Latest threads in Networking Firewallsshow only best voted threads

Subject Author Posted Replies
 
Complete Snort Documentation Guide
i found this complet documentation Snort Startup Scripts These scripts are intended to get you started with the startup, reload, and shutdown of Snort on the OSes listed below. Snort Deployment Guides...
 
CFP: 8th International Workshop on Critical Information Infrastructures Security (CRITIS 2013)
** Apologies for multiple copies ** C a l l     F o r     P a p e r s 8th International Workshop on Critical Information Infrastructures Security (CRITIS 2013) Amsterdam, The Netherlands...
 
JADE, a dynamic block cipher (with authentication) based on use of permutation polynomials mod 2**n
Since some readers of this group may have interests in encryptions, I am taking the liberty to post herewith a link to my encryption scheme JADE, which is a block cipher of novel unconventional...
6
6
 
Measures against malware propagation
I read that malware could propagate among computers over USB sticks and like to learn the proper measures of defense. If one has a computer disconnected from the internet and transfer only text files...
16
16
 
Microsoft ISA Server Consultants?
I am looking for a consultant who is extremely expert in Microsoft ISA Server firewall, near San Jose, California. The consultant should also be quite expert in reading network sniffer traces to...
 
very high throughput 7,5 Gb/s firewall - one node.
Hello, I have question about firewall. I need 2 node firewall in active-active con= figuration ( with 10 virtual context)- summary throughput 15 Gb/s ( 7,5 G= b/s at one node ) real traffic. No VPN,...
1
1
 
DNS Changer
Not sure which group to send this to. My daughter's laptop (WIN &) apparently was infected by the DNS changer trojan, and consequently she lost internet connectivity on Monday. She has a Norton...
7
7
 
CHINANET
Could you summarize this into a shorter list? In other words what ranges exactly should one block?
15
15
 
NIDS evasion attacks
We heard about how NIDS can be easily fooled by crafting packets and hence disabiling the NIDS's function. Insertion and evasion attacks due to which it is not able to detect malicious packets. Can...
1
1
 
What i am doing
project is regarding Network security, to be specific network intrusion detection system. Whoever is interested to help me with this project please reply. this may be a good product,but why does...
1
1
 
Sality virus help – how to get rid of w32 Sality.a e malware and its variants
Sality is a malicious file infecter virus that will inject its malicious code into many executable files on an infected computer. This virus also comes with a malware that infects and overwrites the...
 
using your own arin ip block
Hello we have an ip block that we got from ARIN many years ago. We are moving our office to a new location. Our present isp XO allow us to use our own block. Does anyone know how easy it is to find a...
1
1
 
Smart Data recovery virus removal help
Need help to remove Smart Data Recovery virus from your computer? Follow ou= r step by step instructions to uninstall smart datarecovery virus. What is Smart data recovery virus and how to delete it:...
1
1
 
Google redirect virus removal
What is Google search rdirect virus and how to remove it? Google redirect virus, also known as WEB Redirect virus or Yahoo search redirect virus is a most spreading malware virus these days. Google...
3
3
 
IPFW - Changing policy
Here's the situation. I run a low traffic family history/genealogy website on my local box. My "customers" are family members who access the site from their home machines, all of which - so far as I...