The topics I'm going to cover, in no particular order, are:
- Sniffers
- Viruses
- Port Scanning
- Fingerprinting
- Unnecessary open ports
- Bad software configuration (web servers, databases, mail
servers...)
- SQL injections
- Buffer Overflows
- Use of google as a information gathering tool.
- Firewalls
- DOS attacks
- Brute force attacks
- Cryptography.
- Cross site scripting
- Man-in-the-middle
- Intrusion Detection Systems
- Honeypots
- Identity Spoofing
- Social Engineering
- Gathering information from trash/rubbish
- Physical security in buildings. Access to the building, cable
sniffing, secure ID's...
- And more.... ;-)
With this list of topics, How many days long is this presentation going to be?
On Mon, 31 Oct 2005, STYMA, ROBERT E (ROBERT) wrote:
The topics I'm going to cover, in no particular order, are:
- Sniffers
- Viruses
- Port Scanning
- Fingerprinting
- Unnecessary open ports
- Bad software configuration (web servers, databases, mail
servers...)
- SQL injections
- Buffer Overflows
- Use of google as a information gathering tool.
- Firewalls
- DOS attacks
- Brute force attacks
- Cryptography.
- Cross site scripting
- Man-in-the-middle
- Intrusion Detection Systems
- Honeypots
- Identity Spoofing
- Social Engineering
- Gathering information from trash/rubbish
- Physical security in buildings. Access to the building, cable
sniffing, secure ID's...
- And more.... ;-)
With this list of topics, How many days long is this presentation going to be?
and why exactly is everyone on this list doing all your work for you?
rday
On Mon, 2005-10-31 at 09:26, STYMA, ROBERT E (ROBERT) wrote:
The topics I'm going to cover, in no particular order, are:
- Sniffers
- Viruses
- Port Scanning
- Fingerprinting
- Unnecessary open ports
- Bad software configuration (web servers, databases, mail
servers...)
- SQL injections
- Buffer Overflows
- Use of google as a information gathering tool.
- Firewalls
- DOS attacks
- Brute force attacks
- Cryptography.
- Cross site scripting
- Man-in-the-middle
- Intrusion Detection Systems
- Honeypots
- Identity Spoofing
- Social Engineering
- Gathering information from trash/rubbish
- Physical security in buildings. Access to the building, cable
sniffing, secure ID's...
- And more.... ;-)
With this list of topics, How many days long is this presentation going to be?
He is hoping to get enough information for papers to use in his other classes and for other classmates. Probably plans to plagiarize the work anyone sends him and turn it in. Almost sounds like a business plan from the dot com days. :)
If this was a class in social engineering he just failed. :)
Just one. Im just going to briefly explain all the things a network administrator should be aware of withouth getting into details, how to's or very technical information. The presentation will be much more like a guide of "What do I need to know to build a secure system?" and not "How to build a secure system"
With this list of topics, How many days long is this presentation going to be?
-- fedora-list mailing list fedora-list@redhat.com To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
-- Emmanuel Goldstein. Room 101, Ministry of Truth. W2, London. Oceania.
Man, the presentation is not related to any subject at university, Im not getting any profit from it and It doesnt even have anything to do with any teacher. Im just asking security proffessionals for information. If you do not have any, just dont say anything. Dont start assuming things that are completely false making me to look stupid in the list.
With this list of topics, How many days long is this presentation going to be?
He is hoping to get enough information for papers to use in his other classes and for other classmates. Probably plans to plagiarize the work anyone sends him and turn it in. Almost sounds like a business plan from the dot com days. :)
If this was a class in social engineering he just failed. :)
-- fedora-list mailing list fedora-list@redhat.com To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
-- Emmanuel Goldstein. Room 101, Ministry of Truth. W2, London. Oceania.
and why exactly is everyone on this list doing all your work for you?
Im not asking anybody to do the work for me. Im just asking people to send me stuff they already have.
Why send it to me? Because this is a volunteer presentation from which I dont get any profit. I has nothing to do with my university and I dont have plenty of time to start drawing diagrams with the Gimp.
-- Emmanuel Goldstein. Room 101, Ministry of Truth. W2, London. Oceania.
On Mon, 31 Oct 2005, Emmanuel Goldstein wrote:
Just one. Im just going to briefly explain all the things a network administrator should be aware of withouth getting into details, how to's or very technical information. The presentation will be much more like a guide of "What do I need to know to build a secure system?" and not "How to build a secure system"
o'reilly has a book, "linux server security." you might just want to peruse the table of contents:
http://www.oreilly.com/catalog/linuxss2/index.html
there's also ora's "linux security cookbook":
http://www.oreilly.com/catalog/linuxsckbk/
between those two books, i would think you'd have a pretty complete list.
rday
-----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160
Emmanuel Goldstein wrote:
Man, the presentation is not related to any subject at university, Im not getting any profit from it and It doesnt even have anything to do with any teacher. Im just asking security proffessionals for information. If you do not have any, just dont say anything. Dont start assuming things that are completely false making me to look stupid in the list.
With this list of topics, How many days long is this presentation going to be?
