firewall

Firewall policy sanity check tool

Hi All, Im looking for a tool to analyzer firewall policy to check if there are duplicate rules/overwritten rules. Could you please suggest any to do the job? Thanks. ...

ClickOnce applications and Windows Firewall

It appears to me that ClickOnce applications will not work smoothly with Windows Firewall. I have been successfully utilitising ClickOnce deployments for two years. This has hit a stumbling block now the enterprise has upgraded to Windows 7. Each user's configuration has changed: Windows Firewall is enabled on each user's machines ...

Linux; How do I find logs if a program I'm running uses certain ports?

I am running CentOS 5 with csf firewall. I'm running a program that can't connect to another server (using some port that is blocked by csf I presume). Where is the log file for 'ports'? ...

Programmatically add rules to "Windows Firewall with Advanced Security snap-in" ?

Is there any library in .NET that would allow me to manipulate the Windows Firewall with Advanced Security in Windows 7? The reason I ask this is because, I want to be able to add program/port exceptions programmatically. For example, I want to add program.exe to the Inbound Rules section and for this program, I want to allow TCP port ...

jsp refers to an PDF streaming servlet - security question

Somewhere behind our firewall sits a server full of PDFs. The PDFs contain private information so I need to restrict access to the PDFs. The public can log in to our web site and request their PDFs. Our software went to production recently. We're redirecting them to the PDF server's URL. This fails because the public can't access ou...

Using HTTP port to evade firewall

I'm creating a client-server application which communicates via a custom socket protocol. I'd like the client to be usable from within networks that have a restrictive firewall (corporate, school, etc.). Usually this is done by connecting via HTTP, since that's always available. If I want to do that, do I really have to use HTTP or is i...

public TURN server

Hi all, I need to test an implementation of the SIP/IMS application which is behind a NAT. FOr the same, I am looking for a public TURN server that can be used for a limited purpose to test the application. I did look at numb.viagenie.ca, but it seems to be based on older version of the specs. Are there any other public TURN servers ...

ec2: cannot open port 5080 on windows instance

Hi there, I'm pretty new with ec2, firewall settings etc, so I might be missing something obvious, but: I've created a 'getting started with windows' instance with a security group that has 5080 specified and is associated with an elastic ip On the instance I have a red5 server running. when I run the server it on 127.0.0.1:5080, i ...

RMI calls not working when firewall present on the WindowsXP client, but fine on Windows 7 client

Hi, I am using the basic RMI-based client/server app shown in Java Tutorials. I am running the server and client on different machines. I also export the remote objects for both the server and client, and make them available to each other. However, there is a firewall turned on the client side and so the RMI calls fail (from client t...

Noob questions for SVN checkout and network issues regading it.

We have a local server with SVN installed on it that we are using for development/testing purpouses. We would like to checkout the data from it to the live server that is somewhere out there. The only way to do that which I thought of was to use "svn checkout" from the live server, right? This way we do not need to FTP the changes to it...

Firewall blocking files using Reg_Ex needs to be adjusted

We have security in our firewall to prevent SQL-Injection from destroying any of our content: Name Type Context Severity Pattern Configure CS:select_into signature http-url critical .*\[select\].*\[into\].* Edit Remove CS:select_from signature http-url critical .*\[select\].*\[from\].* Edit Remove CS:insert_into sig...

Will this regex patterns catch all the needed SQL injections?

We changed our firewall rules (REGEX) to the following: Name Type Context Severity Pattern CS:select_into signature http-url critical .*\[select\]\s+.*\[into\].* CS:select_from signature http-url critical .*\[select\]\s+.*\[from\].* CS:insert_into signature http-url critical .*\[insert\]\s+.*\[into\].* CS:drop_databa...

CISCO ASA 5510: How to view the number of connections per second?

How can I view the number of connection per second that my CISCO ASA 5510 Firweall is processing? Inbound and Outbound. Thanks, ...

Python Firewall for Windows?

I am wanting to write a custom firewall for my win XP Pro SP2 computer. I would like to do it in Python, but I'm not exactly sure how. I would like it to block everything in and out of the computer until I approve it. How would this be done? ...

How to Background time/IO-consuming operations across a firewall in ASP.NET C#

Summary We have an ASP.NET application that allows users to query a SQL Server Database through a middle layer (pretty standard stuff). When the user attempts to generate a PDF for the rows that were returned to them. Each set of rows with a common identifier will "turn into" a separate page in the resulting PDF. Originally, I assumed t...