Security Basics mailing list archives
RE: Identifying a computer
From: "Jason Balicki" <kodak () frontierhomemortgage com>
Date: Thu, 4 Dec 2003 08:53:37 -0600
1) Sniff the traffic and get the mac address 2) Look up the mac on your switch and find out what port it is on 3) disable the port or go yank it out of the wall.
4) locate other end of cable 5) whip guilty party with said cable until guilty party passes out 6) tie up guilty party with said cable 7) lock guilty party in supply closet 8) demand "it will put the lotion on it's skin, or it gets the cat-5 again" You won't have any more trouble with the guilty party. No, no, I'm not bitter. --J(K) --------------------------------------------------------------------------- ----------------------------------------------------------------------------
Current thread:
- Epithet Steve . Kirby (Dec 02)
- Re: Epithet Alexander Lukyanenko (Dec 02)
- Identifying a computer Cheetah (Dec 03)
- Re: Identifying a computer Bryan Allen (Dec 03)
- RE: Identifying a computer Optrics Engineering - Shaun Sturby, MCSE (Dec 03)
- Re: Identifying a computer Ranjeet Shetye (Dec 03)
- Re: Identifying a computer ~Kevin DavisĀ³ (Dec 04)
- Re: Identifying a computer Ranjeet Shetye (Dec 05)
- Identifying a computer Cheetah (Dec 03)
- RE: Identifying a computer David Gillett (Dec 03)
- Re: Identifying a computer Tim Willard (Dec 03)
- RE: Identifying a computer Jason Balicki (Dec 04)
- Re: Identifying a computer Meritt James (Dec 05)
- Re: Epithet Alexander Lukyanenko (Dec 02)
- RE: Identifying a computer Duston Sickler (Dec 04)
- Re: Identifying a computer Andy Cuff [Talisker] (Dec 04)
- Re: Identifying a computer David Glosser (Dec 19)
- Re: Identifying a computer Peter Wohlers (Dec 19)
- <Possible follow-ups>
- Re: Epithet SMiller (Dec 02)
- Re: Epithet Jimi Thompson (Dec 08)
- Re: Epithet Meritt James (Dec 08)
- Re: Epithet Jimi Thompson (Dec 11)
- Re: Epithet Jimi Thompson (Dec 08)