Firewall Wizards: by author

247 messages starting Aug 30 98 and ending Aug 19 98
Date index | Thread index | Author index


Aaron Bawcom

Re: Packetfilter NICs Aaron Bawcom (Aug 30)

Adam Shostack

Re: securing X.25 connection Adam Shostack (Aug 09)
What about Traffic Analysis? Adam Shostack (Aug 06)
Re: Screening Outgoing Mail for Content Adam Shostack (Aug 11)
password aging Adam Shostack (Aug 19)
Re: What about Traffic Analysis? Adam Shostack (Aug 07)
Re: password aging Adam Shostack (Aug 24)
Re: Brute force attacks Adam Shostack (Aug 13)
Re: WORM file system for logging Adam Shostack (Aug 06)

Aleph One

Re: Cisco PIX bug, discussions (lenghty) Aleph One (Aug 28)
Re: Cisco PIX bug, discussions (lenghty) Aleph One (Aug 27)
Re: Cisco PIX bug, discussions (lengthy) Aleph One (Aug 28)

Allen Todd

Shared DMZ liability Allen Todd (Aug 19)

Andreas Siegert

Re: WORM file system for logging Andreas Siegert (Aug 06)
Re: WORM file system for logging Andreas Siegert (Aug 07)
WORM file system for logging Andreas Siegert (Aug 03)
Re: WORM file system for logging Andreas Siegert (Aug 04)

Andrea . Zuccollo

Re[2]: WORM file system for logging Andrea . Zuccollo (Aug 07)

Andrew J. Luca

RE: Network cables as security devices Andrew J. Luca (Aug 24)
RE: WORM file system for logging Andrew J. Luca (Aug 05)
RE: WORM file system for logging Andrew J. Luca (Aug 07)

Anton J Aylward, CISSP

Only Mission Critical (was RE: Denial of service) Anton J Aylward, CISSP (Aug 25)

Area de Seguridad en Computo

Computer Security Day (DISC 98) in Mexico Area de Seguridad en Computo (Aug 04)

ark

Re: securing X.25 connection ark (Aug 03)
Re: IDS outside of firewall? ark (Aug 05)
DES token cards (SNK,Enigma,whatever..)? ark (Aug 11)
Re: network security book information sought ark (Aug 06)

Ashish Desai

CD-R writer software Ashish Desai (Aug 06)

Bennett Todd

Re: securing X.25 connection Bennett Todd (Aug 03)
Re: Screening Outgoing Mail for Content Bennett Todd (Aug 12)
Re: Screening Outgoing Mail for Content Bennett Todd (Aug 05)
Re: Shared DMZ liability Bennett Todd (Aug 19)
Re: Denial of service Bennett Todd (Aug 19)
Re: What about Traffic Analysis? Bennett Todd (Aug 07)

Biggerstaff, Craig T

RE: Denial of service Biggerstaff, Craig T (Aug 24)

Bobo Rajec

Re: WORM file system for logging Bobo Rajec (Aug 07)

Brian Steele

Re: Screening Outgoing Mail for Content Brian Steele (Aug 10)

Bruce B. Platt

Screening Outgoing Mail for Content Bruce B. Platt (Aug 04)
Re: Screening Outgoing Mail for Content Bruce B. Platt (Aug 07)

Bruce K. Marshall

Network cables as security devices Bruce K. Marshall (Aug 23)

Carlos Bachmaier

Re: WORM file system for logging Carlos Bachmaier (Aug 03)

cfb

Re: Screening Outgoing Mail for Content and other things cfb (Aug 06)

Chad Schieken

Re: Screening Outgoing Mail for Content6 Chad Schieken (Aug 05)
Re: Re[2]: Shared DMZ liability Chad Schieken (Aug 25)

Choi, Byoung

RE: Human Error in Information Security Choi, Byoung (Aug 05)

Chris Crozier

RE: Screening Outgoing Mail for Content Chris Crozier (Aug 10)
Re: Screening Outgoing Mail for Content Chris Crozier (Aug 09)

Chris Shenton

Re: NetMeeting secure? Chris Shenton (Aug 28)

City

Denial of service City (Aug 17)

Craig H. Rowland

Re: IDS outside of firewall? Craig H. Rowland (Aug 03)

Cynthia Deno

Call for Papers: USENIX Workshop on Intrusion Detection Cynthia Deno (Aug 11)

Damir Rajnovic

Re: Network cables as security devices Damir Rajnovic (Aug 24)

Daniel J. Gregor Jr.

