[leichter_jerrold at emc.com: Piercing network anonymity in real time]

Damian Gerow dgerow at afflictions.org
Wed May 10 02:13:05 PDT 2006


Hmmmmm...

% fetch http://etelemetry.com/pdf/Interop_finalist_final.pdf
fetch: http://etelemetry.com/pdf/Interop_finalist_final.pdf: Bad Request
% unset HTTP_PROXY
% fetch http://etelemetry.com/pdf/Interop_finalist_final.pdf
fetch: http://etelemetry.com/pdf/Interop_finalist_final.pdf: Bad Request
% telnet etelemetry.com 80
Trying 65.89.154.20...
Connected to etelemetry.com.
Escape character is '^]'.
HEAD /pdf/Interop_finalist_final.pdf HTTP/1.0

HTTP/1.1 400 Bad Request
Content-Length: 39
Content-Type: text/html
Date: Wed, 10 May 2006 09:10:56 GMT
Connection: close

Connection closed by foreign host.
%

Thus spake Eugen Leitl (eugen at leitl.org) [10/05/06 05:09]:
: ----- Forwarded message from leichter_jerrold at emc.com -----
:
: From: leichter_jerrold at emc.com
: Date: Tue, 9 May 2006 12:04:58 -0400
: To: cryptography at metzdowd.com
: Subject: Piercing network anonymity in real time
: X-Mailer: Internet Mail Service (5.5.2653.19)
:
: eTelemetry Locate                                      [Image]
:
:       Locate dynamically discovers, correlates and archives the
:       person behind the IP address--"the people layer"--to expedite
:       forensic investigations and help comply with SOX. It
:       approaches the issue of how to match a name to a network
:       device from the identity side, a change from 802.1x and NAC
:       methodologies.
:
:       The Locate appliance sits passively on the network and
:       analyzes packets in real time to garner ID info from sources
:       like Active Directory, IM and e-mail traffic, then associates
:       this data with network information.
:
:       Once Locate is populated, IT can disconnect an individual with
:       one click at the switch port level, a powerful tool for
:       enforcing policy and halting the spread of infections. You
:       also can connect to an end user's computer without asking for
:       an IP address, track assets dynamically, stay in sync with
:       Active Directory and other LDAP directories automatically, and
:       archive network activity for forensic investigations.
:       etelemetry.com/pdf/Interop_finalist_final.pdf
:
:  							-- Jerry
:
:
: ---------------------------------------------------------------------
: The Cryptography Mailing List
: Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
:
: ----- End forwarded message -----
: --
: Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
: ______________________________________________________________
: ICBM: 48.07100, 11.36820            http://www.ativel.com
: 8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE

[demime 1.01d removed an attachment of type application/pgp-signature]





More information about the cypherpunks-legacy mailing list