IPCop for Small-Business Network: Web Proxy Usage

Thats how AllgeroSurf does it. The way that AllegroSurf is designed, the machines that talk to the Net have to talk through AllegroSurf to do it. You have to set up a proxy, either in AllegroSurf, or with another program, for the machines to get out. That is why I use that now instead of Microsoft ICS. It is a lot more secure, and not vulnerable to O/S exploits like native Windows ICS would be.

Reply to
Charles Newman
Loading thread data ...

Depends - some do get tosses, for the same reason we toss Microsoft and Novell citations. Usually what happens is that we put their name into groups.google.com, and see what their posts look like. Do they have a clue of what they're talking about? Reading a few posts will often weed out a lot. If we don't find any, that raises different flags.

Most popular does not make most useful. As you have demonstrated, the material that microsoft trains and tests to is often wrong or even less than useless. As 'Greg Hennessy ' pointed out to you in message back on Mon, 13 Jun 2005, and I quote:

There is no reputable networking course I know of which would have *not* thought VLSM/CIDR in 1999, it was old hat by then.

the key word is "reputable". Microsoft has proven over and over that international standards that have been around for years and in use by every one else are unknown to them. They can't even be bothered to follow their own published standards. As a result, like you they make use of material that is often meaningless. Intelligent employers know this, and know to avoid those clueless enough to have attended those classes without doing due diligence. They would obviously make unsatisfactory employees even if they somehow made it past the second question in a technical interview. It's like finding that an applicant for a bookkeeping job has never heard of a ten-key, and uses pencil for everything. Hell, if they at least used crayons, the auditors would give them points for that once they stopped laughing.

As far as the certification courses for Linux, a lot depends on who produced the course. I see no need to interview someone if all they know how to do is to click on icons in some GUI specific to one distribution, especially if they don't know what those actions may actually be doing. What happens if their precious GUI won't start? What happens if the box isn't their brand, or perhaps isn't even Linux? What happens if it's a branded UNIX?

That's nice. Diebold runs their ATMs and "voting" machines on windoze. Doesn't that give you confidence? It didn't seem to impress Kevin Shelley.

As most all casinos are operated for the tribes by outside contractors, such a Ballys, Harrahs, and the like, I rather doubt there is any win95 left in the casinos. NGC would have big frowny faces otherwise.

Old guy

Reply to
Moe Trin

Yes, it's a user toy. But why should anyone allow the spam onto the mail server - LONG BEFORE it's seen by your toy application?

You really do need to understand there is a difference between your toy environment - where you don't control the mail server for example because you are just a user - and actually operating real servers, because that difference is enormous. They're not even using the same protocols. I keep pointing out RFCs to you, but I guess you don't know how to find them - a hint = try google. The RFCs you'd need to compare are RFC0821 (in process of being replaced by RFC2821) and RFC1939 (or RFC2061 or RFC3501 - depending on how far behind the times your ISP is).

but _after_ it got onto the mail server - and again I ask why you feel it is desirable for the spam to reach that far? Could it be because you don't understand networking? Or do you merely not understand how email (or just about any other network service) operates. You might try to find copies of the IDG books "Internet for Dummies" - I know there are at least two volumes available. John Levine is a good writer, and gives a fairly simple analogy for a lot of subjects. His explanation for SMTP (email) is aimed more to the user than (for example) Brian Costales in the "bat book".

Uhuh. And you'll be your own network administrator then. Won't it be absolutely thrilling?

That's nice. But then, you may change your mind by then, as you've done in the past. User applications do change over time, and all that.

You can't blame CyBlock - it's a toy application for home users, and really shouldn't be expected to be any more secure than the individual who configured it. But what will you be using the proxy for? Most observatories I know of use web servers, so the public can see their "product", or regular FTP or SCP servers for more "professional" data transfers.

I guess I won't be applying for that then.

Old guy

Reply to
Moe Trin

Web Results 1 - 10 of about 53,500 for WebWasher Linux. (0.78 seconds)

Q: What is required for WebWasher?

A: You need a standard PC with an Internet connection. Your Linux distribution should contain at least glibc 2.1. WebWasher is known to work with:Debian * GNU/Linux 2.2 (potato) and 2.3 (woody) * Linux Mandrake 7.1 * RedHat Linux 6.1 and 7.0 * SuSE Linux 7.0 * SuSE Linux 7.1 (the install script displays an error, but you can ignore that)

Those are five year old distributions. As I recall it didn't offer much compared to other web proxies. Most had switched to Squid by then.

