--On 07 August 2003 08:29 +0100 Simon Lockhart [EMAIL PROTECTED]
wrote:
The gated solution sounds interesting, but doesn't automatically
have the feedback loop of stopping advertising itself when apache
stops responding, but the box is still up (which is a fairly common
occurrence in our
--On Monday, August 11, 2003 02:26:40 PM -0700 Mike Damm
[EMAIL PROTECTED] wrote:
The DCOM exploit that is floating around crashes the Windows RPC service
when the attacker closes the connection to your system after a successful
attack. Best bet is to assume any occurrence of crashing RPC
Mark Segal wrote:
I just put an access list on one of our cores with some spare cpu cycles..
And 10% of the traffic looks like port 135 calls. Anyone else see this?
Did I break anything legitimate?
There is legitimate use for 135, although normally it is not used in the
wild much. From what