P
Phil
If a Win2K server is running a public DNS server and has a firewall
permitting only 'normal' ports like 25, 53, 80, 119 etc, how can I
tell if unauthorised access is getting a list of domain names? e.g.
I've heard of http-tunnelling. Does the DNS server handle its own
temp logon like iusr_servername? The firewall logs are showing
outbound packets blocked to certain name servers from Winlogon
which doesn't have internet access as there are no remote servers.
Are there any other programs or services that should not have either
direct internet access or be able to access the internet via another
program or open process? I could do with some guidance because I
think a spammer has obtained info. Thanks, Phil
permitting only 'normal' ports like 25, 53, 80, 119 etc, how can I
tell if unauthorised access is getting a list of domain names? e.g.
I've heard of http-tunnelling. Does the DNS server handle its own
temp logon like iusr_servername? The firewall logs are showing
outbound packets blocked to certain name servers from Winlogon
which doesn't have internet access as there are no remote servers.
Are there any other programs or services that should not have either
direct internet access or be able to access the internet via another
program or open process? I could do with some guidance because I
think a spammer has obtained info. Thanks, Phil