Yes, but all of this is what I call 'dumb user' applications. They are for users who don't know how to configure the existing tools, and try buying some panacea app.

So? It's still a toy meant for the home user who doen't know any better.

Old guy

Reply to
Moe Trin

WW is not a toy. While they dont have the freeware version anymore. They still sell paid versions of thier product to corporations. You might want to check out

formatting link
and you will see that WebWasher is not a toy, and the paid versions of WebWasher that replaced the freeware versions I see have even more capabilities than the old freeware stuff they used to have. I see they even have a hardware appliance that obviously has capabilities that a mere router from Cisco, or similar companies does not have. Given what the old freeware version of WebWasher can do, I would recommend the paid versions that replaced it, to any company that is serious about content filtering. Considering what the old freeware version could do, and that the paid versions that replaced it appear to have even more features, WebWasher would be the best to handle your filtering needs.

Reply to
Charles Newman

X-No-Archive: Yes

I have all these programs running as a service on the gateway machine, so I dont have to be actually logged on, when they are running. They all run in the background, and I only need to log on to machine when I need to re-boot, so that updates for my anti-spam, web filter, and anti-virus software can take effect. All you need is a program, like FireDaemon, or something similar, and you can run all this stuff as a service in the background. Since nobody is actually logged on, Windows is not actually running anything but my networking programs running as a service.

Reply to
Charles Newman

X-No-Archive: Yes

The gateway machine would be the computer that does all the routing, filtering, etc. A computer running a NAT program would be a gateway machine. On my network, I have one machine that handles all the networking tasks, with the

3 machines behind it. Such a computer running the network handles all the networking chores. It has 2 NIC cards in it, and the other computers sit behind it connected to it through a hub. One NIC card is connected to the Internet, the other to the hub with the 3 network PCs behind it. This machine runs AllegroSurf for routing/NAT, Tiny Personal Firewall for firewall protection, SpamBam for spam filtering, NewsProxy for Usenet filtering, and WebWasher 3.0, which does Web fitering, pop-up blocking, cookie crushing, ad-blocking, and HTTP proxy all in one program.

Thats a totally diffferent operation. What this guy did was work on designing the Windows-based software for WaMu's system back in 1998.

Some of the indian casinos run their entire operation on Windows PCs

Reply to
Charles Newman

Avast anti-virus scans everything coming in or out for viruses, worms, and trojans. It one is detected, the entire LAN is shut down, until I log on and acknowledge Avast, and tell it what I want to do, either isolate it, or delete it. And there is no way to stop Spam hitting your mail server other than using some kind of Anti- spam software, and the SpamBam POP/SMTP proxy is the best I have seen. As I have said before it scans your Email as it comes in for known spammers, when there is a hit on the blacklist, SpamBam drops it, before it can ever see the light of day in your inboz. It there is a hit on the blacklist, it is deleted, and not released to your Email program. Any POP-based Email program can communicate with SpamBam., you just tell it to communicate with the proxy for mail, and tell it what ports SpamBam is using, and after that, its all automatic.

No, Avast, running as a serivce, is constantly on guard for any malware. If it detects any malware coming in our out, the LAN is halted, to halt any spread of whatever it found.

Reply to
Charles Newman

Can you show me the international standard that says that XNA must be honored by all archives? By the way, what's the retention rate on your news server? On the news spool I'm looking at now:

[gemini $] find /var/spool/news/news/comp/os/linux/ -type f -exec grep '^X-No-Archive: ' {} \\; | wc -l 61 [gemini $] find /var/spool/news/news/comp/os/linux/ -type f | wc -l 10841 [gemini $]

Any clue what that means? And did you read the last sentence you quoted above?

Wow, that must be an unsolvable problem then.

You might want to learn to use google groups - particularly the advanced group search tool. See a lot of the people who receive help on Usenet are like you - and fail to trim their quotes. And even the crappiest news reader (and non-news-reader like Outhouse Expunge) puts in an attribute line by default - it's an accepted tradition For example;

Results 1 - 10 of 1,830 for Charles Newman comcast. com (0.30 seconds)

And that's just for 01-Jan-2005 to date. Hmmm, what's this in rec.travel.air? Now, I very much doubt that google is archiving the alt.binaries.pictures.erotica.hamsters.duct-tape group, but I'd also expect that if you had any common sense, you'd use a different posting mechanism - like a mail.2.news proxy - when you post there.

