Thus spake Del ([EMAIL PROTECTED]):
> Nick Croft wrote:
> > They broke into my debian machine
> I use RedHat because that's what I'm used to. RedHat have an updates
> FTP site (mirrored at mirror.aarnet.edu.au) where, for each of their
> distributions, updates are posted fairly quickly after security bugs
> (root compromise or denial of service) are found. I'm sure that most
> of the other distribution vendors do the same.
Del has some excellent points. In Nicks' case I would recommend
(strongly) that he get onto the Debian Security mailing list which will
advise of Debian vulnerabilities and what packages fix them. Then edit
/etc/apt/sources.list and uncomment the security line.
In production servers (which for me are always on "Stable") I only have
the stable and security lines in my sources.list file and always run
update/upgrade when a new security vulnerability is out.
Debian Mailing Lists:
http://www.debian.org/MailingLists/subscribe
The security line to be uncommented in sources.list:
deb http://security.debian.org stable/updates main contrib non-free
Hopefully this should help.
--
Cheers,
Craige.
--
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://slug.org.au/lists/listinfo/slug