On Saturday, October 15, 2011 12:21:56 PM Kent A. Reed did opine:
> On 10/14/2011 6:17 PM, Sven Wesley wrote:
> > http://linuxcnc.org/hardy/dists/hardy/emc2.4-sim/binary-amd64/
> > ----------------------------------------------------------------------
> > --------
>
> Is it just me or does there seem to be an uptick in attacks on our
> hosted resources? It makes me wonder if we've simply been "found" or if
> someone has us specifically in their sights.
>
> Whoever is doing the cleaning up, I tip my hat to you.
>
> Regards,
> Kent
>
I'll second those sentiments, Kent. I hope the logs are being kept for
forensic purposes. Tracing the src IP could well be enlightening.
Cheers, Gene
--
"There are four boxes to be used in defense of liberty:
soap, ballot, jury, and ammo. Please use in that order."
-Ed Howdershelt (Author)
Man is by nature a political animal.
-- Aristotle
------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2d-oct
_______________________________________________
Emc-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/emc-users