On Wed May 07, 2003 at 03:3721PM -0400, Robert B Wilson wrote:
On Wed, 7 May 2003 08:53:40 +0200 Michael Bergbauer
[EMAIL PROTECTED] writes:
If you
think SSH (or any other component) is not trustworthy, just look for
alternatives (or create them yourself).
what would be a more secure
secure services on a
server, and not to disguise unsecure ones in an obscure way. If you
think SSH (or any other component) is not trustworthy, just look for
alternatives (or create them yourself).
--
Michael Bergbauer [EMAIL PROTECTED]
use your idle CPU cycles - See http://www.distributed.net
May 7 14:49 still logged in
team1pts/0blue99.ex.ac.uk Wed May 7 13:21 - 13:57 (00:35)
Who is the user team1
I have run chkrootkit but nothing was found.
That's exactly what chkrootkit can tell you - nothing found, but not
nothing installed.
--
Michael Bergbauer [EMAIL
missing something or what?
I don't think Debian potato is vulnerable, as the security team
usually backports the patches to the versions in a released version. So
the 3.1p1 in Potato should have all necessary patches in place.
--
Michael Bergbauer [EMAIL PROTECTED]
use your idle CPU cycles - See
- -
No idea about that .. but its also Return Code 404, so probably nothing
dangerous
--
Michael Bergbauer [EMAIL PROTECTED]
use your idle CPU cycles - See http://www.distributed.net for details.
Visit our mud Geas at geas.franken.de Port
software, probably use some useful way of intrusion
detection like tripwire, and you should be on the safe side.
--
Michael Bergbauer [EMAIL PROTECTED]
use your idle CPU cycles - See http://www.distributed.net for details.
Visit our mud Geas at geas.franken.de Port
6 matches
Mail list logo