RE: [expert] Security .. OT?

2000-02-11 Thread Zaleski, Matthew (M.E.)

I am currently running this way on my home machine.  But this doesn't plug
all of the holes an intruder can enter, does it?

Matthew Zaleski

> -Original Message-
> From: Bug Hunter [mailto:[EMAIL PROTECTED]]
> Sent: Thursday, February 10, 2000 10:10 AM
> To: [EMAIL PROTECTED]
> Subject: Re: [expert] Security .. OT? 
> 
> 
> 
>   1.  in /etc/hosts.deny, put
> 
> ALL : ALL
> 
>   2. in /etc/hosts.allow, enter who can access your machine (man
> hosts.allow)
> 
>   3.  update all packages whenever the update reason is a security
> issue.
> 
>   4.  run only the daemons necessary.
> 
> 
> 
> On Wed, 9 Feb 2000, ibi wrote:
> 
> > This is a security question. I don't know if it's off topic or not.
> > 
> > How do we protect our system from this type of activity? 
> > 
> > ...Snipped from: http://news.cnet.com/news/0-1003-200-1501144.html
> > "University of Washington computers also were used for attacks on
> > computers in France, Norway and Australia, he said.
> > 
> > The attack software was installed primarily on computers using Sun
> > Microsystems' Solaris and Linux--both variations of the 
> Unix operating
> > system. To break into those computers, the intruder took 
> advantage of
> > known vulnerabilities that allowed him or her to take 
> almost complete
> > control of a computer then erase his or her tracks, 
> Dittrich said..."
> > 
> > Pj 
> > [EMAIL PROTECTED]
> > 
> 



Re: [expert] Security .. OT?

2000-02-10 Thread Bug Hunter


  1.  in /etc/hosts.deny, put

ALL : ALL

  2. in /etc/hosts.allow, enter who can access your machine (man
hosts.allow)

  3.  update all packages whenever the update reason is a security
issue.

  4.  run only the daemons necessary.



On Wed, 9 Feb 2000, ibi wrote:

> This is a security question. I don't know if it's off topic or not.
> 
> How do we protect our system from this type of activity? 
> 
> ...Snipped from: http://news.cnet.com/news/0-1003-200-1501144.html
> "University of Washington computers also were used for attacks on
> computers in France, Norway and Australia, he said.
> 
> The attack software was installed primarily on computers using Sun
> Microsystems' Solaris and Linux--both variations of the Unix operating
> system. To break into those computers, the intruder took advantage of
> known vulnerabilities that allowed him or her to take almost complete
> control of a computer then erase his or her tracks, Dittrich said..."
> 
> Pj 
> [EMAIL PROTECTED]
>