You can try to use the lsof command and check between your ps output.
You cant also check in your /proc filesystem.
If you have another server with the same OS version, you can try to do
an md5sum on your ps and netstat command. This will show you if those
command have been modify by the hacker...
Hello to all,
I would like to have comment on how to setup a backup strategie
regarding a DMZ.
Scenario 1: Put a tape unit/software in the DMZ and another one on the
LAN to have everything separate.
Plus side: No hole in DMZ Firewall
Down Side: Cost (2 unit/software), 2 sofware to manage
Senar
a read-only media (read LRP).
In my point of view, it is a good setup...(On course if you have the
money to afford CISCO or other thing may be different...)
Zach Crowell wrote:
Erik Vincent wrote:
I think there is a major difference between:
1:internet --> Outer Firew
Lets put it in ASCII.
Internet <-> Firewall <-> LAN
<-> DMZ (MAIL server)
If the MAIL server is in the DMZ. You still will have the same problem.
If the MAIL server is crack, since your LAN user need access to your
MAIL server in the DMZ,
password will stil
I think there is a major difference between:
1:internet --> Outer Firewall --> DMZ --> Inner
Firewall --> LAN
If your Outer Firewall is crack, only the
DMZ computer will be unprotected
but the LAN portion still protected. I
So according to your answer,
Internet | -->| Firewall |-->| DMZ |-->| Firewall |-->| Internal
network
Should be a more secure option.
Is it good enough for a corporate LAN?
Christopher Ingram wrote:
On Saturday, June 7, 2003, at 10:06 AM, William J. Burgos wrote:
Greetings list,
I wo