So I pick out one of the IP's and email the hostmaster about the attack, =
and this is his reply below. .. .. Hello,
These 'attacks' are you running KaZaA. This IP is your KaZaA = supernode.
Please learn how to use and understand your firewall.
Do you have a dynamic IP address? If so,
I used the Linux version. The CIS audit tools will just report and not make
any changes. In so far, I don't think that they will crash your server.
Like all similar tools I have used so far, the CIS tools have to be
adapted to your own organization. Don't just apply them blindly.
The tool will
Just wondering what others are doing to expand their security knowledge?
I'm interested to hear what others are doing with some sort of test
network or lab.
For a test 'lab/network', I like vmware. Not only does it safe on hardware,
but it does make cleanup so much easier.
--
# df -h == used MB or GB
then:
# dd if=/dev/hda1 bs=1M count=used MB or GB | gzip hda1-image.gz
Will this work if the disk space is used non-continuous?
--
[EMAIL PROTECTED] Collaborative Intrusion
Here is a sample message:
Authorized Use Only!
You may also add a 'surrender your privacy' message:
Authorized use only. By accessing this system, you agree to having
all your actions logged. The logs may be shared with others.
(the second half about sharing is important so you can for
When the users wants to access the internet, he has to establish the VPN
and use the corporate proxy server... better safe than sorry
good policy
This is bothering me... how can we set things up so the user can use the
local broadband connection,
without dynamically changing the policy,
looks too me like good old Code Red Version 1.
On Sat, 7 Dec 2002 16:13:11 +0100
Paolo Mattiangeli [EMAIL PROTECTED] wrote:
Hi everybody, I guess maybe someone out there can help me with this. I
have a w2k server running IIS 5 and keep receiving what I think to be
probes on my web server.
Is there some way to whois arin on a nic handle to get all the classes?
also depends on what you call 'AOL'. Here are the records for
'AOL-NOC-ARIN'. But should the Netscape division be considered
part of AOL as an ISP?
152.163.0.0-152.163.255.255 America Online
1. Which OS is considered the best suited for a firewall?
hehe... flamewar time. many people say 'openbsd' here.
but linux is probably better supported and pretty good as
well.
2. What are the application/software required to be installed?
openbsd and linux come with their own
The password check uses pam's 'cracklib' interface. For some details on
this features see /usr/share/doc/pam-0.75/txts/README.pam_cracklib
'cracklib' uses a wordlist from /usr/share/dict/words .
some details about cracklib:
http://www.users.dircon.co.uk/~crypto/download/cracklib,2.7.txt
On
I got one serious question that is I received complains regarding one
of the image on my web site has been modified by a PORN picture ! While
the image have resumed normal during the second visit.
Well, one thing I haven't seen mentioned/asked:
is this image hosted locally or included by
Thanks to everyone who responded... the verdict is definitely dshield. I
was considering making it standard practice to block these addresses at
my firewall and update on a weekly basis. I'm interested in what others
think about this - recommended/valuable or not? So far I haven't seen
that
We currently are allowing web based chat and instant messaging. I know
that there are lots of security issues involved with its usage. The IT
folks are telling me that it is a common practice in the industry. I
have a hard time believing this and this is one battle I would like to
take
see http://www.dshield.org or http://isc.incidents.org
some of the more detailed reports you may want to check:
http://isc.incidents.org/top10.html
http://isc.incidents.org/source_report.html
http://feeds.dshield.org/source_summary100.txt (list of sources
that scanned 100 or more targets)
On
I would like to use VPN at linux?
Do you know any recommendable program?
short answer: plenty...
(1) ssh tunnels, in particular tunneling PPP over ssh
(+) easy to setup
(-) only works linux-linux
(-) tunnels everything over tcp.
(2) CIPE
(+) comes with redhat.
(+) a bit better
Hi
Can someone tell me if there are any laws regarding wireless
theft?
I don't think Congress has caught up with this yet. But from what
I hear (usual disclaimer: INAL), you are free to pick up the
signal as long as you are not breaking any WEP or other login
restriction. Its kind of
I was just wondering. I know the rule is everything can be cracked.
But can anyone point me to info on how to crack something with no
ports open or/and perhaps tell me how that's called (so I can
search...).
A networked workstation without services is certainly harder to crack
than
a
That's really a nice idea by uid0, to have something like
www.md5signatures.com/sigs.php?soft=fragroute
or something like that, Like a large database of valid MD5 signatures
for those opensource authors who want to take part in it. They can
just add a link instead of the whole md5sum,
18 matches
Mail list logo