-
Posts
45 -
Joined
-
Last visited
Posts posted by macrohard
-
-
Depending upon the situation:
1. If I feel charitable, and I have time, I might likely help you out.
2. If you have a problem that will take up a good amount of my time.....there is a good chance you will likely pay for services rendered.
3. If you start whining, I too will help you out.....which way did you come in?
-
Well, one of the reasons I did it was because of the fact I have "kids" and they have a lot of wireless devices, including school laptops. I like the web filtering capabilities in Untangle, so by putting the wireless in the DMZ, I still have control of web content and what's being downloaded. I don't have that control if I kick on the wireless in the AT&T DSL router and they run through that. Plus I want to use OpenVPN, so I set the AT&T router to push all traffic to the Untangle box (I have DynDNS setup in Untangle.)
I also have an idea about full tunnel with Ubuntu and OpenVPN going through Untangle, but alas, have to work to eat....will try it out tonight.
-
Yeah I haven't had much time either, I would really like to get this to work for my Linux laptop.
I have a colleague of mine who is a CTO of another UTM company. We use to use them at my workplace, until my CIO came under the influence of the devil and went with AT&T for this supposedly wonderful "cloud-based" security solution. That UTM company used OpenVPN, so I sent him a message about this to see if I could get any insight.
-
Just a layout of what I do with Untangle. My OpenVPN is set up where it only will access the Internal LAN, and the wireless network is in a DMZ segmented away from the PC's. That way, if the wireless were ever compromised, then all the harder to work around over to the LAN side.
-
Okay I'm back. I was looking over your blog post about Untangle and full tunneling.
I too seem to struggle on finding a full tunnel solution in Untangle for Linux Os's. It seems to be an issue with Network Manager (I use Ubuntu 12.10 on my laptop) from what I have read over the Internet, and so far I haven't found a good solution, it appears to be more of client side issue rather than Untangle issue
I don't have a problem doing full tunnel traffic in say Windows 7, that works and routes the Internet traffic down the tunnel and out the Untangle box with no issues. (The full tunnel issue in OpenVPN was corrected if I understand right in Untangle version 9.3.)
-
I have to go to work, but I will post off a diagram when I return later this evening. Sounds like an interesting discussion topic.....
-
Hmmmmm......
The placement of wireless AP in a LAN network is one that always bothers me, as to what occurs if by chance if it is, compromised. I also use Untangle for Open VPN but I segment the traffic as it comes into the box. I tend however to segment the wireless traffic in its own LAN, separate away from my home PC's. My wireless AP sits in a DMZ off of a third NIC card in my Untangle setup.
-
I've used Untangle for quite awhile now, but lately its been getting a little too buggy for my tastes. I too was curious about PFsense and how easy it was to configure.
-
PaulyD,
While telecommunication companies are immune from litigation, it was recently ruled here in the US that the government may be sued for for illegal wire tapping. The Ninth district is allowing a suit to continue against the government.
Wow, I now have ended up two times in the mailbag on the show, do I get free swag if I end up three times? B)
As to comment on the show, I guess the only item could say is on what was not discussed.
Lets say I have setup my phone for mobile banking, or use it for any level of financial transactions. I build a relationship of trust when I do financial transactions. So when keying two factor authentication to say my homebanking website, it what point would Carrier IQ be involved in that level of trust? If I key in my two-factor information through a secure website, Carrier is still recording that information and uploading it to whatever server they are running.
The issue then becomes, well I didn't recall signing up for anything that involves Carrier. I signed up for an agreement with my financial institution for protection of information and my finances. If my financial institution screws up and I end up getting compromised, I can pursue legal action. Can I do the same thing with Carrier, in the event they get compromised and my information was sitting on one their servers that gets hacked? Or do they hide also behind telecom immunity?
-
This continues to be an infringement on the rights of citizens, regardless of political, social, or cultural differences. As well as taking away the process on innovation from citizens and placing it into the hands of corporate entities who are sponsoring this legislation. Funny how corporate entities would not be where they are today without regular citizens who had the ability to innovate who started and founded the corporations.
