...I am looking for tools that might try to find weak points in the security of my network, what is the best tool out there. Michael Garabedian Consultant Emergys Corporation 6340 Quadrangle Drive Suite 360 Chapel Hill, NC 27517 408-3385 ext 101 Fax 408-3384 email mikejr@emergyscorp.com website: www.emergys.com WE DENY THE EARTH PRINCIPLE OF THE THIRD EXCLUDED TERM (THE EXCLUDED MIDDLE, ENUNCIATED BY ARISTOTLE) ACCORDING TO WHICH PROPOSITIONS CAN ONLY BE TRUE OR FALSE. THE WHOLE ONTOLOGY OF TERRESTRIAL THINKERS IS SATURATED WITH EXPRESSIONS LIKE "TO BE," "I AM NOT," "I EXIST," WITHOUT ANY OPTION FOR OTHER FORMS OF DIFFERENT CONTENT. UNLESS YOU YOURSELVES CLARIFY YOUR FORMS OF INFORMATIVE COMMUNICATION, THE PROCESS OF SEEKING THE TRUTH WILL BE VERY LABORIOUS AND SLOW.
I find Nessus to be quite a reliable security auditing tool. Last I checked it came with the SuSE CD's Robert K Davies On Fri, 2002-04-05 at 14:01, Michael Garabedian wrote:
...I am looking for tools that might try to find weak points in the security of my network, what is the best tool out there.
Michael Garabedian Consultant Emergys Corporation 6340 Quadrangle Drive Suite 360 Chapel Hill, NC 27517 408-3385 ext 101 Fax 408-3384 email mikejr@emergyscorp.com website: www.emergys.com
WE DENY THE EARTH PRINCIPLE OF THE THIRD EXCLUDED TERM (THE EXCLUDED MIDDLE, ENUNCIATED BY ARISTOTLE) ACCORDING TO WHICH PROPOSITIONS CAN ONLY BE TRUE OR FALSE. THE WHOLE ONTOLOGY OF TERRESTRIAL THINKERS IS SATURATED WITH EXPRESSIONS LIKE "TO BE," "I AM NOT," "I EXIST," WITHOUT ANY OPTION FOR OTHER FORMS OF DIFFERENT CONTENT. UNLESS YOU YOURSELVES CLARIFY YOUR FORMS OF INFORMATIVE COMMUNICATION, THE PROCESS OF SEEKING THE TRUTH WILL BE VERY LABORIOUS AND SLOW.
-- To unsubscribe send e-mail to suse-linux-e-unsubscribe@suse.com For additional commands send e-mail to suse-linux-e-help@suse.com Also check the archives at http://lists.suse.com
-- ********************************************************************** This post is encrypted in the "english language method", any attempt to decipher meaning from these symbols is a violation of the DMCA. This includes, but is not limited to: interpreting the symbols through use of biological, visual decryption devices, translating the symbols into another language encryption scheme, and digital processing the symbols into a form conducive to oral intrepretation. Thank you for your time. **********************************************************************
Hi With reference to the post-script on your email: Please could you explain exactly what probability you like, that the tools suggested by the good people on the list, might - or - might not try to find weak points in the security of your network. Are you definitely |not| interested in a tool that would invariably try... ? Are you going to discount all tools that would succeed without trying? Are you willing to accept a tool that may succeed? If the tool just made a cup of coffee for everybody, would that be of interest? Oh the possibilities of greyness are limitless... WTFIC Peter (Always found at the extreme middle) On Friday 05 April 2002 8:01 pm, you wrote:
...I am looking for tools that might try to find weak points in the security of my network, what is the best tool out there.
Michael Garabedian Consultant Emergys Corporation 6340 Quadrangle Drive Suite 360 Chapel Hill, NC 27517 408-3385 ext 101 Fax 408-3384 email mikejr@emergyscorp.com website: www.emergys.com
WE DENY THE EARTH PRINCIPLE OF THE THIRD EXCLUDED TERM (THE EXCLUDED MIDDLE, ENUNCIATED BY ARISTOTLE) ACCORDING TO WHICH PROPOSITIONS CAN ONLY BE TRUE OR FALSE. THE WHOLE ONTOLOGY OF TERRESTRIAL THINKERS IS SATURATED WITH EXPRESSIONS LIKE "TO BE," "I AM NOT," "I EXIST," WITHOUT ANY OPTION FOR OTHER FORMS OF DIFFERENT CONTENT. UNLESS YOU YOURSELVES CLARIFY YOUR FORMS OF INFORMATIVE COMMUNICATION, THE PROCESS OF SEEKING THE TRUTH WILL BE VERY LABORIOUS AND SLOW.
participants (3)
-
Michael Garabedian
-
Peter Lewis
-
Phantasm