Jump to content

macrohard

Active Members
  • Posts

    45
  • Joined

  • Last visited

Posts posted by macrohard

  1. Well, one of the reasons I did it was because of the fact I have "kids" and they have a lot of wireless devices, including school laptops. I like the web filtering capabilities in Untangle, so by putting the wireless in the DMZ, I still have control of web content and what's being downloaded. I don't have that control if I kick on the wireless in the AT&T DSL router and they run through that. Plus I want to use OpenVPN, so I set the AT&T router to push all traffic to the Untangle box (I have DynDNS setup in Untangle.)

    I also have an idea about full tunnel with Ubuntu and OpenVPN going through Untangle, but alas, have to work to eat....will try it out tonight.

  2. Yeah I haven't had much time either, I would really like to get this to work for my Linux laptop.

    I have a colleague of mine who is a CTO of another UTM company. We use to use them at my workplace, until my CIO came under the influence of the devil and went with AT&T for this supposedly wonderful "cloud-based" security solution. That UTM company used OpenVPN, so I sent him a message about this to see if I could get any insight.

  3. 2v9u1kh.png

    Just a layout of what I do with Untangle. My OpenVPN is set up where it only will access the Internal LAN, and the wireless network is in a DMZ segmented away from the PC's. That way, if the wireless were ever compromised, then all the harder to work around over to the LAN side.

  4. Okay I'm back. I was looking over your blog post about Untangle and full tunneling.

    I too seem to struggle on finding a full tunnel solution in Untangle for Linux Os's. It seems to be an issue with Network Manager (I use Ubuntu 12.10 on my laptop) from what I have read over the Internet, and so far I haven't found a good solution, it appears to be more of client side issue rather than Untangle issue

    I don't have a problem doing full tunnel traffic in say Windows 7, that works and routes the Internet traffic down the tunnel and out the Untangle box with no issues. (The full tunnel issue in OpenVPN was corrected if I understand right in Untangle version 9.3.)

  5. Hmmmmm......

    The placement of wireless AP in a LAN network is one that always bothers me, as to what occurs if by chance if it is, compromised. I also use Untangle for Open VPN but I segment the traffic as it comes into the box. I tend however to segment the wireless traffic in its own LAN, separate away from my home PC's. My wireless AP sits in a DMZ off of a third NIC card in my Untangle setup.

  6. PaulyD,

    While telecommunication companies are immune from litigation, it was recently ruled here in the US that the government may be sued for for illegal wire tapping. The Ninth district is allowing a suit to continue against the government.

    My link

    Wow, I now have ended up two times in the mailbag on the show, do I get free swag if I end up three times? B)

    As to comment on the show, I guess the only item could say is on what was not discussed.

    Lets say I have setup my phone for mobile banking, or use it for any level of financial transactions. I build a relationship of trust when I do financial transactions. So when keying two factor authentication to say my homebanking website, it what point would Carrier IQ be involved in that level of trust? If I key in my two-factor information through a secure website, Carrier is still recording that information and uploading it to whatever server they are running.

    The issue then becomes, well I didn't recall signing up for anything that involves Carrier. I signed up for an agreement with my financial institution for protection of information and my finances. If my financial institution screws up and I end up getting compromised, I can pursue legal action. Can I do the same thing with Carrier, in the event they get compromised and my information was sitting on one their servers that gets hacked? Or do they hide also behind telecom immunity?

  7. This continues to be an infringement on the rights of citizens, regardless of political, social, or cultural differences. As well as taking away the process on innovation from citizens and placing it into the hands of corporate entities who are sponsoring this legislation. Funny how corporate entities would not be where they are today without regular citizens who had the ability to innovate who started and founded the corporations.

  8. I was just surprised this evening that Snubbs did a segment on it, just watched the show.

    The functionality is what I was looking for what I do on the job, the software provided a great solution for changing files base on names, dates and extensions. Its fun when it all needs to be categorized in a particular way for import, indexing, and running queries against.

    Just wanted to say that the "Bulk Renaming" functionality that snubs showed is actually built into windows (not sure what versions, but at least Windows 7 supports it.. probably vista, maybe XP)

    If you select many files, hit F2 to rename... you can type in a filename and hit enter.

    The files will be named as such (if renamed to "test"):

    test (1).txt

    test (2).txt

    test (3).txt

    etc.

    It looks like the bulk renaming tool supports more functionality (regex), etc., but the basic functionality exists already.

  9. Something keeps bugging me about this worm, and its origin.

    Would anybody here possibly consider if Haystack might have been a possible suspect in all this?

    It was a project to assist Iranians in bypassing their governments firewalls and web filters, could something been deployed that if an Iranian visited a particular website using Haystack, something could have been downloaded (Stuxnet) back into their own computers, and spread undetected through Iranian networks and USB keys?

    The US Government allowed Haystack out to Iran, and bypass the US export restrictions.

    It seems strange now that Haystack has "gone to ground" now, the project is in hiatus pending a "security review".

    All good timing.

    b:\myrtus\src\objfre_w2k_x86\i386\guava.pdb

    When searching for these two words on Google, the seventh item is the search order talks about plants. Myrtus or (Chilean) Guava is a perennial bush that grows outside of San Francisco.....home of Haystack...

    Just something to throw out to see if line of thinking was logical....

  10. I would have to agree, there are a lot open source based firewall products that you can get (like Pfsense, Untangle, and others) that get more bang out of the buck than AlphaShield.

    100% effective? That alone is just a sales pitch, even high end firewall companies never boast they will get eveything.

  11. I think it depends upon the situation, I had a Vista box I worked on for a friend and it just completely defeated me (that and BlackSOD), regardless of what I could do. That situation involved a reinstall.

    Ive had other times where I have done "surgery" with Linux live CD disks on Windows boxes, and once getting it to a state of where I can get Malwarebytes and Hijackthis to run, I've had some success.

    But in the end, if you have to be sure, wipe the drive and reinstall.....

  12. I have to admit, it does look cool.....

    My CIO and I talked about it, and whether tablets like it would work and benefit us where we work (a financial institution)

    There are currently too many drawbacks that outweigh the benefits currently at the moment for our regular users, IPad would never work for us short of it being used say, in our Marketing department, who currently use Mac laptops.

    I don't know, I think I will take a wait and see approach on this one before considering a purchase.

    As for hacking......have at it, lets see how it can be liberated..... B)

  13. Good luck in your future endeavours......I did enjoy the virtual machine segments I watched going through the Hak5 archives using Miro during my Christmas break from work and college.

×
×
  • Create New...