lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <B66627FB162985428D5F11AC8F847D959931CF@HAWAII.jbc.jfcom.mil> Date: Mon, 24 Nov 2003 11:55:34 -0500 From: "Bohling James CONT JBC" <james.bohling@....JFCOM.MIL> To: "?????? ??" <akuroda@....nisiq.net>, <bugtraq@...urityfocus.com> Subject: RE: Unhackable network really unhackable? DHCP with a short lease period or a manual lease period Here's yer sign! Thank You, James T. Bohling, CCNA, Security+, MCP-Win2k Network Security Engineer - JBC CoE Joint C4ISR Battle Center (AMSEC) 116 Lake View Parkway Suffolk, VA 23435 (W) 757-638.4032 Web: www.jbc.jfcom.mil This email was produced and manufactured in America, and is a one-of-a-kind original. -----Original Message----- From: akuroda@....nisiq.net [mailto:akuroda@....nisiq.net] Sent: Monday, November 24, 2003 8:15 AM To: bugtraq@...urityfocus.com Subject: Unhackable network really unhackable? Have you ever checked out the InvisiLAN technology? InvisiLAN is seemingly developed by ex-KGB and CIA directors. It's a random IP change technology inside LAN by a set of secureID like network cards and special router. Anarkey Network security, a Dutch company started to distribute InvisiLAN in Europe recently. I saw that they started "hacker's challenge 2003" to let hackers to break their invisible LAN security, however the news disappeared right away. I'm very curious about the technology. Are there someone who're knowledgeable about a security method to change randomly individual PC's IP? Original source http://www.invictanetworks.com/ Distributor in Europe http://www.anarkey.org/en/index.html ------------------------------------------------- Programmer::Atsushi Kuroda::akuroda@....nisiq.net -------------------------------------------------
Powered by blists - more mailing lists