wired network security

John J. Macey jjmacey at gmail.com
Mon Nov 3 14:48:06 MST 2014


Image

John J. Macey / Wildwood, New Jersey
480-242-1503/ jjmacey at jjmacey.net <mailto:jjmacey at jjmacey.net>

Biotech Consultant Office: 480-242-1503 / Fax: 480-242-1503
310 E. Hand Avenue #12 Wildwood, New Jersey 08260
http://jjmacey.net/blog

Facebook <https://www.facebook.com/john.j.macey/about> Twitter 
<https://twitter.com/JJMacey> Google Plus 
<https://plus.google.com/u/0/+JohnJMacey/posts> Youtube 
<https://www.youtube.com/user/jjmacey> Linkedin 
<http://www.linkedin.com/pub/john-macey/5/151/564> Pintrest 
<http://www.pinterest.com/jjmacey0951/> Dribbble 
<https://dribbble.com/Adler> Skype <John_J_Macey>

This e-mail message may contain confidential or legally privileged 
information and is intended only for the use of the intended 
recipient(s). Any unauthorized disclosure, dissemination, distribution, 
copying or the taking of any action in reliance on the information 
herein is prohibited. E-mails are not secure and cannot be guaranteed to 
be error free as they can be intercepted, amended, or contain viruses. 
Anyone who communicates with me, or my affiliations, by e-mail is deemed 
to have accepted these risks. John J. Macey is not responsible for 
errors or omissions in this message and denies any responsibility for 
any damage arising from the use of e-mail. Any opinion and other 
statement contained in this message and any attachment are solely those 
of the author and do not necessarily represent those of the company.

On 11/03/2014 04:42 PM, John J. Macey wrote:
> Michael,
>
> I am just checking all my Links. Let me know what happens. I moved 
> from over there to over here.
>
> I just, also went to Backbox 4.0.
> Image
>
> John J. Macey / Wildwood, New Jersey
> 480-242-1503/ jjmacey at jjmacey.net <mailto:jjmacey at jjmacey.net>
>
> Biotech Consultant Office: 480-242-1503 / Fax: 480-242-1503
> 310 E. Hand Avenue #12 Wildwood, New Jersey 08260
> http://jjmacey.net/blog
>
> Facebook <https://www.facebook.com/john.j.macey/about> Twitter 
> <https://twitter.com/JJMacey> Google Plus 
> <https://plus.google.com/u/0/+JohnJMacey/posts> Youtube 
> <https://www.youtube.com/user/jjmacey> Linkedin 
> <http://www.linkedin.com/pub/john-macey/5/151/564> Pintrest 
> <http://www.pinterest.com/jjmacey0951/> Dribbble 
> <https://dribbble.com/Adler> Skype <John_J_Macey>
>
> This e-mail message may contain confidential or legally privileged 
> information and is intended only for the use of the intended 
> recipient(s). Any unauthorized disclosure, dissemination, 
> distribution, copying or the taking of any action in reliance on the 
> information herein is prohibited. E-mails are not secure and cannot be 
> guaranteed to be error free as they can be intercepted, amended, or 
> contain viruses. Anyone who communicates with me, or my affiliations, 
> by e-mail is deemed to have accepted these risks. John J. Macey is not 
> responsible for errors or omissions in this message and denies any 
> responsibility for any damage arising from the use of e-mail. Any 
> opinion and other statement contained in this message and any 
> attachment are solely those of the author and do not necessarily 
> represent those of the company.
>
> On 11/03/2014 02:56 PM, Michael Butash wrote:
>> On 11/02/2014 02:46 PM, Bob Holtzman wrote:
>>> Dandy, but looking at source code tells a nonprogrammer (me) little.
>>>
>>> I guess I'll just coast along with https for the important stuff even
>>> tho I've read that it can be spoofed.
>>>
>> I only read source code when I have to figure out obscure driver 
>> error conditions on garbage code.  Or morbid curiosity.
>>
>> Really what i mean is seeing what is opening sockets on your box and 
>> transmitting data.  Use of "iftop", tcpdump, wireshark, or other 
>> applications will show you this in the way of open socket/port 
>> connections.  Use of "ss" or "netstat" with various flags (that I've 
>> posted before for Havens) to see what is opening listening sockets or 
>> establishing connections out.  From there you can examine the 
>> packets, might be amazed to see readable ascii flying past in the 
>> network data payloads.
>>
>> Used to be fun to sit on the office switch on a span/monitor port 
>> doing network diagnostics when you begin to see people's credentials 
>> coming across too.  Learned what dsniff was for then for some fun 
>> quite early on in my career to harvest credentials of my buddies to 
>> torment.  ;)
>>
>> Started enforcing SSL and encryption for myself shortly after.
>>
>> -mb
>> ---------------------------------------------------
>> PLUG-discuss mailing list - PLUG-discuss at lists.phxlinux.org
>> To subscribe, unsubscribe, or to change your mail settings:
>> http://lists.phxlinux.org/mailman/listinfo/plug-discuss
>
>
>
> ---------------------------------------------------
> PLUG-discuss mailing list - PLUG-discuss at lists.phxlinux.org
> To subscribe, unsubscribe, or to change your mail settings:
> http://lists.phxlinux.org/mailman/listinfo/plug-discuss

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.phxlinux.org/pipermail/plug-discuss/attachments/20141103/e17d1c7d/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.bmp
Type: image/bmp
Size: 15750 bytes
Desc: not available
URL: <http://lists.phxlinux.org/pipermail/plug-discuss/attachments/20141103/e17d1c7d/attachment.bin>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: image/bmp
Size: 15750 bytes
Desc: not available
URL: <http://lists.phxlinux.org/pipermail/plug-discuss/attachments/20141103/e17d1c7d/attachment-0001.bin>


More information about the PLUG-discuss mailing list