Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
From: Nelson Brito (nbritosekure.org)
Date: Tue Jun 01 2010 - 08:27:48 CDT
Okay, but why did you mention AV as a client-side protection?
It leads to a discussion about client-side protection, anyways.
Please, help me to develop the ENG® SQL Fingerprint™ downloading it
from Google Code (http://code.google.com/p/mssqlfp/) or from
Sent on an iPhone wireless device. Please, forgive any potential
On Jun 1, 2010, at 9:58 AM, rajendra prasad
> Hi List,
> I have started this discussion with respect to Network IPS.
> On Tue, Jun 1, 2010 at 1:08 PM, rajendra prasad <rajendra.palnatygmail.com
> > wrote:
> Hi List,
> I am putting my thoughts on this, please share your thoughts,
> Request length is less than the response length.So, processing small
> amount of data is better than of processing bulk data. Response may
> have encrypted data. Buffering all the client-server transactions
> and validating signatures on them is difficult. Even though
> buffered, client data may not be in the plain text. Embedding all
> the client encryption/decryption process on the fly is not possible,
> even though ips gathered key values of clients.Most of the client
> protection is done by anti-virus. So, concentrating client attacks
> at IPS level is not so needed.
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/