Re: Scans to ports 1090 and 1080 Daniel J. Gregor Jr. (Aug 17)
Re: DES token cards (SNK,Enigma,whatever..)? Daniel J. Gregor Jr. (Aug 12)

Dave O'Shea

Re: Screening Outgoing Mail for Content Dave O'Shea (Aug 05)
Re: Screening Outgoing Mail for Content Dave O'Shea (Aug 05)

David C Niemi

RE: Denial of service David C Niemi (Aug 19)
RE: Denial of service David C Niemi (Aug 23)

David Collier-Brown

Re: WORM file system for logging David Collier-Brown (Aug 05)
Re: Shared DMZ liability David Collier-Brown (Aug 19)

David Lang

Re: DES token cards (SNK,Enigma,whatever..)? David Lang (Aug 12)

Dean_Ethier

Re: Screening Outgoing Mail for Content Dean_Ethier (Aug 11)
Re: Screening Outgoing Mail for Content Dean_Ethier (Aug 05)

Dean Michaels

Re: Executives liable for computer crime? (update) Dean Michaels (Aug 27)

Didier CONTIS

Filtering Java applet/ActiveX Didier CONTIS (Aug 27)

Dominique Brezinski

Re: Network cables as security devices Dominique Brezinski (Aug 27)

Don Cox

NetMeeting secure? Don Cox (Aug 27)

Doug Hughes

Re: WORM file system for logging Doug Hughes (Aug 07)

Eric Vyncke

Re: Cisco PIX bug, discussions (lenghty) Eric Vyncke (Aug 25)
Re: Cisco PIX bug, discussions (lenghty) Eric Vyncke (Aug 25)
Re: Cisco PIX bug, discussions (lenghty) Eric Vyncke (Aug 28)

Erlend Midttun

Re: Scans to ports 1090 and 1080 Erlend Midttun (Aug 18)

Euan

Re: Cisco PIX bug, discussions (lenghty) Euan (Aug 26)
RE: Log File Formats... Euan (Aug 25)

Francis, Catherine

RE: Screening Outgoing Mail for Content Francis, Catherine (Aug 07)

Frank de Jong

Re: Denial of service Frank de Jong (Aug 19)

Frank Willoughby

Re: Shared DMZ liability Frank Willoughby (Aug 23)
Re: Cisco PIX bug, discussions (lengthy) Frank Willoughby (Aug 26)
Re: Shared DMZ liability Frank Willoughby (Aug 19)
Re: securing X.25 connection Frank Willoughby (Aug 03)

g

securing X.25 connection g (Aug 02)

Gary Crumrine

RE: Screening Outgoing Mail for Content Gary Crumrine (Aug 12)
RE: finding undocumented external connections Gary Crumrine (Aug 05)
RE: Screening Outgoing Mail for Content Gary Crumrine (Aug 12)

Gigi Sullivan

Re: Denial of service Gigi Sullivan (Aug 19)
Re: Scans to ports 1090 and 1080 Gigi Sullivan (Aug 17)

Godfrey_Cureton

Re: Screening Outgoing Mail for Content Godfrey_Cureton (Aug 05)

Harvey Nusz

network security book information sought Harvey Nusz (Aug 05)
Re:password aging Harvey Nusz (Aug 19)
Re[2]: network security book information sought Harvey Nusz (Aug 06)

HASSAN . KARIM

Re: Denial of service HASSAN . KARIM (Aug 19)
Re: password aging HASSAN . KARIM (Aug 19)

Henry Hertz Hobbit

Re: IDS outside of firewall? Henry Hertz Hobbit (Aug 04)
Re: What about Traffic Analysis? Henry Hertz Hobbit (Aug 07)
Re: Executives liable for computer crime? (update) Henry Hertz Hobbit (Aug 27)

H. Morrow Long

Re: password aging H. Morrow Long (Aug 23)

Hubert Weikert

Re: Log File Formats... Hubert Weikert (Aug 25)

ICMan

Re: Denial of service ICMan (Aug 19)