He is hoping to get enough information for papers to use in his other classes and for other classmates. Probably plans to plagiarize the work anyone sends him and turn it in. Almost sounds like a business plan from the dot com days. :)
If this was a class in social engineering he just failed. :)
-- fedora-list mailing list fedora-list@redhat.com To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
-- Emmanuel Goldstein. Room 101, Ministry of Truth. W2, London. Oceania.
Emmanuel,
You have to cool down. You asked a very long question with hundreds if not thousands of external sources available from GOOGLE. Not all of us are experts... and this question qualifies as someone digging for information like a student, which we highly dislike helping other than giving general responses to.
First, Have you googled your topics? Second, Search the list archives. We have many security related discussions about various things in general. SpamAssassin, Sendmail, SSH, etc. Third, the only secure computer is one which is not connected to an outside network!
Sorry to disappoint you.... but, we are only responding to a question (that looks too much like) a student would ask.
James Kosin
On Mon, 2005-10-31 at 17:16 +0100, Emmanuel Goldstein wrote:
Man, the presentation is not related to any subject at university, Im not getting any profit from it and It doesnt even have anything to do with any teacher. Im just asking security proffessionals for information. If you do not have any, just dont say anything. Dont start assuming things that are completely false making me to look stupid in the list.
No one is making you look stupid. Fishing for assistance this way does that well enough on it's own.
There are tons of references for the subjects you are asking about publicly available and easy to find. If you waited until too late to do the research that is not our problem.
Plan your time better to do the preparation. Make the presentation short enough to do in the amount of time allocated. Your listed topics will (as someone has already said) take considerably more time than any reasonable single presentation can do justice to, so are you covering all the listed topics, or one of them?
On Mon, 2005-10-31 at 17:11 +0100, Emmanuel Goldstein wrote:
Just one. Im just going to briefly explain all the things a network administrator should be aware of withouth getting into details, how to's or very technical information. The presentation will be much more like a guide of "What do I need to know to build a secure system?" and not "How to build a secure system"
In that case, you have already listed most of what is needed. Just develop the presentation of it.
With this list of topics, How many days long is this presentation going to be?
-- fedora-list mailing list fedora-list@redhat.com To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
-- Emmanuel Goldstein. Room 101, Ministry of Truth. W2, London. Oceania.
Jeff Vian wrote:
On Mon, 2005-10-31 at 17:16 +0100, Emmanuel Goldstein wrote:
Man, the presentation is not related to any subject at university, Im not getting any profit from it and It doesnt even have anything to do with any teacher. Im just asking security proffessionals for information. If you do not have any, just dont say anything. Dont start assuming things that are completely false making me to look stupid in the list.
No one is making you look stupid. Fishing for assistance this way does that well enough on it's own.
And if he had only googled before he posted he'd know why using Emmanuel Goldstein was a bad choice as his nom du jour (unless he had a radio program but then he wouldn't be asking would he). Of course everyone needs a daily dose of irony. :-) A kind of circular form of irony?
On Mon, 31 Oct 2005, Neil Cherry wrote:
Jeff Vian wrote:
On Mon, 2005-10-31 at 17:16 +0100, Emmanuel Goldstein wrote:
Man, the presentation is not related to any subject at university, Im not getting any profit from it and It doesnt even have anything to do with any teacher. Im just asking security proffessionals for information. If you do not have any, just dont say anything. Dont start assuming things that are completely false making me to look stupid in the list.
No one is making you look stupid. Fishing for assistance this way does that well enough on it's own.
And if he had only googled before he posted he'd know why using Emmanuel Goldstein was a bad choice as his nom du jour (unless he had a radio program but then he wouldn't be asking would he). Of course everyone needs a daily dose of irony. :-) A kind of circular form of irony?
The negative unhelpful attitudes expressed here are not representative of most people in the community. For the people who do not wish to help, you are just embarrassing the rest of us. Please stop. The original question is perfectly fine, and you will surely find people interested in discussing this with you.
At 11:20 PM -0500 10/31/05, Robin Mordasiewicz wrote:
On Mon, 31 Oct 2005, Neil Cherry wrote:
Jeff Vian wrote:
On Mon, 2005-10-31 at 17:16 +0100, Emmanuel Goldstein wrote:
Man, the presentation is not related to any subject at university, Im not getting any profit from it and It doesnt even have anything to do with any teacher. Im just asking security proffessionals for information. If you do not have any, just dont say anything. Dont start assuming things that are completely false making me to look stupid in the list.
No one is making you look stupid. Fishing for assistance this way does that well enough on it's own.
And if he had only googled before he posted he'd know why using Emmanuel Goldstein was a bad choice as his nom du jour (unless he had a radio program but then he wouldn't be asking would he). Of course everyone needs a daily dose of irony. :-) A kind of circular form of irony?
The negative unhelpful attitudes expressed here are not representative of most people in the community. For the people who do not wish to help, you are just embarrassing the rest of us. Please stop. The original question is perfectly fine, and you will surely find people interested in discussing this with you.
