On 9 Oct 99, at 17:14, Ahbaid Gaffoor wrote:
> Where can I find information on how to exploit certain OS's?
>
> I'm setting up a RedHat based web server and would like to demonstrate
> the need for security policies to my employer and clients...
One of the common scan signatures that we were seeing last Oct-
March, we started referring to as "womebody's RedHat box got
compromised", because when we notified the admins at the source IP
address, that was invariably found to be the case.
David G
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]