James Wilson

Re: Shared DMZ liability James Wilson (Aug 23)

Jefferson County Rural Library

Firewalls supporting Z39.50 Jefferson County Rural Library (Aug 03)

Jeff Maddox

Re: IDS outside of firewall? Jeff Maddox (Aug 04)

Jeff Sedayao

Re: IDS outside of firewall? Jeff Sedayao (Aug 05)
RE: What about Traffic Analysis? Jeff Sedayao (Aug 07)

Jennifer Galvin

Re: IDS outside of firewall? Jennifer Galvin (Aug 03)
Re: NetMeeting secure? (fwd) Jennifer Galvin (Aug 28)
Re: IDS outside of firewall? Jennifer Galvin (Aug 03)

Jeremy Epstein

Re: Screening Outgoing Mail for Content Jeremy Epstein (Aug 11)

Jim Wamsley 303-673-8163

RE: Denial of service Jim Wamsley 303-673-8163 (Aug 25)

joe harlin

Brute force attacks joe harlin (Aug 12)

john madincea

RE: meaning of "both" in a filter statement john madincea (Aug 02)

John McDermott

Re: password aging John McDermott (Aug 24)
RE: Simple demo John McDermott (Aug 28)
Re: Cisco PIX bug, discussions (lengthy) John McDermott (Aug 27)

Joseph S. D. Yao

Re: Screening Outgoing Mail for Content Joseph S. D. Yao (Aug 10)
Re: Cisco PIX bug, discussions (lenghty) Joseph S. D. Yao (Aug 26)
Re: Screening Outgoing Mail for Content6 Joseph S. D. Yao (Aug 06)
Re: Screening Outgoing Mail for Content Joseph S. D. Yao (Aug 05)
Re: Denial of service Joseph S. D. Yao (Aug 18)
Re: Log File Formats... Joseph S. D. Yao (Aug 25)
Re: IDS outside of firewall? Joseph S. D. Yao (Aug 03)
Re: WORM file system for logging Joseph S. D. Yao (Aug 06)
Re: meaning of "both" in a filter statement Joseph S. D. Yao (Aug 02)
Re: IDS outside of firewall? Joseph S. D. Yao (Aug 06)
Re: meaning of "both" in a filter statement Joseph S. D. Yao (Aug 02)
Re: network security book information sought Joseph S. D. Yao (Aug 06)
Re: Screening Outgoing Mail for Content Joseph S. D. Yao (Aug 05)
Re: Firewalls supporting Z39.50 Joseph S. D. Yao (Aug 03)

Kal Kurm

RE: network security book information sought Kal Kurm (Aug 05)

kb

AW: CD-R writer software kb (Aug 13)

Kevin Steves

Re: Cisco PIX bug, discussions (lenghty) Kevin Steves (Aug 28)

Kevin T. Shivers

Re: Denial of service Kevin T. Shivers (Aug 18)

Kinczli Zoltán

Re: Scans to ports 1090 and 1080 Kinczli Zoltán (Aug 18)

KirkAdams

RE: Network cables as security devices KirkAdams (Aug 30)
RE: password aging KirkAdams (Aug 30)

Laris Benkis

Re: Log File Formats... Laris Benkis (Aug 27)
Re: NetMeeting secure? Laris Benkis (Aug 28)

Logic Man

Re: Denial of service Logic Man (Aug 19)

Lyndon David

Re: finding undocumented external connections Lyndon David (Aug 04)

Marc Blanchet

Re: Firewalls supporting Z39.50 Marc Blanchet (Aug 03)

Marcus J. Ranum

Re: WORM file system for logging Marcus J. Ranum (Aug 06)
RE: finding undocumented external connections Marcus J. Ranum (Aug 05)
Re: WORM file system for logging Marcus J. Ranum (Aug 03)
Re: IDS outside of firewall? Marcus J. Ranum (Aug 03)
RE: WORM file system for logging Marcus J. Ranum (Aug 05)
Re: IDS outside of firewall? Marcus J. Ranum (Aug 03)
RE: Denial of service Marcus J. Ranum (Aug 23)
Screening outgoing Email... Marcus J. Ranum (Aug 05)
Re: Screening Outgoing Mail for Content Marcus J. Ranum (Aug 04)

Mario Rodriguez

Human Error in Information Security Mario Rodriguez (Aug 04)

