SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Non-Tech : Amati investors
AMTX 1.490+1.0%3:12 PM EST

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: bill c. who wrote (17974)5/21/1997 2:12:00 PM
From: jttmab   of 31386
 
Bill, [Chat on computer misuse]

Unfortunately, your not alone in your problem. While misuse/abuse isn't an area that I focus on, I do find that a lot of customers that I talk to about network security have the same problem, with less than adequate solutions. While DHCP helps the sys admin it makes abuse catching a lot harder. Some are trying to use filters such as WebNot (from Raptor). Checkpoint is coming out with a filter for their firewall soon. I've done some initial data collection on Intrusion detection systems. They are more targetted at detecting attacks to the network services, but some run daemons on the client that summarize and send off audit data which might be used to detect the kind of abuse that you're looking for. Some vendors you might look at are (company (product)): SAIC (CMDS), SRI International (IDES), Sandeep Kumar @Purdue (IDIOT) {Yes, they call their product IDIOT, but it's out of Purdue so what can you expect}, AXENT (OmniGuard/Intruder Alert), Internet Security Systems (RealSecure), and Haystack Labs (Stalker).

Best Regards,
Jim

P.S. Also noting some of your other posts, it's nice to see someone that cares about security.

P.P.S.While it's true that TFTP doesn't support authentication, do you really trust the authentication for, e.g., FTP? Something is better than nothing, but IMO one needs to consider authentication outside of the authentication provided by the application.
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext