Stories
Slash Boxes
Comments
NOTE: use Perl; is on undef hiatus. You can read content, but you can't post it. More info will be forthcoming forthcomingly.

All the Perl that's Practical to Extract and Report

The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
 Full
 Abbreviated
 Hidden
More | Login | Reply
Loading... please wait.
  • by include (5594) on 2005.06.16 10:08 (#41204) Homepage Journal
    Hello atj, i had a boss like that,, and in that time i used facts like: Sans Institute [sans.org]
    rlogin is listed in this report since it's born :)

    " Remember Star Trek's transporter mechanism? "Beam me up, Scotty" allowed Jim Kirk, Spock, and their friends to be transported from one place to another instantaneously. Well, that is science fiction, but it is an analogy that is useful in describing how computer systems vulnerabilities are exploited. by Larry Rogers"

    Now as you can see,, there are many people making Security CheckLists,, and all they talk about plain-text-logins :).

    CERT [cert.org]
    AusCERT [auscert.org.au]
    Infosyssec [infosyssec.net]
    SecurityMap [securitymap.net]

    :) if your boss have some time to spend please check this out :) Unix Timeline [levenez.com], and seek where BSD enters in the Unix History :), dont get surprised :)

    Meanwhile if you are trying to find some good app to sniff your network,, ok go for it,, but then just make sure anybody else sniffs your network :).

    some toolsFreeBSD Ports Collection/Security [freebsd.org]

    bye and good luck