Security Basics Mode:
(Page 6 of 1428)  < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >
Re: Locate wifi client 2013-10-16
ToddAndMargo (ToddAndMargo zoho com)
Hi! This is the ezmlm program. I'm managing the
security-basics (at) securityfocus (dot) com [email concealed] mailing list.

I'm working for my owner, who can be reached
at security-basics-owner (at) securityfocus (dot) com. [email concealed]

I'm sorry, the list moderators for the security-basics list
have failed to act on your post. Thus, I'm returning

[ more ]  [ reply ]
Re: nmap root vs user question 2013-10-15
ToddAndMargo (ToddAndMargo zoho com)
On 10/15/2013 11:16 AM, Mikhail A. Utin wrote:
> Hi,
> Not sure about two you refer to. In any case core Nmap is CLI-based, and it could be any sort of frontend on its top. All use original CLI functionality, but may limit it by developer's taste.
>
> Regards
>
> Mikhail

Hi Mikhail,

What I was re

[ more ]  [ reply ]
Re: UDP question 2013-10-14
ToddAndMargo (ToddAndMargo zoho com)
i! This is the ezmlm program. I'm managing the
security-basics (at) securityfocus (dot) com [email concealed] mailing list.

I'm working for my owner, who can be reached
at security-basics-owner (at) securityfocus (dot) com. [email concealed]

I'm sorry, the list moderators for the security-basics list
have failed to act on your post. Thus, I'm returning i

[ more ]  [ reply ]
Re: metasploit install problem 2013-10-14
ToddAndMargo (ToddAndMargo zoho com)
Hi! This is the ezmlm program. I'm managing the
security-basics (at) securityfocus (dot) com [email concealed] mailing list.

I'm working for my owner, who can be reached
at security-basics-owner (at) securityfocus (dot) com. [email concealed]

I'm sorry, the list moderators for the security-basics list
have failed to act on your post. Thus, I'm returning

[ more ]  [ reply ]
Re: nmap root vs user question 2013-10-14
ToddAndMargo (ToddAndMargo zoho com)

>> On Fri, Oct 4, 2013 at 5:29 PM, ToddAndMargo <ToddAndMargo (at) zoho (dot) com [email concealed]
>> <mailto:ToddAndMargo (at) zoho (dot) com [email concealed]>> wrote:
>>
>> Hi All,
>>
>> "#" is my "root" prompt and "$" is my user prompt.
>>
>> Question: why does namp sometimes work as root
>> and not as a user? Why no warning

[ more ]  [ reply ]
Re: nmap root vs user question 2013-10-14
ToddAndMargo (ToddAndMargo zoho com)

On 10/07/2013 06:47 AM, Mikhail A. Utin wrote:
> HI,
> I never run Nmap as user. The software uses OS resources, which
require root privilege. BTW, if you run GUI Nmap Like NmapFE, and as a
user, it will tell you that "You are *NOT* root - Some options are not
available".
>
> Regards
>
> M

[ more ]  [ reply ]
Re: nmap root vs user question 2013-10-12
ToddAndMargo (ToddAndMargo zoho com)
On 10/07/2013 07:39 AM, Rob wrote:
> Is anybody else somewhat worried about this person doing penetration
testing
> and PCI compliance auditing?
>
> No offense dude, but this is not something that can be learned from a
> security basics mailing list.
>
> I do want to help, and I do want you

[ more ]  [ reply ]
Re: When some is infected? 2013-10-12
ToddAndMargo (ToddAndMargo zoho com)
On 10/11/2013 04:28 AM, Chris Hurst wrote:
> Wireshark takes a lot of knowledge and familiarity. It would be better
> suited for trying to find out what was being sent to the C&C server if
> you found a bot. Generally, running "netstat -n" in a cmd primpt, then
> checking the foreign addressess the

[ more ]  [ reply ]
Re: Aw: When some is infected? 2013-10-12
ToddAndMargo (ToddAndMargo zoho com)
On 10/11/2013 12:41 AM, Adam Pal wrote:
> Hi,
> sorry, i dont get it.
> What exactly are you asking about:
> 1. client security (including AV)?
> 2. scope of a Pentest (which should be clearly defined and performed by
> a trusted company)?
> 3. network security (you never mentioned a FW)?
> 4. heurs

[ more ]  [ reply ]
Re: When some is infected? 2013-10-12
ToddAndMargo (ToddAndMargo zoho com)
On 10/11/2013 04:17 AM, BillV-Lists wrote:
> Hi Todd,
>
> I'm not sure I understand what you're asking for. When you walk up to a
> "protected" computer... are you talking about a system protected with
> Kaspersky?

Yes. And reasonable steps taken to protected it.

> And what do you mean "get past

[ more ]  [ reply ]
Re: When some is infected? 2013-10-12
ToddAndMargo (ToddAndMargo zoho com)
On 10/11/2013 02:04 AM, Nicolas Mitchell wrote:
>
> On 11 Oct 2013, at 04:11, ToddAndMargo <ToddAndMargo (at) zoho (dot) com [email concealed]> wrote:
>
>> Hi All,
>>
>> Since I sell Kaspersky and have had a lot of customers
>> on it for years, I have learned that if something gets
>> by Kaspersky, it is going to be a wild r

[ more ]  [ reply ]
When some is infected? 2013-10-11
ToddAndMargo (ToddAndMargo zoho com)
Hi All,

Since I sell Kaspersky and have had a lot of customers
on it for years, I have learned that if something gets
by Kaspersky, it is going to be a wild ride getting rid
of it. (I get rid of them manually and/or run other
vendors stuff at the computer.)

Now a days, when I walk up to

[ more ]  [ reply ]
Re: Locate wifi client 2013-10-09
digitalinfosec gmail com
Hi Robert, are you doing any type of logging on your network or appliance(s)? If you're capturing anything Wireshark or Capsa for example can give you some idea and you can filter the traffic. If your company has an asset register where the IP and MAC addresses are listed it might be you could then

[ more ]  [ reply ]
(Page 6 of 1428)  < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus