RE: [expert] Security .. OT?

2000-02-11 Thread Zaleski, Matthew (M.E.)

I am currently running this way on my home machine.  But this doesn't plug
all of the holes an intruder can enter, does it?

Matthew Zaleski

> -Original Message-
> From: Bug Hunter [mailto:[EMAIL PROTECTED]]
> Sent: Thursday, February 10, 2000 10:10 AM
> To: [EMAIL PROTECTED]
> Subject: Re: [expert] Security .. OT? 
> 
> 
> 
>   1.  in /etc/hosts.deny, put
> 
> ALL : ALL
> 
>   2. in /etc/hosts.allow, enter who can access your machine (man
> hosts.allow)
> 
>   3.  update all packages whenever the update reason is a security
> issue.
> 
>   4.  run only the daemons necessary.
> 
> 
> 
> On Wed, 9 Feb 2000, ibi wrote:
> 
> > This is a security question. I don't know if it's off topic or not.
> > 
> > How do we protect our system from this type of activity? 
> > 
> > ...Snipped from: http://news.cnet.com/news/0-1003-200-1501144.html
> > "University of Washington computers also were used for attacks on
> > computers in France, Norway and Australia, he said.
> > 
> > The attack software was installed primarily on computers using Sun
> > Microsystems' Solaris and Linux--both variations of the 
> Unix operating
> > system. To break into those computers, the intruder took 
> advantage of
> > known vulnerabilities that allowed him or her to take 
> almost complete
> > control of a computer then erase his or her tracks, 
> Dittrich said..."
> > 
> > Pj 
> > [EMAIL PROTECTED]
> > 
> 



Re: [expert] Security .. OT?

2000-02-10 Thread Bug Hunter


  1.  in /etc/hosts.deny, put

ALL : ALL

  2. in /etc/hosts.allow, enter who can access your machine (man
hosts.allow)

  3.  update all packages whenever the update reason is a security
issue.

  4.  run only the daemons necessary.



On Wed, 9 Feb 2000, ibi wrote:

> This is a security question. I don't know if it's off topic or not.
> 
> How do we protect our system from this type of activity? 
> 
> ...Snipped from: http://news.cnet.com/news/0-1003-200-1501144.html
> "University of Washington computers also were used for attacks on
> computers in France, Norway and Australia, he said.
> 
> The attack software was installed primarily on computers using Sun
> Microsystems' Solaris and Linux--both variations of the Unix operating
> system. To break into those computers, the intruder took advantage of
> known vulnerabilities that allowed him or her to take almost complete
> control of a computer then erase his or her tracks, Dittrich said..."
> 
> Pj 
> [EMAIL PROTECTED]
> 



[expert] Security .. OT?

2000-02-09 Thread ibi

This is a security question. I don't know if it's off topic or not.

How do we protect our system from this type of activity? 

...Snipped from: http://news.cnet.com/news/0-1003-200-1501144.html
"University of Washington computers also were used for attacks on
computers in France, Norway and Australia, he said.

The attack software was installed primarily on computers using Sun
Microsystems' Solaris and Linux--both variations of the Unix operating
system. To break into those computers, the intruder took advantage of
known vulnerabilities that allowed him or her to take almost complete
control of a computer then erase his or her tracks, Dittrich said..."

Pj 
[EMAIL PROTECTED]