Internet Security on UNIX Networks

Internet Security on UNIX Networks

Post by Snowma » Fri, 21 Mar 1997 04:00:00

In laymens terms please...
How would users on a secured unix network be able to retrive data from the
without authorization?  


Internet Security on UNIX Networks

Post by Darryn Ros » Sat, 22 Mar 1997 04:00:00

> In laymens terms please...
> How would users on a secured unix network be able to retrive data from the
> internet
> without authorization?

If you mean that your network is isolated from the internet then there
are only two ways that I can think of.  They are either dialing out on a
modem and getting the access or they are simply bringing the files in to
work on disk from home.


Round Mountain Gold Corp.     EEEEbbb      Tel:  (702)377-3256
P.O. Box 480                 E    b  b     Fax:  (702)377-3147
Round Mountain, NV  89045   EEEEE bbbbb          


1. US-MO&IL-Internet/Intranet/Network Security Manager-Unix/Firewall/permanent

US-MO&ILInternet/Network Security Manager-Unix/Firewall/permanent



  Grant Thornton LLP is the seventh-largest accounting and management
consulting firm in the U.S. with a 70-year history of providing
services to middle market companies and large, multinational
organizations.  We have an unequaled reputation for excellence and
leadership in the manufacturing and distribution environment and sound
experience in the financial services, construction, real estate, and
exempt organization industries.

We are looking for experienced; (2 senior consultants, 2 openings
senior project managers, 1 opening for Senior Program Manager)

Unix and NT experience
Network Security
Internet Security
Project management
Firewall experience
Network experience

Duties include;

Hands on technical design, architecture, analysis, and project

Program Manager will be responsible for new business development,
project management and high level technical development.

  I will need some additional information from you so I can get a
better idea of the type of career and company you desire. The region
is mostly in the midwest, however our consultants can live where ever
they desire, but it increases the amount of travel involved with the
position. What salary range do you desire for Chicago, Il, St. Louis,
MO.? When are you available? What is your visa status? How much
project management experience do you have and how can you benefit our
organization? Are you willing to relocate and travel?

  I will also need a faxed or word attached resume when you get a free
minute. If your skills and technical background fit our needs we will
contact you.


Jeffrey Dellinger
Grant Thornton LLP
fax 314-241-3240  

2. XF86 et al

3. Internet Security Monthly & Network Security Observations ???

4. Dell Dimension XPS Pentium/90 for Linux and XFree86?

5. Really serious security hole in Microport Unix (Re: SECURITY BUG IN INTERACTIVE UNIX SYSV386)

6. Port Forwarding Help

7. *** US-FL-Tampa- Internet/ Network Security ***

8. Defaultroute : How do i get it away for etho for ppp

9. SAMBA Security - can my WfW network be accessed from the internet?

10. Internet Security: Secure Communication over Untrusted Networks

11. *** US-FL-Tampa- Internet/ Network Security ***

12. Is internet security better at the network or application layer?

13. Linux/Latastic network with Internet access security issues.