Massimo Brogioni

Re: Scans to ports 1090 and 1080 Massimo Brogioni (Aug 17)
Re: password aging Massimo Brogioni (Aug 27)

mea culpa

Re: Crypto extends 1994 'National Emergency' by Executive Order mea culpa (Aug 23)
Re: network security book information sought mea culpa (Aug 06)

Michael Shields

Re: Network cables as security devices Michael Shields (Aug 24)

Moser, Stefan

RE: Log File Formats... Moser, Stefan (Aug 24)

(NetQuest) Borkin, Michael

Re: performance vs. security (was Cisco PIX ...) (NetQuest) Borkin, Michael (Aug 30)
Re: Network cables as security devices (NetQuest) Borkin, Michael (Aug 24)

Noller2G

RE: Screening Outgoing Mail for Content Noller2G (Aug 07)

Paul Howell

Re: IDS outside of firewall? Paul Howell (Aug 04)

Paul M. Cardon

Re: password aging Paul M. Cardon (Aug 26)

Paul McNabb

Re: password aging Paul McNabb (Aug 28)
Re: WORM file system for logging Paul McNabb (Aug 06)
Re: password aging Paul McNabb (Aug 28)

Paul Woodie

Re: Screening Mail Policy&Product Paul Woodie (Aug 09)

Pawel Maciejewski

Re: Denial of service Pawel Maciejewski (Aug 19)

Perry E. Metzger

Re: Screening Outgoing Mail for Content Perry E. Metzger (Aug 09)
Re: Screening Outgoing Mail for Content Perry E. Metzger (Aug 05)
Re: Screening Outgoing Mail for Content Perry E. Metzger (Aug 05)

Peter Jeremy

Re: Screening Outgoing Mail for Content6 Peter Jeremy (Aug 06)
Re: Screening Outgoing Mail for Content Peter Jeremy (Aug 05)

Peter Mayne

RE: What about Traffic Analysis? Peter Mayne (Aug 11)

Randy Samos

RE: Denial of service Randy Samos (Aug 23)

R. DuFresne

Re: password aging R. DuFresne (Aug 23)

Readwin, Neil

RE: Screening Outgoing Mail for Content Readwin, Neil (Aug 12)

Resino, Robert G.

RE: WORM file system for logging Resino, Robert G. (Aug 03)

Rick Smith

Re: Executives liable for computer crime? (update) Rick Smith (Aug 27)
Re: password aging Rick Smith (Aug 23)
Re: WORM file system for logging Rick Smith (Aug 03)
Re: Shared DMZ liability Rick Smith (Aug 23)
Re: Screening Mail Policy&Product Rick Smith (Aug 07)

Rik Farrow

Re: Scans to ports 1090 and 1080 Rik Farrow (Aug 23)
IDS outside of firewall? Rik Farrow (Aug 02)
Simple demo Rik Farrow (Aug 28)

Robert Stahlbrand

Re: Cisco PIX bug, discussions (lenghty) Robert Stahlbrand (Aug 27)
Re: Cisco PIX bug, discussions (lenghty) Robert Stahlbrand (Aug 27)
Re: Cisco PIX bug, discussions (lenghty) Robert Stahlbrand (Aug 27)

Robert Ståhlbrand

Bug in Cisco PIX Robert Ståhlbrand (Aug 24)
Cisco PIX bug, discussions Robert Ståhlbrand (Aug 24)
FW: Cisco response re PIX fragmentation issue Robert Ståhlbrand (Aug 28)

Rodney van den Oever

Re: DES token cards (SNK,Enigma,whatever..)? Rodney van den Oever (Aug 12)

Roger Marquis

Scans to ports 1090 and 1080 Roger Marquis (Aug 16)

Roger Nebel

Re: Denial of service Roger Nebel (Aug 19)

Ryan Russell

Cisco response re PIX fragmentation issue Ryan Russell (Aug 28)
Re: Cisco PIX bug, discussions (lenghty) Ryan Russell (Aug 25)
Re: Cisco PIX bug, discussions (lenghty) Ryan Russell (Aug 26)
Re: What about Traffic Analysis? Ryan Russell (Aug 07)
Re: IDS outside of firewall? Ryan Russell (Aug 03)
Re: Cisco PIX bug, discussions (lenghty) Ryan Russell (Aug 28)
Re: Cisco PIX bug, discussions (lenghty) Ryan Russell (Aug 27)
Re: IDS outside of firewall? Ryan Russell (Aug 03)
Re: Brute force attacks Ryan Russell (Aug 13)

