----- Original Message ----- From: "apif" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Thursday, 17 January, 2002 12:25 AM Subject: seeking a better understanding
Hi apif, [...] | Now that you have the background, my questions comes down to this. If port | 80 is the only port allowed through, and someone chose to attack this port, | could they compromise my system, and if so how? What other steps should I | take to protect this system? I see IPTables (I guess it replaced IPchains) | in slackware. I know this is a firewall, but I don't think it is like the | personal firewall I have on MS boxes. I suspect it is more like a full corp | class firewall, and probably as complicated. Should I be using this on my | Slackware machine? Do you have any suggestions of what A/V software I should | use on a linux machine, and do the spot trojans as the MS ones do? Thank you | for your time. I'm sorry this was so long. | Yes, you can use iptables. It is a very performant netfilter (and yes, it replaced ipchains) but you have to study a little. A very good place to begin with is http://netfilter.samba.org where you have a comprehensive tutorial about iptables. Then you can consider the Linux Documantation Project. iptables gives you a lot of flexibility, but it's not very complicated. As an A/V software, I can tell you that here we use amavis (www.amavis.org) with Sophos antivirus. (however we only use it for mail scanning. But it detects MS trojans and not only.) Hope this helps. Regards, Andrei Pascal Network Administrator Frans Maas Romania srl Phone +40 (0)1 230 8731 Fax +40 (0)1 230 8709 Linux registered user #221713 I haven't lost my mind -- it's backed up on tape somewhere.