Why don't you mail me more details.

That must be a hell of a surprise to the Feds. What's the name of the interface with the reserve bank? PowerPoint?

So they bond interns, but don't have them sign NDAs?

We had two branches locally - I'll spread the word.

What is a "gateway machine"? Is that another buzz-word you thought you learned?

I'll have to tell that to the IT supervisor. By the way, did you check your credit report? That little breach of security at CardSystems in Tucson AZ was the result of a windoze virus - see the New York Times story.

40,000,000 credit cards _MAY_ have been compromised - and 70,000 bogus charges have already been reported. Is that another of your friends who helped them set up their data system?

And that's supposed to be impressive exactly how?

Old guy

Reply to
Moe Trin

Oh, so you've analyzed the code, and determined that your toy application replaces the network stack on windoze? Or are you just reading the advertisements again? How does it handle Type 4 protocol packets? Type 41? Type 94? How about RFC2529, or do you think that's a non- issue?

Old guy

Reply to
Moe Trin

Sure looks like a toy to me - why else would you be using it instead of setting up your firewall properly. Or do you just not understand RFC1945 and RFC2616? RFC2965 also might be worth reading.

Considering that a router is not a proxy server, that's understandable. But why try to compare the two when they're not meant to do the same thing. If you want to compare hardware appliances, do so - but compare tools that are meant to provide the same results.

Given your expertise, your recommendation may not have much influence. You don't seem to understand routing, protocols used by servers... I think you may be missing some things.

which was quite limited compared to other similar applications

And you've analyzed the concept that it's using and you feel that its reliable.

And what exactly are my filtering needs?

Old guy

Reply to
Moe Trin

That's great - but it's still a user toy of no use what so ever. If you ever expect to run that observatory, you'll be hard pressed to run anything useful, because you are wasting server resources receiving spam, worms, and other stuff - there won't be the bandwidth for you to download stuff to your proxy server.

So, you feel it's better to run all the anti-malware to remove the bad stuff after your toy setup installs the malware for you? Seems rather pointless to me - but I guess you believe that it's the software fairy that installs all that mal-ware for you when you aren't looking.

I happen to believe it's better not to install the malware, just as it's better to not allow the spam onto the the mail server.

You wonder why you need a Gig of RAM and that 64 bit system? Maybe if you didn't waste CPU cycles installing the malware you wouldn't have this problem.

Why would I need this? Remember, I don't use a toy operating system. Run something in the background? or as a daemon? Those are different functions - one using '&' because the user remains logged in, one using 'nohup' which allows the user to log out, yet the service continues.

Then why do you need a 64 bit processor, and a Gig of RAM if nothing is running? How is the software fairy installing the mal-ware? I didn't think windoze had a user named nobody. Is that the username that the software fairy is using when it's doing it's thing?

Old guy

Reply to
Moe Trin

Just noticed that - you'd think they'd be able to replace that mainframe with just about anything simpler. You could use something like Procomm on a DOS box to server terminals. You might want to look into that.

So, you think that Permenente is using an IBM mainframe exactly the same way you are using your toy gateway? My, that seems like quite a waste of healthcare dollars (never understood why people used Permenente, as when the annual benefits choice program came around, they were always the more expensive with less covered services - even Cigna or Blue Cross of California was a better deal).

You do realize they'd have to have a pretty complex networking setup - seeing as how Kaiser Sacramento is in the 198.x.x.x/19 block, Kaiser NorCal (Walnut Creek) is in 162.x.x.x/16, and Kaiser SoCal (also Walnut Creek) is on 167.x.x.x/16, and I'm not even mentioning Kaiser Colorado, Kaiser Georgia, Kaiser Mid-Atlantic, Kaiser Ohio, or Kaiser Texas - all using different net-blocks.

But then, maybe your use of the word 'gateway' in connection with the word 'mainframe' is just the result of your jargon buzzword generator, and you really are not sure what it's actually used for. By the way, the gateway hosts I can see at Walnut Creek seem to be Ciscos.

Ah, so you don't have access a dictionary either.

