On Wed, Dec 31, 2008 at 06:59:41AM +0800, Ed Greshko wrote:
> Dave Feustel wrote:
> >
> > I'm doing an experiment to see if removing KDE files reduces the number
> > of incidences of apparent security exploits ocurring on my system.
> >
> >   
> FWIW, if you are having successful attacks against your system it may be
> your configuration rather than a specific specific set of packages. 
> Besides, you should identify the actual exploit that occurred and
> determine the point of entry. 
> 
> Have you identified the actual exploit?   How will you know if you have
> actually found the issue and corrected it?  What if you delete
> files/applications and the attacker stops attacking?  Have you actually
> fixed anything?  If the attack is coming over the network, have you
> captured indications with a packet capture?

You are asking a lot of good questions. The answer to the last question
is no.
 
> With little information that you've supplied some may think you are
> jumping the gun.

They are welcome to think what they want. 

-- 
fedora-list mailing list
[email protected]
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines

Reply via email to