-
I was just surprised this evening that Snubbs did a segment on it, just watched the show.
The functionality is what I was looking for what I do on the job, the software provided a great solution for changing files base on names, dates and extensions. Its fun when it all needs to be categorized in a particular way for import, indexing, and running queries against.
Just wanted to say that the "Bulk Renaming" functionality that snubs showed is actually built into windows (not sure what versions, but at least Windows 7 supports it.. probably vista, maybe XP)
If you select many files, hit F2 to rename... you can type in a filename and hit enter.
The files will be named as such (if renamed to "test"):
test (1).txt
test (2).txt
test (3).txt
etc.
It looks like the bulk renaming tool supports more functionality (regex), etc., but the basic functionality exists already.
-
I've been using Untangle for a couple of years now, and highly recommend it.
-
Something keeps bugging me about this worm, and its origin.
Would anybody here possibly consider if Haystack might have been a possible suspect in all this?
It was a project to assist Iranians in bypassing their governments firewalls and web filters, could something been deployed that if an Iranian visited a particular website using Haystack, something could have been downloaded (Stuxnet) back into their own computers, and spread undetected through Iranian networks and USB keys?
The US Government allowed Haystack out to Iran, and bypass the US export restrictions.
It seems strange now that Haystack has "gone to ground" now, the project is in hiatus pending a "security review".
All good timing.
b:\myrtus\src\objfre_w2k_x86\i386\guava.pdb
When searching for these two words on Google, the seventh item is the search order talks about plants. Myrtus or (Chilean) Guava is a perennial bush that grows outside of San Francisco.....home of Haystack...
Just something to throw out to see if line of thinking was logical....
-
Mine is so bad, I won't even bother posting it......
-
Episode 7x03
in Hak5
Im okay with the biking......we just need to see some more Harley's........
-
I would have to agree, there are a lot open source based firewall products that you can get (like Pfsense, Untangle, and others) that get more bang out of the buck than AlphaShield.
100% effective? That alone is just a sales pitch, even high end firewall companies never boast they will get eveything.
-
Governments today tend to be very good at socially engineering and manipulating their own citizens.
They just don't like the idea of anyone else doing it.......
-
Rubieeallenn
The latest spam janitor here.......
Wonder if he wears a dress?
-
Nice to see the forum back.......
Now...
Could we ban this jerk too?
Davietorr
He's just so concerned about all the viruses on my Ubu box....and is offering his cleaning services....
-
Guys anyone can help me? are u Have SSH Port 443...
only just fun study?? so please sharing with me user and password.. please guys... thanks
What?
(Didn't know three year olds could type so good.....)
-
I think it depends upon the situation, I had a Vista box I worked on for a friend and it just completely defeated me (that and BlackSOD), regardless of what I could do. That situation involved a reinstall.
Ive had other times where I have done "surgery" with Linux live CD disks on Windows boxes, and once getting it to a state of where I can get Malwarebytes and Hijackthis to run, I've had some success.
But in the end, if you have to be sure, wipe the drive and reinstall.....
-
I have to admit, it does look cool.....
My CIO and I talked about it, and whether tablets like it would work and benefit us where we work (a financial institution)
There are currently too many drawbacks that outweigh the benefits currently at the moment for our regular users, IPad would never work for us short of it being used say, in our Marketing department, who currently use Mac laptops.
I don't know, I think I will take a wait and see approach on this one before considering a purchase.
As for hacking......have at it, lets see how it can be liberated..... B)
-
Good luck in your future endeavours......I did enjoy the virtual machine segments I watched going through the Hak5 archives using Miro during my Christmas break from work and college.
-
I think in the past with Windows Vista it was buggy drivers for peripherals and hardware components. That was a big reason why we did not upgrade at work, some of the USB devices at use at workstations would not work with Vista.
Windows 7 has solved a lot of those problems, but I agree on turning the UAC off.
how to find out if your password has been decrypted
in Security
Posted
I was looking at that too today on Ubuntu, and just verifying everywhere else I frequent didn't have the same password. But certainly not good for Canonical....