I think it is no security reason, but in UNIX i think in the File /etc/password and /etc/shadow the colon may be used as a seperator. Perhaps you are missunderstanding something.
hnd
hasso55@yahoo.com
The really only thing is to Monitor ALL activities of your staff. Even blocking Internet ports does not prevent a user from downloading a Tool which could Transfer Data to Port 80 of an arbitrary server, Which has been prepared for this purpose.
But be careful that you do not violate the...
What I am doing is running Trojancheck. It does not scan. but it reports Activities like Modifying registry, *.ini files and modifying the Autostart.
I think it is pretty reliable.
But a Virusscan is most important, because most Trojans are detected by that way. But Never forget to keep the...
A friend of mine living about 800 km away from me has since today a severe problem.
His XP Workstation hangs during booting. You see some activity on the Hard disk and no more.
A Virus ist pretty unlikely, because he is running his Virusscanner permanent and he keeps his definitions up to date...
Only one thing: In IP-Adressing following Adresses are not allowed:
1. All bits are set to 1, because this would be the Broadcast address of the Subnet.
2. All host bits set 0, because this Adress is equal to the Netmask.
This disallows host-part 0 and 8191. Therefore you have 8190 addresses...
If you are interested in TCP/IP from the programmers view then read the book from Stevens "Unix Network Programming"
If gives you a lot of features in Networking with TCP/IP.
hnd
hasso55@yahoo.com
Install the ODBC (or Native) Driver Connect the program to the Database, Use the class TTable and that is it.
But one thing: If you are working in a networked environment, don't use Access. It is very slow under that conditions.
hnd
hasso55@yahoo.com
I have read abbout algorithms to create Large Prime numbers.
It was described in Garfinkels Book on PGP. I don't have it available in the Moment but i will have a look in that.
hnd
hasso55@yahoo.com
If your Firewall works similar a Proxy Server (Is there an other Way?) then this firewall on the Internet Entry Point should be enough.
But if your Server is connected to the Internet via the same Adapter like the local Network then you could get Problems.
hnd
hasso55@yahoo.com
What i could additional recommend is a Registry Check, wich enforces all autostart entries in Registry, and initialsation files. If something changes it gives you a message.
A know in Germany the Product Trojancheck.
hnd
hasso55@yahoo.com
What i can tell you: The first Adress belongs to Digital-Island.
Only the ports 80 - 83 are open to the Internet. It seems that is a regular PC. perhaps somebody of the students had started a Chat program osr something like that.
hnd
hasso55@yahoo.com
The reason for this activity, may be trivial such as self uptdating some programs or even very dangerous because of a Trojan horse is working or something like that. I can not really tell you something about the true reason from here.
But what i can tell you: Surfing without a firewall and...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.