El sáb, 15 de sep de 2001, a las 13:30 -0400,
Russell decía que:
> What's a good piece of software to monitor for system accesses?
snort is good for detecting well known attacks to your system.
> Should I report the IP to RBL or something like that?
I use to run whois on the attacker IP an
You can setup logcheck and cron to check every minute for "suspcious" log
entries (as you define them) and have them emailed to you. Additionally,
you can edit the logcheck.sh file and have it notify you anyway you like.
-rishi
On 15 Sep 2001, Russell Speed wrote:
> Thanks, I wil
Thanks, I will add that line.
This box only acts as a firewall and access for my home network, so
there isn't much on it. I'm just considering the idea of editing the
pertinent scripts to accomplish that and was wondering if some tried but
found the task too daunting.
I guess for backdoors it's
El sáb, 15 de sep de 2001, a las 13:30 -0400,
Russell decía que:
> What's a good piece of software to monitor for system accesses?
snort is good for detecting well known attacks to your system.
> Should I report the IP to RBL or something like that?
I use to run whois on the attacker IP a
You can setup logcheck and cron to check every minute for "suspcious" log
entries (as you define them) and have them emailed to you. Additionally,
you can edit the logcheck.sh file and have it notify you anyway you like.
-rishi
On 15 Sep 2001, Russell Speed wrote:
> Thanks, I wi
Thanks, I will add that line.
This box only acts as a firewall and access for my home network, so
there isn't much on it. I'm just considering the idea of editing the
pertinent scripts to accomplish that and was wondering if some tried but
found the task too daunting.
I guess for backdoors it's
6 matches
Mail list logo