VPN security vrs Internet SecurityI think I'm missing something really obvious and simple, but I can't work
this out, and I can't work out why I don't know. I've been listening to GRC
podcasts (14 & 15) on VPN , very interesting. But I can't grasp a very
simple issue.
You talk about the insecurity of wifi in hotels, cafes etc and suggest a VPN
to your home router as the solution. In the wifi location people could sniff
your passwords to email, ftp account, banking, etc ... but VPN your
connection to home and it's safe from there.
Why is it any safer from your home router ... wh...
security too secureName: joe
Product: Firefox
Summary: security too secure
Comments:
The security thing won't let me in this sight no matter how I accept,
confirm, get certificate, etc.
https://www.vtext.com/customer_site/jsp/messaging_lo.jsp
Browser Details: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.4; en-GB; rv:1.9.1b4) Gecko/20090423 Firefox/3.5b4
From URL: http://hendrix.mozilla.org/
Note to readers: Hendrix gives no expectation of a response to this feedback
but if you wish to provide one you must BCC (not CC) the sender for them to
see it.
...
How secure is secure?Thanks to this group and all the high tech individuals who frequent it I
have learned how to protect my PC from the inside out. But what about
security risks to my info 'before' it gets to my computer? Like my mail
box on the server. Could someone hack into that and thumb through my
mail?
If so, how would I ever know?
(The short story)
We have a rogue employee at my work who one day decided to run the web
site, she got in tight with the ISP, got tools to set and delete
passwords on a protected directory on the server. Who knows if she has
telnet access to other things, li...
when is secure, secure?Lo everyone,
I wrote a custom authentication handler for PureFTPD, using a combination of
authentication methods, for about 4 different types of users.
So far, from testing it, it does look to work properly, and does it's job
pretty well (and fast). I use #!/usr/bin/perl -W as well as use Strict, and
use warnings, and the code returns no errors or warnings when run.
I am right to presume that this basically only really tells me the my syntax
and structure of the application is right? What's a good way to see whether
it is actually SECURE... There is a couple of lines of...
VPN Security OptionsI am of the understanding that once a VPN tunnel is set up data is
effectively hidden from the internet.
I've got a Draytek Vigor 2600 router which gives extra VPN security
options so what are the advantages or disadvantages of extra VPN
security options.
Geoff Lane
Geoff Lane wrote:
> I am of the understanding that once a VPN tunnel is set up data is
> effectively hidden from the internet.
> I've got a Draytek Vigor 2600 router which gives extra VPN security
> options so what are the advantages or disadvantages of extra VPN
> security options.
Not s...
VPN or not for highest securityA theoretical question for y'all:
A client wants to set up a machine for an employee to take home and is
very concerned about opening up his network to potential damage in
whatever form. The at-home employee has no need of Netware services,
only to connect to a single, dedicated-purpose computer that hosts
video
camera surveillance software - basically a way for the shop supervisor
to keep an eye on the 24 x 7 shop when he's not there.
If we place the dedicated-purpose machine on the private side and set
up
the VPN client and allow the remote user to come in that way...
VPN Security LevelsMy daughter is soon taking her netbook computer on holiday, her hotel
has a wifi connection.
As I do not know what security is in force I would like to set up a VPN
connection to my home network as my Draytek Vigor 2600 has an inbuilt
VPN server.
My router supports pptp, L2TP and IPsec.
I have initially set up a L2TP using IPSec and AES encryption.
I'm assuming the username and password are merely for login on so does
the TKIP key provide the encryption and if so is it the longer the better.
Geoff Lane
Geoff Lane wrote:
> My daughter is soon taking her netbook ...
Novell vpn wireless securityHas any one tried this vpn client for wireless security I am tring to
see if it is worth my time. My current problem is that with 802.1x
auth and EAP-PEAP you have to login workstation only so that the
wireless connection can startup authenticate and then get an ip. Then
you can login to novell. With the VPN client I have an idea that if I
make the wireless network security open the computer will get an ip
before I login to the Novell client. Then you can login to vpn and
authenticate with novell together. Then if that works the question of
roaming and how the vpn tunnel stays connec...
SecurityThis is a multi-part message in MIME format.
--------------080100010401000103080002
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
I'm a Mac user 10.4.8 of Thunderbird 1.5.0.7 & am wondering how
"Enabling FIPS" will improve my security? I can't seem to find any
explanation of FIPS under Thunderbird help.
--
Have a good day R Schwager
--------------080100010401000103080002
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Tr...
Security VS VPN channelsHi !
We just purchased some LinkSys BEFVP41 and wish to use their VPN
inter-connectivity capability to connect distant LANs over Internet
connections.
Can anyone comment on the inherent security problems it might cause ? Are
there recommendations that you can give at tech guy who is not very good at
hacking ? :) Or can you give me indications to some good documentation
that could help me ?
Thank you,
KodDiv
Their VPN is just as secure as any, it depends on how its set up.
I use and setup VPN's at least twice a week. Its usually with Cisco
PIX, or Sonicwalls, but I h...
form security against security
i have a form in my website which is to be filled by user and that form stores in database(sql server 2005).
but someone told me that anyone can run script in textboxes in that form and can damage database,
so how to avoid such security lack.
it is common practice to use parameterized sql statements or stored procs to insure you are protected from sql injections attacks.
if you concatenate user input directly into a sql statement, then you are at risk.Mike Banavige~~~~~~~~~~~~Need a site code sample in a different language? Try converting it with: http://converte...
Secure connections: how secure are they?*QUOTE*
......... both useful and malicious information can be transmitted via network
connections. Standard solutions protect computers against threats present in
standard network connections, but aren't able to counter threats present in
secure connections. Verifying the contents of a secure connection is
impossible by virtue of its secure nature, as demonstrated by the different
types of protection listed above. As a result, malicious data within secure
channels can cause a significant amount of damage, and sometimes more than if
it were to be transmitted via a standard, non-s...
Password secure...is it secure?Yes I just got this baby and I LOVE it! Its great. I have stored all my
passwords inside of it (and yes made a few backups from them in secure
locations) How secure is this program really? It uses blowfish to encrypt
the database but how strong blowfish? 128bits? 256? 448?
Anything else I should think about it? I have putted it and its databases
inside PGPdisk just to play it safe...but then again Im a paranoid. :)
--
Markus Jansson
************************************
My privacy related homepage and PGP keys:
http://www.geocities.com/jansson_markus/
********...
How secure is AuthenticationTypes.Secure?
I understand that AuthenticationTypes.Secure requests secure authentication using Kerberos or NTLM (??). However, here is a scenario I am trying to understand. Let us say that I am having a regular ASP.NET site - with SSL certificates not installed on the web server. The login sends the request out to an AD server which also does not have certificates installed. However, I have set Secure flag to AuthenticationTypes.Secure. When the username and password data gets transmitted between the application and the LDAP server, how secure are the password and username info? In other words is this in...
How secure is secure enough?July 28, 2008 (Computerworld) This story originally appeared in
Computerworld's print edition.
If there is a Holy Grail in the information security industry, it surely is
the answer to the question, "How secure is secure enough?"
It's a question that many security managers have either avoided answering
altogether or tried to quickly sidestep by throwing a fistful of mainly
pointless operational metrics at anyone who cared to ask.
http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=321921&intsrc=hm_list
--
"Never d...