I am currently running this way on my home machine. But this doesn't plug
all of the holes an intruder can enter, does it?
Matthew Zaleski
-Original Message-
From: Bug Hunter [mailto:[EMAIL PROTECTED]]
Sent: Thursday, February 10, 2000 10:10 AM
To: [EMAIL PROTECTED]
Subject: Re: [expert] Security .. OT?
1. in /etc/hosts.deny, put
ALL : ALL
2. in /etc/hosts.allow, enter who can access your machine (man
hosts.allow)
3. update all packages whenever the update reason is a security
issue.
4. run only the daemons necessary.
On Wed, 9 Feb 2000, ibi wrote:
This is a security question. I don't know if it's off topic or not.
How do we protect our system from this type of activity?
...Snipped from: http://news.cnet.com/news/0-1003-200-1501144.html
"University of Washington computers also were used for attacks on
computers in France, Norway and Australia, he said.
The attack software was installed primarily on computers using Sun
Microsystems' Solaris and Linux--both variations of the
Unix operating
system. To break into those computers, the intruder took
advantage of
known vulnerabilities that allowed him or her to take
almost complete
control of a computer then erase his or her tracks,
Dittrich said..."
Pj
[EMAIL PROTECTED]