Recent content by Rabidfox

  1. R

    Drag and drop files onto RDP

    1) he said for vista or better, which is not true. 2) exactly, why is this in virtualization?
  2. R

    Drag and drop files onto RDP

    open remote desktop "mstsc.exe", select options, select options, go to "local resources" select "more", check drives. When you connect they'll show up in explorer, sheesh, what's wrong with that?
  3. R

    China running port scans on my firewall

    http://www.ipdeny.com/
  4. R

    How bad is it to daisy chain network switches?

    1) you're a home user 2) you don't have to worry about layer 2 considerations other than gigabit or FE(wireless has other considerations, read a book). 3) If you can measure the 1-2MS(IF ANY) delay by having a large 2 topology, then you're a better man than me and waaaaaaaaay more...
  5. R

    Networking rant.

    BWAHAHAAHAHA It's so true it hurts. good job.
  6. R

    Is it possible to obtain an IP range for a specific state?

    http://www.ipdeny.com/ipblocks/ ...so, no, no state by state deny. IPv6 will change everything, I believe we'll rely heavily, or completely, on DNS. So that is another vote for, maybe.
  7. R

    any CCNA 's in here?

    I read the N+ book , didn't take the test, it seemed pretty stupid. Then I took a CCNA bootcamp, passed the CCNA and have been moving on from there. I have Bluecoat, Linux and most of the CCSP finished. Don't waste your time on taking the N+, it's a good simple book that get's you into it...
  8. R

    VPN Question...

    if by cheesy you mean SOHO/remote spoke/small business, then sure. You can terminate a VPN tunnel on a lot of devices (plent of them are free) OTP(one time pass) tokens are the hangup, as previously mentioned. No way arund that other than taking a step down. I suggest disabling aggressive...
  9. R

    Replaced Our PIX515E

    in PIX/ASA 7+ you can get the pre shared secrets rather simply, and without tftp. "more system:running-config". That's copy/pastable into a new box, just make sure when you copy/paste configs that the new box has no configuration on it, "write erase" then "reload" to make sure.
  10. R

    Replaced Our PIX515E

    are the os versions the same? PIX 6 to 7 == no worky. like the poster said above, you need a tool to convert it, or just do it by hand...
  11. R

    Remote PC Apps??

    Dameware comes to mind, but that's wildly insecure....
  12. R

    GET Header Length

    I couldn't find a specific length in the RFC, but considering that GET requests sent to (explicit)proxies contain URL's and URL's can be 255 bytes or longer, then no, 32 bytes for a GET request can't be right. Hope that helps... :)
  13. R

    question about security when using a virtual machine

    Don't be so quick, guys...There are published exploits for guests that affect the host computer. That means that something that happens on the VM machine can affect the host machine, VMware is not a security measure, it's a tool.
  14. R

    Encrypted drive solutions.

    The NSA approved (voted) on the algorithm, I'm sure there is some mathmatical weakness. Not enough to put it at our level of brute force cracking, but I'm sure there is a hardware based cracker (custom silicon) or a supercomputer. OS profiling can cut the number of possible "random" keys down...
  15. R

    Question Regarding Subnetting

    to go anywhere, anywhere at all, in the networking world requires you to subnet in your head on the fly. Don't do boolean algebra with bits, just use the magic number and you'll figure it all out. If you don't understand subnetting, you won't get far at all.
Back
Top