Security Basics mailing list archives

Re: When some is infected?


From: ToddAndMargo <ToddAndMargo () zoho com>
Date: Fri, 25 Oct 2013 16:45:10 -0700



Hi! This is the ezmlm program. I'm managing the
security-basics () securityfocus com mailing list.

I'm working for my owner, who can be reached
at security-basics-owner () securityfocus com.

I'm sorry, the list moderators for the security-basics list
have failed to act on your post. Thus, I'm returning it to you.
If you feel that this is in error, please repost the message
or contact a list moderator directly.

--- Enclosed, please find the message you sent.


Re: When some is infected?.eml
Subject:
Re: When some is infected?
From:
ToddAndMargo <ToddAndMargo () zoho com>
Date:
10/17/2013 10:34 AM
To:
"security-basics () securityfocus com" <security-basics () securityfocus com>

Hi! This is the ezmlm program. I'm managing the
security-basics () securityfocus com mailing list.

I'm working for my owner, who can be reached
at security-basics-owner () securityfocus com.

I'm sorry, the list moderators for the security-basics list
have failed to act on your post. Thus, I'm returning it to you.
If you feel that this is in error, please repost the message
or contact a list moderator directly.

--- Enclosed, please find the message you sent.


Re: When some is infected?.eml
Subject:
Re: When some is infected?
From:
ToddAndMargo <ToddAndMargo () zoho com>
Date:
10/11/2013 06:12 PM
To:
Techfrog <nhayden () techfrog biz>, "security-basics () securityfocus com" <security-basics () securityfocus com>

On 10/11/2013 09:02 AM, Techfrog wrote:
> If they're good enough and want to get by you they're going too. Wireshark is a great too, but if the data stream is encrypted your not going to see much.
>
> Sent from my iPhone
>

Thank you.  Mainly I was looking for traffic going to weird places.


>> On Oct 10, 2013, at 11:11 PM, ToddAndMargo <ToddAndMargo () zoho com> wrote:
>>
>> Hi All,
>>
>>    Since I sell Kaspersky and have had a lot of customers
>> on it for years, I have learned that if something gets
>> by Kaspersky, it is going to be a wild ride getting rid
>> of it.   (I get rid of them manually and/or run other
>> vendors stuff at the computer.)
>>
>>    Now a days, when I walk up to a protected computer,
>> my thoughts are "maybe".  Did something get past that is not
>> being detected?
>>
>>    Now I am thinking that a well crafted bad guy is
>> going to get past "penetration testing" (PEN).  Although
>> find anything like this is not the scope of PEN
>> testing, I am still thinking it would be ethical
>> to see if any traffic is sneak out that is not suppose
>> to be.
>>
>>   So I was thinking that I should turn off all network
>> traffic producing programs I know of on the POS computer,
>> and just sit watching its outgoing traffic to make
>> sure there is no bad guy Command and Control going on.
>> Does this make sense to you?
>>
>>    Is Wireshark the proper tool for this?
>>
>> Your thoughts always appreciated.
>>
>> -T



------------------------------------------------------------------------
Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate.  We look at how SSL works, how 
it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, 
install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are 
highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates.

http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1
------------------------------------------------------------------------


Current thread: