Focus on Linux Mode:
(Page 32 of 57)  < Prev  27 28 29 30 31 32 33 34 35 36 37  Next >
Administrivia 2004-07-16
Moderator (mod-linux securityfocus com)
Hi all,

I would like to ask anyone planning to set up out-of-office software to
ensure that it doesn't generate responses to mailing lists messages. The
purpose of this dilligence is twofold. Firstly, it is not fair to people
who post to this mailing list to be subsequently bombarded with hundreds

[ more ]  [ reply ]
RE: Visited by a cracker 2004-07-15
Herman F. Ebeling Jr. (hfebelingjr lycos com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

True, there are no apparent signs of a successful hack, BUT how can
the admin in charge be 100% sure that they have rooted out ALL Trojan
horses? Or that one of the legit users data hasn?t been altered in
some way? Or even deleted?

Now granted to som

[ more ]  [ reply ]
Re: Visited by a cracker 2004-07-15
Herman F. Ebeling Jr. (hfebelingjr lycos com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Ya know that IS the exact same argument that Dr. Cliff Stoll made
when he was "hunting" his hacker/cracker. That once a system has
been invaded the legit users can never be 100% or even reasonably
sure that their data IS theirs, and that it hasn't bee

[ more ]  [ reply ]
Re: Certifying a RedHat Install 2004-07-14
abe (abe abeowitz com)
Thanks for everyone's answers so far, but perhaps I need to restate my question...

>>>What can I do to assure my customer that I have installed no back doors for
myself.<<<

rpm -Va will check the size, date & permissions of all rpm installed files. I
don't know if it will do an md5 or similar.

[ more ]  [ reply ]
Fwd: Certifying a RedHat Install 2004-07-14
Jim Horwath (jim horwath rcn com)
Abe,

You could try a few things:

- Harden the box without being connected to a network

- Install and run tripwire before the machine is connected
to the network. Store the database on read-only media. Run
tripwire on a regular basis once the system is connected
back to the network.

- Run the

[ more ]  [ reply ]
RE: Visited by a cracker 2004-07-14
Shay Wilson (Bryan_Wilson legis state ak us) (3 replies)
I'm a little confused. There have been several suggestions to wipe the
box and I'm not disagreeing, but there was no sign of any successful
hack. The cracker was given a shell by the administrator. He paid for it
(with a stolen credit card). I realize approaching the machine with
caution and using

[ more ]  [ reply ]
Re: Visited by a cracker 2004-07-15
Godwin Stewart (bugtraq bonivet net)
RE: Visited by a cracker 2004-07-15
Peter Purwin uk neceur com
RE: Visited by a cracker 2004-07-14
Mario Ohnewald (mario ohnewald gmx de)
LIDS 1.2.2rc1 for kernel 2.4.26 released 2004-07-12
Yusuf Wilajati Purna (ywpurna users sourceforge net)
Hi,

LIDS 1.2.2rc1 for kernel 2.4.26 has been released.

LIDS 1.2.2rc1 includes mainly the LIDS TDE application
sandboxing feature: A new option to protect a Linux system by
sandboxing applications. An overview and introduction of
LIDS TDE can be found in

http://www.lids.org/document/LIDS-TDE-feat

[ more ]  [ reply ]
Re: Weird! 2004-07-13
Kostas K (acezerocool yahoo com)
In-Reply-To: <40EC6DD5.9090407 (at) bcgreen (dot) com [email concealed]>

Stephen,

i am using the following rules:

-iptables -t nat -A PREROUTING -i ppp0 -s 192.168.0.0/16 -j DROP

-iptables -t nat -A POSTROUTING -o ppp0 -d 192.168.0.0/16 -j DROP

Do you think that these rules meet the requirements and in case they do n

[ more ]  [ reply ]
(Page 32 of 57)  < Prev  27 28 29 30 31 32 33 34 35 36 37  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus