Bottom line, for client / workstation installs, your run-of-the-mill
standard install with a firewall turned on will suffice, but its a
good idea to look and see to make sure. as root, run 'lsof -i -n -P'
as well as 'iptables -L -n' . The first cmd list open ports and the
owning user/process (lis
>
> Lots of ISPs now hate torrent traffic and throttle it. FTP gets a free
> pass.
> Torrents are more technically friendly, but right now, FTP is more
> socially
> friendly.
>
I suppose this depends on your ISP...so look into it. I generally use
torrents for distro CDs and larger applications wi
After a long battle with technology, Erich Newell wrote:
Please don't top-post, and trim your posts. Fixed:
> On Mon, Mar 17, 2008 at 1:33 PM, Josef Lowder <[EMAIL PROTECTED]> wrote:
>> My system seems to have slowed down quite a bit (even when I don't
>> have any programs running) and I can't f
You should be mostly concerned with what is in your startup scripts and
init.d directory. Do a "netstat -antu" and start with those. Look for
anything "LISTEN"ing on a non-loopback interface. Do you know what they all
are and why they are running? If not, then figure out what they are and
eliminate
.
On Mon, 17 Mar 2008 09:17, Matt Graham wrote (in part)
> After a long battle with technology, Josef Lowder wrote:
> > This is all very interesting ... and confusing for my simple mind.
> > It sounds like most of the replies to my question pertain to
> > boxes that are used as "servers" and not ju
After a long battle with technology, Erich Newell wrote:
> I recommend Single Packet Authentication or Port Knocking for use in
> conjunction with your SSH service.
Single packet authentication: http://www.linuxjournal.com/article/9621
It looks interesting. However, the program described in that
After a long battle with technology, Josef Lowder wrote:
> This is all very interesting ... and confusing for my simple mind.
> It sounds like most of the replies to my question pertain to
> boxes that are used as "servers" and not just "regular users."
> Or are we all "servers"?
If you're running
On Mon, Mar 17, 2008 at 09:57:05AM -0600, Josef Lowder wrote:
> .
> On Mon, 17 Mar 2008 08:37, Mike Bydalek wrote
> > Jon M. Hanson wrote:
> > > Josef Lowder wrote:
> > >> Are Linux boxes vulnerable to be used by botnets?
> > >>
> > > Pr
cation or Port Knocking for use in
> conjunction with your SSH service.
>
>
>
>
> On Mon, Mar 17, 2008 at 8:37 AM, Mike Bydalek
> <[EMAIL PROTECTED]> wrote:
>
> > Jon M. Hanson wrote:
> > > Josef Lowder wrote:
> > >> .
> > >> Are Linux
After a long battle with technology, Erich Newell wrote:
[ botnets, ssh brute force attacks, etcetera ]
> I recommend Single Packet Authentication or Port Knocking for use in
> conjunction with your SSH service.
Port knocking is really useful, but you need to have something on the remote
client t
.
On Mon, 17 Mar 2008 08:37, Mike Bydalek wrote
> Jon M. Hanson wrote:
> > Josef Lowder wrote:
> >> Are Linux boxes vulnerable to be used by botnets?
> >>
> > Probably at least once a day my Linux box that I have co-located is
> > probed for a weak pa
I recommend Single Packet Authentication or Port Knocking for use in
conjunction with your SSH service.
On Mon, Mar 17, 2008 at 8:37 AM, Mike Bydalek <
[EMAIL PROTECTED]> wrote:
> Jon M. Hanson wrote:
> > Josef Lowder wrote:
> >> .
> >> Are Linux boxes
Jon M. Hanson wrote:
> Josef Lowder wrote:
>> .
>> Are Linux boxes vulnerable to be used by botnets?
>>
>> This article in USA Today is frightening.
>>
>> http://www.usatoday.com/tech/news/computersecurity/2008-03-16-computer-botnets_N.htm
>>
>&g
Josef Lowder wrote:
.
Are Linux boxes vulnerable to be used by botnets?
This article in USA Today is frightening.
http://www.usatoday.com/tech/news/computersecurity/2008-03-16-computer-botnets_N.htm
---
PLUG-discuss mailing list - PLUG-discuss
your
systems.
Cheers.
- Erich
On Sun, Mar 16, 2008 at 11:49 PM, der.hans <[EMAIL PROTECTED]> wrote:
> Am 16. Mar, 2008 schwätzte Josef Lowder so:
>
> > Are Linux boxes vulnerable to be used by botnets?
>
> Theoretically yes, but not really. If there were a security hole that
Am 16. Mar, 2008 schwätzte Josef Lowder so:
Are Linux boxes vulnerable to be used by botnets?
Theoretically yes, but not really. If there were a security hole that
could be exploited someone could take advantage of it to deliver a payload
that would turn GNU/Linux boxen into trojans. GNU
.
Are Linux boxes vulnerable to be used by botnets?
This article in USA Today is frightening.
http://www.usatoday.com/tech/news/computersecurity/2008-03-16-computer-botnets_N.htm
---
PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
17 matches
Mail list logo