Search:
Type: Posts; User: spurious_inode; Keyword(s):
Search:
Search took 0.03 seconds; generated 53 minute(s) ago.
-
July 11th, 2005, 06:29 AM
Okay, okay... :)
Personally, I am going out to the street to beat the kid up and take his laptop for my collection. I'll probably take his car battery too since you can always use a spare.
...
-
Well. If there is a car you don't know parked outside your house with an antenna on the roof, and a nervous looking dweeb with a laptop inside we don't need to many other variables to solve for X. ...
-
I don't have a problem with this law actually. Of course it depends on what the network is; e.g. public hot spot offered by a shop or cafe.
If I park outside your house on the street and freeload...
-
Do you have enough in your budget for a firewall on you client gateway? It's going to be a lot easier to filter traffic per-subnet or per-gateway than on each individual host. Of course, it's up to...
-
So ambitious!
Why not slap Solaris 10 x86 on there someplace too... :)
-
June 26th, 2005, 04:08 AM
Realize that you are going to have to do this for TCP, UDP, 'and' ICMP.
In an examle provided by frostedegg, on Linux you can just tell the kernel via /proc to ignore ICMP.
But, if I am a...
-
June 26th, 2005, 04:02 AM
Get BlueCoat proxy/content management hardware on your network. I know, folks probably think I am pushing it a bit hard these
days... :)
Seriously, if you need to keep close tabs on what your...
-
June 26th, 2005, 03:54 AM
16 ^ 4
... or, the largest unsinged value of one byte.
Port 0 is a reserved port, you aren't 'supposed' to use it. But it is common practice
in UNIX socket programming to use port 0 as a way...
-
June 26th, 2005, 03:49 AM
You'll have to forgive me LindaHewitt, i've had too many beers with dinner and am a little confused about what you are asking. :)
If you are looking for cost effective X86 server hardware, I would...
-
June 21st, 2005, 11:38 PM
Check out the products from 'EdgeBlue'. They have some really nice products that won't kill your budget for the next two quarters.
http://www.edgeblue.com/
-- spurious
-
June 20th, 2005, 01:22 AM
I guess by now we are way OT... :) But this has turned into a semi-productive discussion in spite of itself.
Okay, I believe you when you say that there is an article in a magazine that says...
-
June 19th, 2005, 05:10 PM
Yikes! It is amazing to me how ignorant PC/Non-Mac users can be about Apple. Instead of just guessing and speculating about what will happen, and pulling rumors out of the air and believing them, why...
-
June 19th, 2005, 04:12 PM
First, let me thank you gore for telling us what you really think. :)
For me, this cuts to the chase on the whole question of 'secure' systems. Software and Computer Security are at odds with each...
-
June 12th, 2005, 03:35 AM
The enterprise security topics that I am pretty hot on right now are Role Based Access Control (RBAC), and true privilege separation. Unfortunately both of these things have the same problem; they...
-
June 11th, 2005, 02:27 PM
There has been a definite decline in the 'production' usage of OpenBSD. I think this is for two reasons. A) as you mentioned catch, the typical installation is on an enthusiasts machines; and many of...
-
What about computer/corporate espionage? Some unscrupulous companies out there will pay well for someone to
spy on their competitors... Dropping 5K on some unreleased exploits could just be a...
-
Couldn't agree more ...
My chosen field is UNIX Systems Design and Management. Given 15 years experience, and several large scale
environments I have worked in; it is relatively easy to focus a...
-
I can't believe anyone is running an IIS box without some kind of screen in front of it set up for reverse proxy...
Unless of course
a) this is your first time using IIS, and didn't know it is...
-
November 24th, 2004, 02:12 AM
You mentioned nmap... Have you tried something like 'nmap -sF -P0 -p 1-65550 -vvv -O <ip-address>' ?
There are lots of little ways to discover machines on a network, most of which require a good...
-
November 24th, 2004, 12:46 AM
The list makes sense because those are the kinds of things that an externally facing Unix host is likely to be running. You don't see things like LDAP, NIS+, SMC and the like because only a Kamikaze...
-
November 17th, 2004, 08:39 AM
Hardware firewalls are overrated. Our guys just spent the past 9 hours un-*****ing the network after a cisco pix HA pair **** the bed and then brought all interfaces online at the same time. Which by...
-
November 16th, 2004, 01:32 PM
.... Actually, most OS's have little quirks or other uniqe things about the way they act when you try to build a connection on a closed TCP port. Add to this the implementation specific way that a...
-
November 16th, 2004, 06:01 AM
You might also have a look at /etc/inputrc.
-
November 16th, 2004, 05:57 AM
That is going to be pretty damn tough to do without the source code to the OS. What you need to understand is that these days, any worthy scanner uses specific characteristics of the IP implentation...
-
November 7th, 2004, 10:46 PM
SuSE is a fantastic distro, and Sun is steadily falling behind the curve compared to Linux. For large installations I really prefer Sun hardware over PC's because of OpenBoot and LightsOut and the...
|
|