Hi James,
A single proxie system in front line will give you
an average security. This avoid people to have a direct contact with your
critical computer. Sure everything is not so simple, depending on how critical
is your network, you may look forward for a good firewall/proxy that will fit
your need.
On my end, I am simply a using a computer as
proxie, so nothing is really saw from outside. If you dont attract attention,
hacker wont take care of you. I have no point for them to waste their time on
something that does not give them a bit of prestige. More often you will be
targeted by a student or person with low skill.
What ever you do, If you become the main target of
a true hacker, he will break in your system soon or later, You cannot have
a 100% securoty seal, but you can surely bring this high enought to be able to
sleep at night.
I dont know a lot about NT, you may want
a security firm looking to your instalation, but
all backup and security plan begin by the evalutation of the cost, what
you need and what you can affort to lose.
Stephen Gilbert
----- Original Message -----
Sent: Wednesday, June 06, 2001 4:29
AM
Subject: AW: [cobalt-security] Might be
off topic. Are computers with 168.192.x.x safe from Internet?
If
you are using NT.. then you're not safe.
With only port 80 opened up, only a well
configured content scanning FW can stop the elite. On www.summercon.org there was an interesting
speach this saturday about these kind of hacks.
But
then this all depends what you are hiding in the back-lan. The more
interesting this looks from the outside, the more the
challenge:)
--
MVG,
Rob van Eijk
Hi,
Sorry if this is somewhat of an off-topic for
this list. But I just couldn't think of any place else to get a
quality answer as this list.
I have been keeping my office's internal LAN
and web servers completely disconnected in order to be absolutely sure that
internal LAN segments are safe from hacking or cracking attempts. (The
network cables physically do not connect between these two segments.)
This worked great from security perspective.
Due to obvious drawbacks with this set up, I am
now attempting to patch a line between the router to the multi-port switch
serving the NT 4 based internal LAN. Of course all internal machines
will only be assigned the private network IPs starting with 168.192. I
am hoping that the machines with private network IPs will be completely
inaccessible from outside. My big question is: Is this that
simple? Or am I missing something? Can someone access a
Internet-connected machine such as web or ftp server THEN somehow reach into
internal machines using some type of Windows share?
Any comments would be greatly
appreciated. Thanks all in advance.
James
Kim
|