Search:

Type: Posts; User: Kinstonian; Keyword(s):

Page 1 of 10 1 2 3 4

Search: Search took 0.03 seconds.

  1. Replies
    9
    Views
    793

    Re: Security competition Log analysis

    It's not uncommon to encounter corrupted files, say from unallocated space that need to be repaired. Also, attackers sometimes create corrupted malware that will run by Windows, but some kind of...
  2. Replies
    9
    Views
    793

    Re: Security competition Log analysis

    You're right about problems with integrity. However, whether it's because of hardware or an attacker, that issue is there. That's why digital investigators rely on corroborating evidence from...
  3. Replies
    9
    Views
    793

    Re: Security competition Log analysis

    No problem... Harlan's evtparse.pl would likely be useful for the corrupted Windows .EVT logs.

    http://windowsir.blogspot.com/2010/07/more-timeline-stuff.html
  4. Replies
    9
    Views
    793

    Re: Security competition Log analysis

    http://docstore.mik.ua/orelly/perl/sysadmin/ch09_02.htm
  5. Replies
    3
    Views
    529

    [ubuntu] NIDS just got a lot easier

    SecurityOnion has been out for a while now, but it's about to get even easier:

    http://www.youtube.com/watch?v=mazSRVFYmLQ

    No sense in installing Snort to get alerts you can't do much with...
  6. Replies
    31
    Views
    2,990

    [ubuntu] Re: Moniter My sons Computer

    Can you configure your router to use the OpenDNS servers? That's as much of a "router level" as you will probably get without making your own from an old computer and Linux. If by router level you...
  7. Replies
    31
    Views
    2,990

    [ubuntu] Re: Moniter My sons Computer

    Are you using a blacklist? People already make blacklists that have a bunch of "bad" sites, so much of the work is done for you... Both DansGuardian and OpenDNS can apparently log. However, I just...
  8. Replies
    31
    Views
    2,990

    [ubuntu] Re: Moniter My sons Computer

    Filtering with a network device is good if you want to filter traffic for a bunch of computers because you can centrally manage the filtering. You would probably have to install something like a web...
  9. Replies
    31
    Views
    2,990

    [ubuntu] Re: Moniter My sons Computer

    Here's something from around 2010. How to Create a Family Friendly Ubuntu Setup

    There is also DansGuardian, although I've never used any of this.

    Keeping the computer in a public place in the...
  10. Replies
    9
    Views
    2,564

    [SOLVED] Re: clamav and all files scan

    I think Clam may only scan certain objects in a PDF. There may not be any suspicious objects in the PDF you're scanning so it's reporting nothing was scanned. You will probably also see a...
  11. Replies
    4
    Views
    342

    [wubi] Re: Disable wubi's automounting of Windows

    I was worried that might be a problem. Oh well, thanks for the info.
  12. Replies
    4
    Views
    342

    [wubi] Re: Disable wubi's automounting of Windows

    I looked in the fstab and didn't see it... although it does show up in the mount command. Unless I'm missing something wubi is doing something different.
  13. Replies
    4
    Views
    342

    [wubi] Disable wubi's automounting of Windows

    Is there a problem with stopping Wubi from auto-mounting the Windows partition and if not, what's the best way to stop it?
  14. [ubuntu] Re: what log files and commands should i be using to check if someone is attacking my

    You don't need an IDS to detect attacks. You're right Snort would be overkill. You may be surprised how effective simple tools like grep, cut, sort, netstat, ps, lsof, etc. can be.

    A big part of...
  15. Replies
    7
    Views
    1,931

    [ubuntu] Re: installation of sguil

    Sguil ties a bunch of open source software together to let you use different types of network based evidence to easily investigate alerts. If you want to pretty much just see alerts in a GUI, check...
  16. Replies
    7
    Views
    1,931

    [ubuntu] Re: installation of sguil

    I installed it a long time ago when it was an absolute nightmare. One of the most complicated installs I've ever heard of. Fortunately it's a lot easier to get all the software working together...
  17. Replies
    3
    Views
    483

    [ubuntu] Re: my pc has been hijacked.

    I seriously can't believe I read that. If it's not your computer, you're not authorized to reformat, you're not familiar with Linux and you're worried about making a mistake that can "cause a lot of...
  18. [other] Re: tcpdump: filtering for packets from a site with mulitple ip addresses?

    Try "dst host www.examplesite.com"
  19. Replies
    4
    Views
    3,597

    [ubuntu] Re: Visualizing IDS log files

    Cool, I can't write bash scripts, so I don't know how far you can go by creating data visualizations with shell scripts. Learning Python or similar would allow you to use ChartDirector, matplotlib,...
  20. [ubuntu] Re: Nat

    NAT was created resolve addressing problems, but has also over the years helped prevent a very large number of computers from being compromised by filtering traffic; which is the core of any...
  21. [ubuntu] Re: I share a connection with a hacked computer

    Still not a valid reason not to care about your own security. If it's compromised there are other things her computer could be used for. Things ranging from sending spam to compromising other...
  22. [ubuntu] Re: I share a connection with a hacked computer

    What leads you to believe of all the explanations for computer problems that her computer is "obviously infected?" I'm not saying you're wrong, I'm just asking what evidence you have because I have...
  23. [other] Re: Programming in Systems Security as a career

    Now I'm starting to get the feeling we're doing your homework for you.
  24. Replies
    16
    Views
    768

    [SOLVED] Re: malware installed onto my pc

    In addition to reformatting, I hope your recovery at least included changing your passwords.
  25. [other] Re: Programming in Systems Security as a career

    You can use programming to help with any security related job, and which language(s) depends on what exactly it is you want to do.

    If you want to deal with web application security PHP,...
Results 1 to 25 of 250
Page 1 of 10 1 2 3 4