What do you mean by that?
--
Todd J Heron
todd_heron at hotmail dot com
"jonathan" <jon...@hotmail.com> wrote in message
news:akirh7$21o$1$830f...@news.demon.co.uk...
That's what I'd like to know too. In my humble opinion, 75%-80% of these
situations where someone thinks "such-and-such" is happening, is really not
happening at all. Many people either misinterpret what they are seeing, or
they are running IDS software that is giving them false-alarms (of a
combination of the two).
--
Ancient Chinese Secret:
If it is really, really, hard to do, then you
are probably doing it wrong to begin with.
Phillip Windell
pwin...@wandtv.com
WAND-TV (ABC Affiliate)
www.wandtv.com
--
Todd J Heron
todd_heron @ hotmail dot com
"jonathan" <jon...@hotmail.com> wrote in message
news:al29v4$a5k$1$830f...@news.demon.co.uk...
"Todd J Heron" <todd_heron@no_spam.hotmail.com> wrote in message
news:uJs10U2UCHA.1644@tkmsftngp08...
> isa server stops this kind of attact but we are not in a position to move
> over to isa yet, i was hoping proxy 2 provided something similar.
> jon
It doesn't sound like the Proxy's job or ISA's job. It is the job of the DNS
server that is being attacked. If the DNS Server is outside your Proxy
(probably belongs to the ISP?) then how in the world is a Proxy server gonna
solve that?...it doesn't have anything to do with it. Whoever is
responsible for the DNS Server has to correct this so the DNS Server is no
longer vulnerable.
The word "spoofed" gets thrown around so much it has lost it's meaning like
the term "crash" has. What does it *really* mean? *How* is this attack
performed? You have to know that before you can know what to do about it.
In the meantime use all *IP#s* for this type of transfers instead of FQDNs
and DNS will *never* get used to begin with. If no DNS is used then the
attacker can "spoof" himself silly and it won't do any good.