The guy is a troll. From the original message:
To: pen-test@lists.securityfocus.com, vuln-dev@securityfocus.com, pen-test@securityfocus.com, security-basics@securityfocus.com, nmap-hackers@insecure.org, full-disclosure@lists.grok.org.uk, bugtraq@securityfocus.com, security-alerts@linuxsecurity.com, fedora-list@redhat.com
My name's Luis and I'm a computer science student from Spain.
-- Emmanuel Goldstein. Room 101, Ministry of Truth. W2, London. Oceania. --
He's Luis from Spain and also Emmanuel Goldstein from 1984 and 2600, much fun for the security mavens he's supposedly just solocited help from.
I'm running late so It would be great if you guys could send me some PowerPoint or OO-Impress presentations, Pdf documents, or any kind of multimedia material
Please do his work for him.
The topics I'm going to cover, in no particular order, are:
- Sniffers
- Viruses
- Port Scanning
- Fingerprinting
- Unnecessary open ports
- Bad software configuration (web servers, databases, mail servers...)
- SQL injections
- Buffer Overflows
- Use of google as a information gathering tool.
- Firewalls
- DOS attacks
- Brute force attacks
- Cryptography.
- Cross site scripting
- Man-in-the-middle
- Intrusion Detection Systems
- Honeypots
- Identity Spoofing
- Social Engineering
- Gathering information from trash/rubbish
- Physical security in buildings. Access to the building, cable
sniffing, secure ID's...
- And more.... ;-)
Please do a Master's Thesis lot of work for him. As others pointed out, this material can't be covered in only one semester.
But feel free to help him; I'm sure you can afford the time. Meanwhile, don't complain that we noticed him for what he is. And don't complain when he doesn't actually need the Master's Thesis you make for him. ____________________________________________________________________ TonyN.:' mailto:tonynelson@georgeanelson.com ' http://www.georgeanelson.com/
On Tue, 1 Nov 2005, Tony Nelson wrote:
At 11:20 PM -0500 10/31/05, Robin Mordasiewicz wrote:
On Mon, 31 Oct 2005, Neil Cherry wrote:
Jeff Vian wrote:
On Mon, 2005-10-31 at 17:16 +0100, Emmanuel Goldstein wrote:
Man, the presentation is not related to any subject at university, Im not getting any profit from it and It doesnt even have anything to do with any teacher. Im just asking security proffessionals for information. If you do not have any, just dont say anything. Dont start assuming things that are completely false making me to look stupid in the list.
No one is making you look stupid. Fishing for assistance this way does that well enough on it's own.
And if he had only googled before he posted he'd know why using Emmanuel Goldstein was a bad choice as his nom du jour (unless he had a radio program but then he wouldn't be asking would he). Of course everyone needs a daily dose of irony. :-) A kind of circular form of irony?
The negative unhelpful attitudes expressed here are not representative of most people in the community. For the people who do not wish to help, you are just embarrassing the rest of us. Please stop. The original question is perfectly fine, and you will surely find people interested in discussing this with you.
The guy is a troll. From the original message:
To: pen-test@lists.securityfocus.com, vuln-dev@securityfocus.com, pen-test@securityfocus.com, security-basics@securityfocus.com, nmap-hackers@insecure.org, full-disclosure@lists.grok.org.uk, bugtraq@securityfocus.com, security-alerts@linuxsecurity.com, fedora-list@redhat.com
My name's Luis and I'm a computer science student from Spain.
-- Emmanuel Goldstein. Room 101, Ministry of Truth. W2, London. Oceania. --
He's Luis from Spain and also Emmanuel Goldstein from 1984 and 2600, much fun for the security mavens he's supposedly just solocited help from.
I'm running late so It would be great if you guys could send me some PowerPoint or OO-Impress presentations, Pdf documents, or any kind of multimedia material
Please do his work for him.
The topics I'm going to cover, in no particular order, are:
- Sniffers
- Viruses
- Port Scanning
- Fingerprinting
- Unnecessary open ports
- Bad software configuration (web servers, databases, mail servers...)
- SQL injections
- Buffer Overflows
- Use of google as a information gathering tool.
- Firewalls
- DOS attacks
- Brute force attacks
- Cryptography.
- Cross site scripting
- Man-in-the-middle
- Intrusion Detection Systems
- Honeypots
- Identity Spoofing
- Social Engineering
- Gathering information from trash/rubbish
- Physical security in buildings. Access to the building, cable
sniffing, secure ID's...
- And more.... ;-)
Please do a Master's Thesis lot of work for him. As others pointed out, this material can't be covered in only one semester.
But feel free to help him; I'm sure you can afford the time. Meanwhile, don't complain that we noticed him for what he is. And don't complain when he doesn't actually need the Master's Thesis you make for him.
My mistake. Sorry I should have read earlier in the thread. My bad.
On Mon, 2005-10-31 at 09:25 -0500, Robert P. J. Day wrote:
and why exactly is everyone on this list doing all your work for you?
Didn't you see him put it in writing? He owes everyone a beer who helps him out.
Wouldn't that be fun to see it enforced? Watching some spammer/scammer go bankrupt buying all and sundry a drink for the next several years. ;-)