RE: [expert] Security .. OT?

2000-02-11 Thread Zaleski, Matthew (M.E.)

I am currently running this way on my home machine.  But this doesn't plug
all of the holes an intruder can enter, does it?

Matthew Zaleski

 -Original Message-
 From: Bug Hunter [mailto:[EMAIL PROTECTED]]
 Sent: Thursday, February 10, 2000 10:10 AM
 To: [EMAIL PROTECTED]
 Subject: Re: [expert] Security .. OT? 
 
 
 
   1.  in /etc/hosts.deny, put
 
 ALL : ALL
 
   2. in /etc/hosts.allow, enter who can access your machine (man
 hosts.allow)
 
   3.  update all packages whenever the update reason is a security
 issue.
 
   4.  run only the daemons necessary.
 
 
 
 On Wed, 9 Feb 2000, ibi wrote:
 
  This is a security question. I don't know if it's off topic or not.
  
  How do we protect our system from this type of activity? 
  
  ...Snipped from: http://news.cnet.com/news/0-1003-200-1501144.html
  "University of Washington computers also were used for attacks on
  computers in France, Norway and Australia, he said.
  
  The attack software was installed primarily on computers using Sun
  Microsystems' Solaris and Linux--both variations of the 
 Unix operating
  system. To break into those computers, the intruder took 
 advantage of
  known vulnerabilities that allowed him or her to take 
 almost complete
  control of a computer then erase his or her tracks, 
 Dittrich said..."
  
  Pj 
  [EMAIL PROTECTED]
  
 



Re: [expert] Security .. OT?

2000-02-10 Thread Bug Hunter


  1.  in /etc/hosts.deny, put

ALL : ALL

  2. in /etc/hosts.allow, enter who can access your machine (man
hosts.allow)

  3.  update all packages whenever the update reason is a security
issue.

  4.  run only the daemons necessary.



On Wed, 9 Feb 2000, ibi wrote:

 This is a security question. I don't know if it's off topic or not.
 
 How do we protect our system from this type of activity? 
 
 ...Snipped from: http://news.cnet.com/news/0-1003-200-1501144.html
 "University of Washington computers also were used for attacks on
 computers in France, Norway and Australia, he said.
 
 The attack software was installed primarily on computers using Sun
 Microsystems' Solaris and Linux--both variations of the Unix operating
 system. To break into those computers, the intruder took advantage of
 known vulnerabilities that allowed him or her to take almost complete
 control of a computer then erase his or her tracks, Dittrich said..."
 
 Pj 
 [EMAIL PROTECTED]