Seems rather inefficient. It would be much easier if all computers could talk directly with all others on your network, instead of having to go through the gateway box. What happens to your networking when the gateway crashes, or when you have to reboot it because you moved the mouse.

Wow, that's a complicated setup - I'm sure you didn't learn that setup in your 1999 microsoft networking class.

Old guy

Reply to
Moe Trin

That technique will only work on a toy network - and is a perfect example of a self imposed denial of service attack.

That's because you don't understand fundamental network concepts. In another post in this thread, you described how XNA would prevent name harvesting. I asked you to mail me details, but haven't seen anything from you. Did you try to mail it directly? That wouldn't work, because we block all access from 67.160.0.0 - 67.191.191.255. This block prevents spam from this Comcast block. You see, if a windoze zombie such as your toy gateway trys to send malware - my mail server doesn't even know about it - so your method of "receive the nalware/spam from outside (wasting Internet bandwidth), save it one the mail server (wasting disk space) until Charles manages to get his toy application to download the crap and inspect it (wasting your bandwidth and processor time) is not needed.

That must be a huge blacklist - last time I looked at the 'From:' and 'Envelope Sender:' headers on spams (such as the thousands of examples posted to news.admin.net-abuse.sightings) the names rarely repeated. You'd have a lot better luck using simpler algorithms - like deleting any mail whose 'Received:' header shows it came from a zombie domain like Comcast or ATT.

But that's after it's wasted the bandwidth and space getting onto your server. I'm happier not letting it get that far.

Wouldn't it be wonderful if Comcast used that on ALL of their routers? Just think how much less spam, viruses, worms, trojans and all that you would no longer have to worry about. You really should suggest that to Comcast - I'm sure they'd be pleased to hear the suggestion.

Old guy

Reply to
Moe Trin

I can't begin to tell you how much that made me laugh. Do you think Chucky is trolling, or is really that stupid? It can't be ignorance, he'd know better by now.

Reply to
Micheal Robert Zium

I think that Chuck is Trackers old-man, or Tracker pretending to be smart :-)

Reply to
Leythos

You shouldn't. I think it's a brilliant idea, and Charles should be talking long and hard to Comcast, and Pacific Bell (pacbell and pbi are part of SBC, along with Ameritech, SNET, and SWBell). Think what a vast improvement we'd see.

I think it's a fantasy world he lives in where everything must be just like what he sees on his computers. What I'm worried about is that he's going to take his expertise as a microsoft flight simulator pilot and think he really can fly that 747 into Sacramento Executive airport (You can, Charles - you really can! You might want to be pretty aggressive on the brakes and reverse though. Just watch the gross weight - you probably need to be under 353,000 pounds and +30C if AC150/5325-4 is to be believed.)

Old guy

Reply to
Moe Trin

Wash your mouth out with carbolic soap RIGHT NOW!!!

Old guy

Reply to
Moe Trin

The runways are not long enough at Sacramento Executive Arport for a 747. You need at least 10.450 feet for takeoff and 7900 feet for landing. I dont think the runway would be long enough for either.

Reply to
Charles Newman

Note the weight and temp. You probably do need the wind right down the chute though, and I'll agree that this would likely make the airport people more than slightly unhappy with you, but then, your chances of gaining access to a real live 747 are probably not to good either. Oh, and yes, I do have a commercial pilots license.

Is that what it says in your official microsoft pilots handbook? You should know by now that they are lying to you. How long do you think runways 1L/19R and 1R/19L are at SFO? What's the longest runway at San Jose? San Diego (even ignoring the hill at the East end)? What about Moffett? Oakland? 6L/24R and 6R/24L at Los Angles? How about Stockton, which has been used as a training runway? How about Reno (a bigger problem, because the airport is at 4412 feet above sea level). Seattle Boeing/King County International (BFI)? Seattle/Tacoma (SEA) runway 16R/34L? Spokane? How about Everett, WHERE THEY BUILD THE D*MN THING?

2/20 is 5503 feet long, 150 foot wide. Why do you think I suggested that you'd want the weight down (or doesn't microsoft know about that)? In fact, the landing case is limiting. Takeoff, even up to 550,000 pounds is well within that runway length.

Don't believe me? Try googling for the 747 flight manual and look for the runway performance charts. Grab the page from Boeing, or one of the airlines - the microsoft data is obvious lies.

Old guy

Reply to
Moe Trin

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.