Page 2 of 2 FirstFirst 12
Results 11 to 17 of 17

Thread: myspace IM at work

  1. #11
    Senior Member
    Join Date
    Oct 2003
    Location
    MA
    Posts
    1,052
    I would look into aim pro it works with outlook :-)

  2. #12
    Senior Member nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,188
    oofki,

    After you have considered regulatory compliance and what the effects of a compromise of patient confidentiality would have on this medical practice, you would not really recommend that would you?

    And that is before the lawyers and other reptiles start to go into a feeding frenzy.

    This is a regulatory high security environment............... you cannot behave like a normal commercial environment?

    A bit like the Financial Sector who have Sarbanes-Oxley?

    I would guess I would go for:

    1. A strict AUP that at least feigns compliance.
    2. A security policy that supports this, and the regulations.
    3. A lockdown setup that enforces #1 & #2 above.
    4. A monitoring system that checks for infringements of the above.

    This is a medical practice........... I guess the partners are on at least $200,000 a year? In that case you will be supported, trust me
    Last edited by nihil; July 2nd, 2007 at 02:15 PM.

  3. #13
    Senior Member
    Join Date
    Mar 2002
    Posts
    442
    iptabels -L -n DROP all -- 216.178.38.116 0.0.0.0/0

    or

    ip route add 216.178.38.116 via 127.0.0.1

  4. #14
    Senior Member IKnowNot's Avatar
    Join Date
    Jan 2003
    Posts
    792
    The3ntropy , I am unsure of what you mean; is it that you are drunker then I ?
    Oh wait, I'm sober! ( remind me to fix that. )

    Providing these commands can be used on the router in use ( I think from a prior thread it may be a Netgear wireless? ) Oh well, let's cover these anyway.
    iptabels -L -n DROP all -- 216.178.38.116 0.0.0.0/0
    ( note: spelling counts using command line -- it is iptables, not iptabels )

    I read this as:
    list iptables entries ( iptabels -L ), in numeric format (-n), disjointed target from unknown chain ( DROP ), all protocols ( all ), disjointed hyphens ( -- ), net-address ( 216.178.38.116 ), then disjointed address ( 0.0.0.0 ) that has a netmask of 0.0.0.0 ( /0 )

    That makes no sense. I think what you meant was something like
    iptables -I FORWARD -d 216.178.32.0/20 -j DROP
    or
    iptables -I FORWARD -d 216.178.32.0/20 -j REJECT
    These would add the rule to the FORWARD chain.
    Notice the Netrange used, this discussed more below.
    Notice too I did not use the -A, but the -I.
    The reason for this is we do not know what rules are already in place, and appending the rule to the end of the chain ( using -A ) may be moot if there is already a rule before it that allows the forwarding of the packets. Inserting the rule ( using the -I ) without a rule number specified places the rule at the head of the chain. This should work, providing the default FORWARD policy is DROP!

    Of course, a reboot would nullify the addition to iptables unless you had saved it in some manner, but that is another topic.


    ip route add 216.178.38.116 via 127.0.0.1
    This might be a useful tactic during a specific DOS attack, but you are limited to a specific address here, that of profile.myspace.com. It does not stop anything else from Myspace from being accessed.

    If you want to use routing tables, why not something like
    ip route add prohibit 216.178.32.0/20
    or better yet
    ip route add unreachable 216.178.32.0/20

    These would block a bit more of the Myspace netrange?
    " And maddest of all, to see life as it is and not as it should be" --Miguel Cervantes

  5. #15
    Senior Member
    Join Date
    Mar 2002
    Posts
    442
    you say tables, I say tabels
    alias iptabels='iptables'

    last night I felt helpful so was reading some stuff on here, first line was a sad attempt to drop all packets from the root myspace ip

    second was just null-routing all packets to the ground; if you 'prohibit' or 'unreachable' packets it takes more cpu time to make the decision of what to do with the packet (from my experiences at least with heavy DRDoS attacks)

  6. #16
    Senior Member IKnowNot's Avatar
    Join Date
    Jan 2003
    Posts
    792
    Actually, I am on vacation, so I say
    pour me another drink!
    " And maddest of all, to see life as it is and not as it should be" --Miguel Cervantes

  7. #17
    AO's MMA Fanatic! Computernerd22's Avatar
    Join Date
    Mar 2003
    Location
    Miami, FL
    Posts
    795
    I have to go over there and setup the wireless 'security' on the netgear router and also, clean out both PC's and notebook. Since they all run very slow and seems to be infected with spyware/malware etc...

    also, have to install a label maker on workstation 1. Have to be there at 12:30 it's 9:45 here.

    I will post later results.

Similar Threads

  1. Slack BSD
    By gore in forum Operating Systems
    Replies: 2
    Last Post: February 25th, 2005, 08:12 AM
  2. Replies: 8
    Last Post: February 8th, 2005, 05:10 PM
  3. Replies: 6
    Last Post: October 5th, 2004, 08:26 AM
  4. how do exploits work? in a coding way..
    By lepricaun in forum Programming Security
    Replies: 9
    Last Post: August 19th, 2004, 05:21 PM
  5. :) do you want to have good work?
    By sun7dots in forum AntiOnline's General Chit Chat
    Replies: 6
    Last Post: April 30th, 2002, 02:04 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •