Colapse all |
Post message
Detecting Brute-Force and Dictionary attacks 2006-10-18 Shashi Kanth Boddula (shashi boddula oracle com) Hi All, I am looking for a good tool to detect brute-force and dictionary attacks on user accounts on a Linux system . The tool should also have the intelligence to differntiate between user mistakes and actual brute-force/dictionary attacks and reduce the false positives. SuSE/RedHat included se [ more ] [ reply ] Re: Dynamic firewall based on bandwidth usage ? 2006-10-10 Esteban Ribicic (kisero gmail com) > if your load balancer does not allow you to throttle down (1) connections or > (2) throughput based on certain rule, i would use mod_throttle on the > apaches. > > number of connections is easily accounted on the connection tracking ... > rate or throughput (rate based on time) per source ip (if t [ more ] [ reply ] Dynamic firewall based on bandwidth usage ? 2006-10-08 FM (dist-list LEXUM UMontreal CA) (5 replies) Hello, I have a common problem but cannot find a solution. My setup : all servers are Redhat Enterprise 4 CISCO PIX in front on a HTTP load Balancer/failover (called a director in the L.V.S. jargon) that sends requests to 4 web servers (cluster setup based on Linux Virtual Server include in red [ more ] [ reply ] Re: Dynamic firewall based on bandwidth usage ? 2006-10-10 Uday K. MOORJANI (umoorjani mediaserv net) Re: Dynamic firewall based on bandwidth usage ? 2006-10-10 Vladimir Mitiouchev (vovcia gmail com) (2 replies) Re: Dynamic firewall based on bandwidth usage ? 2006-10-12 Peter Becker (peter becker oberkassel de) Re: Write-protect sctors? 2006-08-29 scott (redhowlingwolves bellsouth net) (1 replies) Bill Church wrote: > It sounds very crazy. Did you ever actually identify if there was a rootkit installed? Did you try booting to a live CD of another distribution and investigating the disks from that live CD? > > Remember that partitioning does modify the existing data on the disk, just the par [ more ] [ reply ] Re: Write-protect sctors? 2006-08-29 scott (redhowlingwolves bellsouth net) (1 replies) Write-protect sctors? 2006-08-28 Cristobal Palmer (cristobalpalmer gmail com) No. What you're seeing is likely a Ubiquity (the graphical installer) bug. Try using the "alternate" CD to do your re-install. http://ubuntu-releases.cs.umn.edu//6.06/ubuntu-6.06.1-alternate-i386.iso -CMP On 8/25/06, scott <redhowlingwolves (at) bellsouth (dot) net [email concealed]> wrote: > I had a probable rootkit in ubu [ more ] [ reply ] Write-protect sctors? 2006-08-25 scott (redhowlingwolves bellsouth net) (2 replies) I had a probable rootkit in ubuntu dapper that proved to be more persistent than I thought possible.I did rkhunter and showed some anomalies in /dev/...Trying to track those dir's down proved elusive,even with root enabled(in ubuntu,root is disabled by default.You can still sudo, but no su witho [ more ] [ reply ] RE: Linux Audit 2006-08-18 William Woodhams (William Woodhams wegmans com) If you check the security pen-testers list a couple weeks ago their was a thread on checklists for checking systems. Bill Woodhams Systems Technician Development Group-Technical Systems Wegmans Food Markets Direct:(585) 429-3183 William.Woodhams (at) wegmans (dot) com [email concealed] -----Original Message----- From: Moh [ more ] [ reply ] Linux Audit 2006-08-17 Mohammad Hadidi (mohammad hadidi gmail com) (4 replies) Hi all, I was wondering if anyone can recommend a Linux Audit checklist or template especially on Red hat. Thanks [ more ] [ reply ] Re: smtp proxy that takes in smtp auth? 2006-07-12 mailer thepcnerd info I like the method that was suggested by Tom Walsh of Express Web Systems, Inc. To expound on his methodology here is a web page that talks more about how to setup the IP aliases on the linux box. Pay attention to what it says about 2.4x kernels. I did not realize this changed. http://www.faq [ more ] [ reply ] |
Privacy Statement |
Feel free to ask qu
[ more ] [ reply ]