morris was trying to knock out the internet but he maintains he was just writing a tape worm...
-
September 6th, 2003, 11:19 PM
Along the lines of horse13's comments I have found a firewall set of rules that allows only the outbound and inbound ICMP I want (two separate rules) and two other rules that deny all other ICMP...
-
September 6th, 2003, 10:33 PM
I have been working with (read monitoring) active and passive IDSs for about five years now. I have tested various blends of string/rule based, anomaly based, behaviour based and have been in...
-
September 6th, 2003, 10:13 PM
Were these being re-released? Zoher was first reported in Dec '01, NakedWife came out in Mar '01, BabyPic discovery was Feb '01 and so forth.
Have you heard something about these being reworked...
-
September 6th, 2003, 10:08 PM
I agree with all of you on all the points made but there is another thing to consider. Not all writers are trying to do something inherently malicious. Consider the writer of "Welchia" who was...
-
September 6th, 2003, 10:00 PM
Very cool list, Null, kinda reminds me of a line from a "dead" tune..."what a long strange trip it's been". I did a report for school once that compared the time it took a malware to become the...
-
September 6th, 2003, 09:45 PM
Another comprehensive source for A/V tools is on the VirusBulletin site <http://www.virusbtn.com/index.xml> where you can find a good comparison between the various vendor products. They are fairly...
-
September 4th, 2003, 07:09 AM
For those of us who actually have to learn things - great post Ennis!
For those who were born coding in a 64 bit environment and converting ip to hex on the fly I am sure the treatise may seem...
-
September 4th, 2003, 06:27 AM
Personally (not that anyone asked) I think this is a great idea. It would be interesting reading for all concerned. I know I would probably gain a lot just from reading the tutorials and info here...
-
September 4th, 2003, 04:00 AM
In addition to the replies for using a software/hardware firewall you can also use FPort from Foundstone. Great tool that will tell you what app has called which port and where it is connected to.
...
|
|