Focus on Linux Mode:
(Page 10 of 57)  < Prev  5 6 7 8 9 10 11 12 13 14 15  Next >
RE: Detecting Brute-Force and Dictionary attacks 2006-10-19
Joe Vieira (jvieira clarku edu)
If you just want to identify logon attempts just pay attention to your logwatch/ /var/log/secure or wherever you have it logging, if you want to deny access I recommend an iptables rule based off quick connections to port 22. If you want to lock out I would look at pam_tally.

Feel free to ask qu

[ more ]  [ reply ]
Detecting Brute-Force and Dictionary attacks 2006-10-18
Shashi Kanth Boddula (shashi boddula oracle com)
Hi All,

I am looking for a good tool to detect brute-force and dictionary attacks on user accounts on a Linux system . The tool should also have the intelligence to differntiate between user mistakes and actual brute-force/dictionary attacks and reduce the false positives. SuSE/RedHat included se

[ more ]  [ reply ]
Re: Dynamic firewall based on bandwidth usage ? 2006-10-10
Esteban Ribicic (kisero gmail com)
> if your load balancer does not allow you to throttle down (1) connections or
> (2) throughput based on certain rule, i would use mod_throttle on the
> apaches.
>
> number of connections is easily accounted on the connection tracking ...
> rate or throughput (rate based on time) per source ip (if t

[ more ]  [ reply ]
Dynamic firewall based on bandwidth usage ? 2006-10-08
FM (dist-list LEXUM UMontreal CA) (5 replies)
Hello,
I have a common problem but cannot find a solution.

My setup :
all servers are Redhat Enterprise 4
CISCO PIX in front on a HTTP load Balancer/failover (called a director
in the L.V.S. jargon) that sends requests to 4 web servers (cluster
setup based on Linux Virtual Server include in red

[ more ]  [ reply ]
Re: Dynamic firewall based on bandwidth usage ? 2006-10-11
Syv Ritch (syv 911networks com)
Re: Dynamic firewall based on bandwidth usage ? 2006-10-10
Alain Degreffe (info lolisoft be)
Re: Dynamic firewall based on bandwidth usage ? 2006-10-10
Uday K. MOORJANI (umoorjani mediaserv net)
Re: Dynamic firewall based on bandwidth usage ? 2006-10-10
Nate Nord (nnord colnets com)
Re: Dynamic firewall based on bandwidth usage ? 2006-10-10
Vladimir Mitiouchev (vovcia gmail com) (2 replies)
Re: Dynamic firewall based on bandwidth usage ? 2006-10-12
Peter Becker (peter becker oberkassel de)
Re: Dynamic firewall based on bandwidth usage ? 2006-10-10
Vladimir Mitiouchev (vovcia gmail com)
Re: Write-protect sctors? 2006-08-29
scott (redhowlingwolves bellsouth net) (1 replies)
Bill Church wrote:
> It sounds very crazy. Did you ever actually identify if there was a rootkit installed? Did you try booting to a live CD of another distribution and investigating the disks from that live CD?
>
> Remember that partitioning does modify the existing data on the disk, just the par

[ more ]  [ reply ]
Re: Write-protect sctors? 2006-08-29
scott (redhowlingwolves bellsouth net) (1 replies)
Re: Write-protect sctors? 2006-08-30
Andreas Ferrari (aferrari stasoft ch) (1 replies)
Re: Write-protect sctors? 2006-08-30
Walter Lamagna (wlamagna tenroses com ar)
Write-protect sctors? 2006-08-28
Cristobal Palmer (cristobalpalmer gmail com)
No.

What you're seeing is likely a Ubiquity (the graphical installer) bug.
Try using the "alternate" CD to do your re-install.

http://ubuntu-releases.cs.umn.edu//6.06/ubuntu-6.06.1-alternate-i386.iso

-CMP

On 8/25/06, scott <redhowlingwolves (at) bellsouth (dot) net [email concealed]> wrote:
> I had a probable rootkit in ubu

[ more ]  [ reply ]
Write-protect sctors? 2006-08-25
scott (redhowlingwolves bellsouth net) (2 replies)
I had a probable rootkit in ubuntu dapper that proved to be more
persistent than I thought possible.I did rkhunter and showed some
anomalies in /dev/...Trying to track those dir's down proved
elusive,even with root enabled(in ubuntu,root is disabled by default.You
can still sudo, but no su witho

[ more ]  [ reply ]
Re: Write-protect sctors? 2006-08-28
Florian Specker (florian specker li) (1 replies)
Re: Write-protect sctors? 2006-09-06
Alex Butcher (alex butcher bristol ac uk)
RE: Write-protect sctors? 2006-08-28
Bill Church (Bill Church bsius com)
RE: Linux Audit 2006-08-18
William Woodhams (William Woodhams wegmans com)
If you check the security pen-testers list a couple weeks ago their was
a thread on checklists for checking systems.

Bill Woodhams
Systems Technician
Development Group-Technical Systems
Wegmans Food Markets
Direct:(585) 429-3183
William.Woodhams (at) wegmans (dot) com [email concealed]

-----Original Message-----
From: Moh

[ more ]  [ reply ]
Linux Audit 2006-08-17
Mohammad Hadidi (mohammad hadidi gmail com) (4 replies)
Hi all,

I was wondering if anyone can recommend a Linux Audit checklist or
template especially on Red hat.

Thanks

[ more ]  [ reply ]
Re: Linux Audit 2006-08-18
Francisco Pecorella (fpecor cantv net) (1 replies)
Re: Linux Audit 2006-08-21
Jeffrey Chandler (jeffrey chandler gmail com)
Re: Linux Audit 2006-08-18
Manuel Arostegui Ramirez (manuel todo-linux com)
Re: Linux Audit 2006-08-20
druid stonedcoder org
Re: Linux Audit 2006-08-21
Michael Boman (michael boman gmail com)
Re: smtp proxy that takes in smtp auth? 2006-07-12
mailer thepcnerd info
I like the method that was suggested by Tom Walsh of Express Web Systems, Inc.

To expound on his methodology here is a web page that talks more about how to setup the IP aliases on the linux box. Pay attention to what it says about 2.4x kernels. I did not realize this changed.

http://www.faq

[ more ]  [ reply ]
(Page 10 of 57)  < Prev  5 6 7 8 9 10 11 12 13 14 15  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus