RE: [expert] Security .. OT?
I am currently running this way on my home machine. But this doesn't plug all of the holes an intruder can enter, does it? Matthew Zaleski > -Original Message- > From: Bug Hunter [mailto:[EMAIL PROTECTED]] > Sent: Thursday, February 10, 2000 10:10 AM > To: [EMAIL PROTECTED] > Subject: Re: [expert] Security .. OT? > > > > 1. in /etc/hosts.deny, put > > ALL : ALL > > 2. in /etc/hosts.allow, enter who can access your machine (man > hosts.allow) > > 3. update all packages whenever the update reason is a security > issue. > > 4. run only the daemons necessary. > > > > On Wed, 9 Feb 2000, ibi wrote: > > > This is a security question. I don't know if it's off topic or not. > > > > How do we protect our system from this type of activity? > > > > ...Snipped from: http://news.cnet.com/news/0-1003-200-1501144.html > > "University of Washington computers also were used for attacks on > > computers in France, Norway and Australia, he said. > > > > The attack software was installed primarily on computers using Sun > > Microsystems' Solaris and Linux--both variations of the > Unix operating > > system. To break into those computers, the intruder took > advantage of > > known vulnerabilities that allowed him or her to take > almost complete > > control of a computer then erase his or her tracks, > Dittrich said..." > > > > Pj > > [EMAIL PROTECTED] > > >
Re: [expert] Security .. OT?
1. in /etc/hosts.deny, put ALL : ALL 2. in /etc/hosts.allow, enter who can access your machine (man hosts.allow) 3. update all packages whenever the update reason is a security issue. 4. run only the daemons necessary. On Wed, 9 Feb 2000, ibi wrote: > This is a security question. I don't know if it's off topic or not. > > How do we protect our system from this type of activity? > > ...Snipped from: http://news.cnet.com/news/0-1003-200-1501144.html > "University of Washington computers also were used for attacks on > computers in France, Norway and Australia, he said. > > The attack software was installed primarily on computers using Sun > Microsystems' Solaris and Linux--both variations of the Unix operating > system. To break into those computers, the intruder took advantage of > known vulnerabilities that allowed him or her to take almost complete > control of a computer then erase his or her tracks, Dittrich said..." > > Pj > [EMAIL PROTECTED] >
[expert] Security .. OT?
This is a security question. I don't know if it's off topic or not. How do we protect our system from this type of activity? ...Snipped from: http://news.cnet.com/news/0-1003-200-1501144.html "University of Washington computers also were used for attacks on computers in France, Norway and Australia, he said. The attack software was installed primarily on computers using Sun Microsystems' Solaris and Linux--both variations of the Unix operating system. To break into those computers, the intruder took advantage of known vulnerabilities that allowed him or her to take almost complete control of a computer then erase his or her tracks, Dittrich said..." Pj [EMAIL PROTECTED]