You're just jealous!
http://www.ISAserver.org
You mean terminal services can be liable to a brute force attack? Who'da ever thunk it?
Do you think other services could be susceptible to such a thing?
If Linux guys think he's good, then he must be a moron -- since I judge a man not by how he was bred, but by with whom he is fed. Just because they're color blind and don't appreciate a UI doesn't make them de facto or de jure "smart".
Next week, GMT.
Thomas W Shinder, M.D. Site: www.isaserver.org Blog: http://spaces.msn.com/members/drisa/ Book: http://tinyurl.com/3xqb7 MVP -- ISA Firewalls **Who is John Galt?**
-----Original Message----- From: Susan Bradley, CPA aka Ebitz - SBS Rocks [MVP] [mailto:sbradcpa@xxxxxxxxxxx] Sent: Saturday, November 12, 2005 2:44 AM To: [ISAserver.org Discussion List] Subject: [isalist] Securiing TS
http://www.ISAserver.org
You asked how to secure the TS through the firewall.. I'm sure everyone here knows Thor's TS tools right?
http://www.hammerofgod.com/download.htm See what those suckers are grinding at?
Passwords.
What is in that accounting program? Social Security numbers... perhaps credit cards. Show me an accounting app and I'll show you an application development team that hasn't a clue about security [see Quickbooks as a prime example]
<and even the Linux guys are impressed with Thor on the Focus on MS listserve so you know he's good>
------------------------------------------------------ List Archives: http://www.webelists.com/cgi/lyris.pl?enter=isalist ISA Server Newsletter: http://www.isaserver.org/pages/newsletter.asp ISA Server FAQ: http://www.isaserver.org/pages/larticle.asp?type=FAQ ------------------------------------------------------ Visit TechGenix.com for more information about our other sites: http://www.techgenix.com ------------------------------------------------------ You are currently subscribed to this ISAserver.org Discussion List as: tshinder@xxxxxxxxxxxxxxxxxx To unsubscribe visit http://www.webelists.com/cgi/lyris.pl?enter=isalist Report abuse to listadmin@xxxxxxxxxxxxx