Re: protecting against buffer overflow.

2001-09-15 Thread Alberto Cortés
El sáb, 15 de sep de 2001, a las 13:30 -0400, Russell decía que: > What's a good piece of software to monitor for system accesses? snort is good for detecting well known attacks to your system. > Should I report the IP to RBL or something like that? I use to run whois on the attacker IP an

Re: protecting against buffer overflow.

2001-09-15 Thread Rishi L Khan
You can setup logcheck and cron to check every minute for "suspcious" log entries (as you define them) and have them emailed to you. Additionally, you can edit the logcheck.sh file and have it notify you anyway you like. -rishi On 15 Sep 2001, Russell Speed wrote: > Thanks, I wil

Re: protecting against buffer overflow.

2001-09-15 Thread Russell Speed
Thanks, I will add that line. This box only acts as a firewall and access for my home network, so there isn't much on it. I'm just considering the idea of editing the pertinent scripts to accomplish that and was wondering if some tried but found the task too daunting. I guess for backdoors it's

Re: protecting against buffer overflow.

2001-09-15 Thread Alberto Cortés
El sáb, 15 de sep de 2001, a las 13:30 -0400, Russell decía que: > What's a good piece of software to monitor for system accesses? snort is good for detecting well known attacks to your system. > Should I report the IP to RBL or something like that? I use to run whois on the attacker IP a

Re: protecting against buffer overflow.

2001-09-15 Thread Rishi L Khan
You can setup logcheck and cron to check every minute for "suspcious" log entries (as you define them) and have them emailed to you. Additionally, you can edit the logcheck.sh file and have it notify you anyway you like. -rishi On 15 Sep 2001, Russell Speed wrote: > Thanks, I wi

Re: protecting against buffer overflow.

2001-09-15 Thread Russell Speed
Thanks, I will add that line. This box only acts as a firewall and access for my home network, so there isn't much on it. I'm just considering the idea of editing the pertinent scripts to accomplish that and was wondering if some tried but found the task too daunting. I guess for backdoors it's