users, IMO) are two such tools that I have experience with and like.
[1] http://gnupg.org/
[2] http://web.mit.edu/network/pgp.html
--
Josh Glover [EMAIL PROTECTED]
Associate Systems Administrator
INCOGEN, Inc.
exploited. Read
the article about GOBBLES's exploit on http://securityfocus.com for more.
What version of Apache are you running?
--
Josh Glover [EMAIL PROTECTED]
Associate Systems Administrator
INCOGEN, Inc.
/4odb_odmsdump
Will that work?
--
Josh Glover [EMAIL PROTECTED]
Associate Systems Administrator
INCOGEN, Inc.
md5sums.list
done
done
Gross, but it will get the job done. Sorry for misunderstanding. ;)
--
Josh Glover [EMAIL PROTECTED]
Associate Systems Administrator
INCOGEN, Inc.
in standard English, it is not what
I would call a good password.
In short, I would argue that the above link is good for entertainment,
bad when used as a password generator.
--
Josh Glover [EMAIL PROTECTED]
Associate Systems Administrator
INCOGEN, Inc.
! ;)
[1] http://www.nsa.gov/selinux/license.html
--
Josh Glover [EMAIL PROTECTED]
Associate Systems Administrator
INCOGEN, Inc.
addresses that ain't yours.
--
Josh Glover [EMAIL PROTECTED]
Associate Systems Administrator
INCOGEN, Inc.
. Sorry if I was not clear
enough. And I still stand by my claim that the vast majority of script
kiddies' tools ignore banners and just try the exploits.
--
Josh Glover [EMAIL PROTECTED]
Associate Systems Administrator
INCOGEN, Inc.
on a personal basis. And it is not so.
That is true. In a few cases, you might be intentionally targeted. In
most, you will not.
Your points are well-taken, and I think that we were arguing from
different sides of the issue.
--
Josh Glover [EMAIL PROTECTED]
Associate Systems Administrator
INCOGEN, Inc.
. And those who want to care don't have the time or
motivation to learn what they need to know!
-Josh
--
Josh Glover [EMAIL PROTECTED]
Associate Systems Administrator
INCOGEN, Inc.
and force people to use sudo to run them. A smart sudoers.conf should
allow you to protect these binaries pretty well, and log all usage of
them, if you so desire.
--
Josh Glover [EMAIL PROTECTED]
Associate Systems Administrator
INCOGEN, Inc.
Short_Circut wrote:
because the reason
. It is a
pretty good primer on basic firewall setup.
--
Josh Glover [EMAIL PROTECTED]
Associate Systems Administrator
INCOGEN, Inc.
://www.faqs.org/rfcs/rfc959.html
You can find Howtos on what to do on the Internet.
Solution.
--
Josh Glover [EMAIL PROTECTED]
Associate Systems Administrator
INCOGEN, Inc.
.
--
Josh Glover [EMAIL PROTECTED]
Associate Systems Administrator
INCOGEN, Inc.
hacking up a custom scripted solution.
--
Josh Glover [EMAIL PROTECTED]
Associate Systems Administrator
INCOGEN, Inc.
doing
things the way you want, and you are not forced to use the more newbie
friendly functionality.
-Josh
--
Josh Glover [EMAIL PROTECTED]
Associate Systems Administrator
INCOGEN, Inc.
Chisholm Wildermuth wrote:
You cant disable it (how would you administer?), but I have heard that it's
possible to rename it.
Sure, just change the UID 0 entry in /etc/passwd to read foobar instead
of root.
If you're worried about people logging in as root from outside, you can deny
root
all
the time. It'll have some sensitive info so I need something
with good authorization. Anyone can point me in the right
direction? Thanks in advance...
How about good ol' OpenSSH? (http://www.openssh.org/) Should run in
Windows, gives you sftp.
--
Josh Glover [EMAIL PROTECTED
or shopping.yahoo.com or ebay.com to see who is violating the
policy. Then, have HR deal with them. A much cleaner solution, from the
POV of a sysadmin.
Make sure you talk this over with management, if you have not already.
--
Josh Glover [EMAIL PROTECTED]
Associate Systems Administrator
INCOGEN, Inc.
19 matches
Mail list logo