Search:

Type: Posts; User: lessthanzero; Keyword(s):

Page 1 of 5 1 2 3 4

Search: Search took 0.01 seconds.

  1. Replies
    9
    Views
    3,457

    re: VS8.0i new features

    @ric-o

    Are you using ePO to manage your AV deployment and subsequent updates (both DAT, engine, and component)? If not, NAI has two other options:

    1. Protection Pilot - think of this as a...
  2. re: MS purchase of Giant and Sunbelt CounterSpy

    What I find particularly interesting about this aquisition is the following link...pay attention to topic #2 - Microsoft:

    http://www.stusnews.com/

    Personally, I've been prototyping CounterySpy...
  3. Replies
    9
    Views
    3,457

    re: VS8.0i

    My experiences w/ VS8.0i are mixed, mostly due to the overwhelming let down of the integrated anti-spyware/adware module as a vialbe solution. Overall, I do like the newest version but sometimes I...
  4. Replies
    14
    Views
    6,104

    don't forget about snmp...

    if private and/or public are still configured as snmp-server community strings (or you know what the non-default configured string might be), then one can grab the configuration via snmp. I believe...
  5. Replies
    9
    Views
    2,760

    re: installing software...

    I agree with Tedob1...

    There's no need to edit the Registry manually to achieve your goal.

    You can use Local Policy, use Group Policy if you're in a network/domain, and the easiest/best method...
  6. Replies
    19
    Views
    10,111

    re: AntiSniff

    First, I have to agree and echo Catch's statement. Data is most vulnerable whilst in transit. The most popular and efficient means of protecting data in transit is encryption.

    Secondly, I agree...
  7. Replies
    1
    Views
    1,147

    setup checklist

    There are so many variables to consider and variations from organization to organization, you'll be much better off to simply build your own matrix.

    My suggestions (and how I've built 'checklists'...
  8. Replies
    3
    Views
    1,559

    re: Linux as VMWare Guest

    Yes, it is completely and definitely possible. I, and many many other people, run Linux distros as Guest OS's. I run Slackware, Redhat (two different versions), and Gentoo as VMWare Guests.

    What...
  9. Replies
    11
    Views
    6,632

    re: Tomdaq

    They did - it is stated right in the documentation. In fact, there are 3 ways to run it...

    1. console (./msfconsole)
    2. commandl line
    3. web gui (./msfweb)

    On to the point of the thread...
    ...
  10. Thread: Ids

    by lessthanzero
    Replies
    5
    Views
    6,290

    re: Mac IDS

    here is a thread from Neohapsis which may give you the answer or at least some clues:

    http://archives.neohapsis.com/archives/sf/ids/2001-q2/0631.html

    Cheers,
    <0
  11. Replies
    2
    Views
    1,660

    re: securing linux

    Well, you can start by reading this:

    http://www.linuxsecurity.com/docs/LDP/Security-HOWTO/

    That should get you as far as understanding what goes into securing a linux host and take you through...
  12. Replies
    1
    Views
    1,630

    how about being more specific....

    What is the output from ifconfig (ifconfig eth0)?

    dmesg? Any specific errors here?

    What does 'redhat-config-network' show? Did you configure the network during the installation procudure?
    ...
  13. Replies
    2
    Views
    1,397

    re: DNS server

    I'm assuming that you're referring to running a DNS server yourself....

    depends on what OS the host machine is running:

    1. Windows - run the native DNS component.
    2. *Nix - BIND

    No cost...
  14. Replies
    5
    Views
    2,871

    re: applications and registry

    perhaps not exactly on topic, but you can also us EzClean, which is called Ashampoo now I believe, to track changes during an installation and/or uninstallation process. And not only can you track...
  15. Replies
    5
    Views
    2,798

    re: firewall hardware

    I'm biased for the Cisco PIX. I run a redundant 525 pair at my core edge and several 520's out in the field as remote VPN terminators.

    However, as others have pointed out, I believe any of the...
  16. Replies
    3
    Views
    5,328

    re: Kismet and wi-fi card

    Personally, I use a Orinoco Gold with my laptop and a ambicom CF with my sharp zaurus. Both were easy to get Kismet to work with and haven't had any issues since I purchased them.

    Cheers,
    <0
  17. Replies
    12
    Views
    4,566

    re: getting hit...?

    Sorry, but I have to ask to obvious question...

    Is there anyone else in your living space who might have used the machine? Brother, sister, mom, son, grandpa...etc.

    Also, have you checked any...
  18. Replies
    3
    Views
    1,380

    re: eye of god

    Indeed, very cool.

    I've always kinda dug this one:

    http://www.ne.jp/asahi/stellar/scenes/object_e/horse.htm

    reminds me of something out of a lovecraft story...perhaps 'at the mountains of...
  19. Replies
    5
    Views
    13,692

    re: Vorlin

    Thanks.

    That answers my question :)

    Cheers,
    <0
  20. Replies
    4
    Views
    4,049

    re: packet injection for Windows

    Not sure if Hping has a port but I know nemesis does...

    http://nemesis.sourceforge.net/

    Cheers,
    <0
  21. Replies
    5
    Views
    13,692

    re: what distro

    My question is distro neutral/generic.

    I'm just curious if 'Linux' logs a time and/or date change as a default behavior.
  22. Replies
    2
    Views
    2,385

    re: Security Warrior

    I actually almost purchased it a few weekends ago...

    Standing in line at the local Borders, I started to actually page through the book and look at details. To be honest, I didn't see anything...
  23. Replies
    5
    Views
    13,692

    does Linux log time/date changes?

    Thanks in advance to all who respond - it's been a long day and I'm not up to scouring google for my answer tonight (a quick initial search didn't yield any positive results) :)

    Simple question:...
  24. Replies
    4
    Views
    1,998

    re: VPN devices

    I've not used anything other than Cisco personally. Within that, I've only used routers and PIX firewalls- no Concentrators. But i've run the gamut of PIXes (515's, 520's, 525's) and routers...
  25. Replies
    4
    Views
    1,880

    re: NeuTron

    Safe from what? This is bad advice and makes assumptions that are not based in fact.

    The simple truth is that everyone is at some level of risk, irrespective of being corporate or a home user. As...
Results 1 to 25 of 105
Page 1 of 5 1 2 3 4