I suppose if a cracker got into your Windows system, they could read ext2
(linux) files if they used one of those ext2 file viewer programs. Linux
being on a second hard drive wouldn't matter in that condition, since it'd
still be part of the system. However since your Linux partitions
As far as I know, there are no security issues with having a dual boot
system. No more then usual at least. The only thing to worry about
would be system stablity.
Unless there's an application out there that I just don't know about,
WinBLOZE can't read a EXT2 file system. So you won't be
Hi All,
As I'm sure you all know I'm fairly new to Linux and I have a couple of
simple questions.
First - I've installed Mandrake 7.1 on a compaq ML370 using the high
security option. The only thing I cannot do is telnet to the server from a
different machine and log in as root, it
ewbielinux-mandrakecom'
Subject: [newbie] Security Question and SCSI Tape Utilities
Hi All,
As I'm sure you all know I'm fairly new to Linux and I have a couple of
simple questions.
First - I've installed Mandrake 7.1 on a compaq ML370 using the high
security option. The only thing I cannot do
That was it - Thanks!!
Alan
-Original Message-
From: Vincent A.Primavera [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, November 07, 2000 9:45 AM
To: [EMAIL PROTECTED]
Subject: Re: [newbie] Security Question and SCSI Tape Utilities
Hello,
Check /etc/securetty. It lists
: [newbie] Security Question and SCSI Tape Utilities
well you don't "log in" as root --
you log in as a user account and su to get root.
as to the 2nd question not sure
Alan
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Mocksfield Alan
Sent: Tuesday
Hi All,
As I'm sure you all know I'm fairly new to Linux and I have a couple of
simple questions.
First - I've installed Mandrake 7.1 on a compaq ML370 using the high
security option. The only thing I cannot do is telnet to the server from a
different machine and log in as root, it
Portsentry reported this:
Active System Attack Alerts
=-=-=-=-=-=-=-=-=-=-=-=-=-=
Oct 17 20:36:51 hornet portsentry[642]: attackalert: UDP scan
from
host: 1Cust222.tnt5.phoenix2.az.da.uu.net/63.16.193.222 to UDP
port:
161
Oct 17 20:36:51 hornet portsentry[642]: attackalert: Host
63.16.193.222
e: [newbie] Security Question
Replace the portsentry.conf KILL_ROUTE command line with the following and
restart portsentry:
KILL_ROUTE="/sbin/ipchains -I input -s 128.143.40.230 -j DENY -l"
This will insert the offending host at the top of your ipchains rules and
you won't have to w
the complete 128.143 there is a different way ok
stephen
- Original Message -
From: "Greg Stewart" [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Thursday, October 19, 2000 9:49 AM
Subject: Re: [newbie] Security Question
Replace the portsentry.conf KILL_ROUTE command line wi
10 matches
Mail list logo