Stephen P. Berry

Re: IDS outside of firewall? Stephen P. Berry (Aug 03)
Re: What about Traffic Analysis? Stephen P. Berry (Aug 07)

Stephen P. Gibbons

Re: password aging Stephen P. Gibbons (Aug 28)
Re: password aging Stephen P. Gibbons (Aug 30)
Re: password aging Stephen P. Gibbons (Aug 27)

Steve Bellovin

Re: Screening Outgoing Mail for Content Steve Bellovin (Aug 09)
Re: Brute force attacks Steve Bellovin (Aug 19)
Re: password aging Steve Bellovin (Aug 19)

Steve . Bleazard

Re[2]: Shared DMZ liability Steve . Bleazard (Aug 25)
Re[4]: Shared DMZ liability Steve . Bleazard (Aug 26)

Steven Deutsch

RE: Screening Outgoing Mail for Content Steven Deutsch (Aug 05)

Steven M. Bellovin

Re: Network cables as security devices Steven M. Bellovin (Aug 24)

Stout, Bill

RE: Screening Outgoing Mail for Content Stout, Bill (Aug 12)
RE: finding undocumented external connections Stout, Bill (Aug 03)
Packetfilter NICs Stout, Bill (Aug 27)
Crypto extends 1994 'National Emergency' by Executive Order Stout, Bill (Aug 16)

Stuart Moore

Re: Re: Cisco PIX bug, discussions Stuart Moore (Aug 27)

Technical Incursion Countermeasures

Re: 2 proxy questions/ideas Technical Incursion Countermeasures (Aug 26)
Log File Formats... Technical Incursion Countermeasures (Aug 23)

Ted Doty

Re: securing X.25 connection Ted Doty (Aug 03)
Re: What about Traffic Analysis? Ted Doty (Aug 07)
Re: Screening Outgoing Mail for Content Ted Doty (Aug 05)
Re: What about Traffic Analysis? Ted Doty (Aug 07)
RE: Denial of service Ted Doty (Aug 23)
RE: Denial of service Ted Doty (Aug 19)
Re: Denial of service Ted Doty (Aug 23)
Re: securing X.25 connection Ted Doty (Aug 03)

The Drexxman

2 proxy questions/ideas The Drexxman (Aug 25)

Thomas Schiavinato

Re: Screening Outgoing Mail for Content Thomas Schiavinato (Aug 05)

Tina Bird

Re: Brute force attacks Tina Bird (Aug 13)

torkel . thune

RE: finding undocumented external connections torkel . thune (Aug 05)

Travis Low

Re: Cisco PIX bug, discussions (lenghty) Travis Low (Aug 26)

Tupshin Harper

RE: Denial of service Tupshin Harper (Aug 18)

Vanja Hrustic

Re: securing X.25 connection Vanja Hrustic (Aug 03)

Vern Paxson

Re: Scans to ports 1090 and 1080 Vern Paxson (Aug 17)

Vinci Chou

Re: WORM file system for logging Vinci Chou (Aug 10)

Vin McLellan

IDC Rpt on Firewall Mkt 8/4/98 Vin McLellan (Aug 09)

Vos, Arjan

RE: Packetfilter NICs Vos, Arjan (Aug 28)

Wilson Roberto Afonso

Re: Screening Outgoing Mail for Content Wilson Roberto Afonso (Aug 05)

Wood, Tom D

Executives liable for computer crime? Wood, Tom D (Aug 19)
Executives liable for computer crime? (update) Wood, Tom D (Aug 26)

Woody Weaver

Re: IDS outside of firewall? Woody Weaver (Aug 03)
Re: IDS outside of firewall? Woody Weaver (Aug 05)

wsanchez

Could I replace a Ms-Proxy with a FW-1 wsanchez (Aug 28)

Yakov Kravets

RE: Screening Outgoing Mail for Content Yakov Kravets (Aug 06)

Zach Brown

Re: Scans to ports 1090 and 1080 Zach Brown (Aug 19)