vojev.wordpress.com
Team rules | Firewall Sem 2
https://vojev.wordpress.com/about
Just another WordPress.com site. Notify in case of absence. Participate with the project and help each group member. Stick to the plan! Each member has tasks assigned. If the tasks defined for a group member haven’t been fulfilled, results an instant kick. Feb 14, 2011. Don’t you mean that all members have taskS assigned? Good stuff with the ground rules of project work. It may help you later. Feb 14, 2011. Your ruleset is nice. It is clear and to the point. I especially like rule no. 6🙂. Feb 15, 2011.
vojev.wordpress.com
Firewall Sem 2 | Just another WordPress.com site | Page 2
https://vojev.wordpress.com/page/2
Just another WordPress.com site. Bypass firewall using proxy. March 15, 2011. We use IPCOP as firewall. One of the add-on added was URL filter and advanced Proxy. And one of the main task that we had to do was to bypass the firewall using proxy. Right now, connection to the internet via IPcop is made through port 800. Every connection is going to port 800 except the porn sites that are blocked. Here are some prints and wireshark. 2 Open sites to wireshark the traffic. Deciding on Bandwith required. PfSen...
vojev.wordpress.com
February | 2011 | Firewall Sem 2
https://vojev.wordpress.com/2011/02
Just another WordPress.com site. Enable port forwarding, VirtualBox. February 28, 2011. The extra VirtualBox router as illustrated below is only used for the wireless connection of the host machine. Otherwise a bridged connection would be an option requiring cabling on the host machine. Keep in mind that bridged connection would not require the next steps to be completed. The following task is to expose the webserver:. Firewall installation and configuration, IPCOP. February 28, 2011. Basic installation ...
itsecproject.wordpress.com
Task for 4th iteration | IT Sec Project 3rd sem
https://itsecproject.wordpress.com/2011/11/22/task-for-4th-iteration
IT Sec Project 3rd sem. SQL Injection →. Task for 4th iteration. This is the task list for the fourth iteration. This will cover incident response and forensic analysis. Create task list for the second iteration. Create Plan for Forensics Analysis. Malware – Scan. SQL Injection →. Leave a Reply Cancel reply. Enter your comment here. Fill in your details below or click an icon to log in:. Address never made public). You are commenting using your WordPress.com account. ( Log Out. Tasks for 5th iteration.
itsecproject.wordpress.com
October | 2011 | IT Sec Project 3rd sem
https://itsecproject.wordpress.com/2011/10
IT Sec Project 3rd sem. Monthly Archives: October 2011. The VM for use as an office workstation was created the following is the changelog of the installation process. Installed VBox GuestAddition for USB support. Mapped network drive to folder on host. Installed Adobe Reader 8.0. Installed Thunderbird 1.0.7. Installed FireFox 2.0. Image showing host based USB device mounted in VM guest OS. By Mads . Task for second iteration. This is the task list for the second iteration. Create VM with open-WRT.
itsecproject.wordpress.com
November | 2011 | IT Sec Project 3rd sem
https://itsecproject.wordpress.com/2011/11
IT Sec Project 3rd sem. Monthly Archives: November 2011. Tasks for 5th iteration. Here are the tasks for the fifth iteration. Create task list for the fifth iteration. By paulruscior . Http:/ airccse.org/journal/nsa/0409s2.pdf. 8211; network forensics. Http:/ en.wikipedia.org/wiki/Wireshark. Http:/ www.netresec.com/? By paulruscior . By doing an SQL injection on the company’s member website one can easily get the list of the members and their job attributes. In this case SQL injection is mainly a matte...