> > Another possibility would be to have them replace the hubs with
> > switches, this assumes you are using twisted pair, not thin net
> > or thick net.
Just a warning, this would buy you absolutely nothing (outside of some
performance). There are enough tools out there capable of ARP spoofing
> > Another possibility would be to have them replace the hubs with
> > switches, this assumes you are using twisted pair, not thin net
> > or thick net.
Just a warning, this would buy you absolutely nothing (outside of some
performance). There are enough tools out there capable of ARP spoofin
On Tuesday, November 6, 2001, at 06:23 AM, Bryan Andersen wrote:
[EMAIL PROTECTED] wrote:
Hallo there,
I really don't know if it should be asked there or somewhere
else,
but my problem is followin I live in untrusted enviroment which is
running 50 computers (it is school and p
Hallo,
> > happen few times that students stole their passwords and so on and mainly
> > they could steal even teacher's these days.)
>
> Can you get a shell account on the outside of your local network?
> If so SSH over to it, then access the pop mail server. Without
> having a machine to s
On Tuesday, November 6, 2001, at 06:23 AM, Bryan Andersen wrote:
> [EMAIL PROTECTED] wrote:
>>
>> Hallo there,
>>
>> I really don't know if it should be asked there or somewhere
>> else,
>> but my problem is followin I live in untrusted enviroment which is
>> running 50 computers (
Hallo,
> > happen few times that students stole their passwords and so on and mainly
> > they could steal even teacher's these days.)
>
> Can you get a shell account on the outside of your local network?
> If so SSH over to it, then access the pop mail server. Without
> having a machine to
On Mon, Nov 05, 2001 at 10:24:34PM +0100, Philipp Schulte wrote:
>Thats not true. nmap shows "open" ports which means that something is
>listening on them. If I connect from localhost:1024 to
>www.debian.org:80 that does not mean that my port 1024 is open. It
>doesn't accept connections.
>I actua
[EMAIL PROTECTED] wrote:
>
> Hallo there,
>
> I really don't know if it should be asked there or somewhere else,
> but my problem is followin I live in untrusted enviroment which is
> running 50 computers (it is school and packets are running up and down
> everywhere). I need to use o
On Mon, Nov 05, 2001 at 10:24:34PM +0100, Philipp Schulte wrote:
>Thats not true. nmap shows "open" ports which means that something is
>listening on them. If I connect from localhost:1024 to
>www.debian.org:80 that does not mean that my port 1024 is open. It
>doesn't accept connections.
>I actu
[EMAIL PROTECTED] wrote:
>
> Hallo there,
>
> I really don't know if it should be asked there or somewhere else,
> but my problem is followin I live in untrusted enviroment which is
> running 50 computers (it is school and packets are running up and down
> everywhere). I need to use
On Die, Nov 06, 2001 at 07:52:08 +0100, Administrator wrote:
> Hi,
re,
> > does anybody can tell me where can I get a Instrusion Detection
> > System's base? I need the signatures of attack...
>
> Try this: http://www.lids.org/
LIDS is not a NIDS as it sounds. LIDS is capability and mandatory A
[EMAIL PROTECTED] wrote:
Hmmm... I am afraid it isn't possible, because there are W95
workstations. Or is there anything to support this which is reasonably
simple and will rewrite windows sockets into that kind of
communication. As I said before the most simple way is to have something
like p
> Do you have access to the router/switch/firewall at your end? You
> might want to consider your internal network "not trusted" since
> people are stealing passwords. The easiest solution that comes to my
> mind is IPSec: make your firewall (or what ever) an IPSec gateway and
> run everything i
> anything else than just clear autentification. So is there a software
> which connets onto server (for example proxy) through SSL and then
> redirect data channels onto right ports as an clear connection outside (I
> cannot solve the situation on provider routers of course, but it has
Do you h
Hallo there,
I really don't know if it should be asked there or somewhere else,
but my problem is followin I live in untrusted enviroment which is
running 50 computers (it is school and packets are running up and down
everywhere). I need to use outside HTML sites and POP
accounts, but
Hi,
Try this: http://www.lids.org/
- Original Message -
From: "Osvaldo Mundim Junior" <[EMAIL PROTECTED]>
To:
Sent: Monday, November 05, 2001 6:45 PM
Subject: IDS
> Hi,
>
> does anybody can tell me where can I get a Instrusion Detection System's
base?
> I need the signatures of attack
On Die, Nov 06, 2001 at 07:52:08 +0100, Administrator wrote:
> Hi,
re,
> > does anybody can tell me where can I get a Instrusion Detection
> > System's base? I need the signatures of attack...
>
> Try this: http://www.lids.org/
LIDS is not a NIDS as it sounds. LIDS is capability and mandatory
[EMAIL PROTECTED] wrote:
>
> Hmmm... I am afraid it isn't possible, because there are W95
>workstations. Or is there anything to support this which is reasonably
>simple and will rewrite windows sockets into that kind of
>communication. As I said before the most simple way is to have something
>
> Do you have access to the router/switch/firewall at your end? You
> might want to consider your internal network "not trusted" since
> people are stealing passwords. The easiest solution that comes to my
> mind is IPSec: make your firewall (or what ever) an IPSec gateway and
> run everything
19 matches
Mail list logo