Petre L. Daniel,System Administrator
Canad Systems Pitesti Romania,
http://www.cyber.ro, email:[EMAIL PROTECTED]
Tel:+4048220044, +4048206200
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Petre L. Daniel,System Administrator
Canad Systems Pitesti Romania,
http://www.cyber.ro, email:[EMAIL PROTECTED]
Tel:+4048220044, +4048206200
thank you all very much.
you're right.if one doesn't have anything useful to say i'll recommand him
to let others help..
thx guys.
At 10:02 PM 12/30/01 +0100, jernej horvat wrote:
On Sunday 30 December 2001 18:46, P Prince wrote:
The eaisest and most failsafe way to secure bind is to install
Well,i know Karsten's on my back and all,but i have not much time to
learn,and too many things to do at my firm,so i am asking if one of you has
any idea how can bind be protected against that DoS attack and if someone
has some good firewall for a dns server ( that resolves names for internal
thank you all very much.
you're right.if one doesn't have anything useful to say i'll recommand him
to let others help..
thx guys.
At 10:02 PM 12/30/01 +0100, jernej horvat wrote:
On Sunday 30 December 2001 18:46, P Prince wrote:
The eaisest and most failsafe way to secure bind is to install
most of them are relics of software that you probably dont need,but be
carefully what account you erase.
better comment them out.you can put a /etc/NOSHELL instead of /bin/sh or
even /bin/false and they won't be able to login into the machine no more..
At 06:24 PM 12/27/01 -0600, Daniel
most of them are relics of software that you probably dont need,but be
carefully what account you erase.
better comment them out.you can put a /etc/NOSHELL instead of /bin/sh or
even /bin/false and they won't be able to login into the machine no more..
At 06:24 PM 12/27/01 -0600, Daniel
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Well,111 is the portmap port..carefully,its a gate for intrusion with
rpc attacks..
you must disable portmap. try something like update-rc -f remove
portmap or
update-rc -f portmap remove i forgot..
if that doesn work try blocking ports vias
what about ip accounting?
Petre L. Daniel
Linux Administrator,Canad Systems Pitesti
http://www.cyber.ro email:[EMAIL PROTECTED]
phone: +4048220044,+4048206200
-Mesaj original-
De la: Yotam Rubin [mailto:[EMAIL PROTECTED]
Trimis: Tuesday, December 04, 2001 1:51 AM
Catre:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Well,111 is the portmap port..carefully,its a gate for intrusion with
rpc attacks..
you must disable portmap. try something like update-rc -f remove
portmap or
update-rc -f portmap remove i forgot..
if that doesn work try blocking ports vias
-Mesaj original-
De la: Tarjei Huse [mailto:[EMAIL PROTECTED]
Trimis: Monday, December 03, 2001 9:15 AM
Catre: debian-security@lists.debian.org
Cc: debian-security@lists.debian.org
Subiect: finding hidden processes
Hi If I run chkproc from the chkrootid package I get:
You have 3
/%snsole
Obsolete W option not supported. (You have a /dev/drum?)
Any comments? Does this look ok?
Tarjei
Petre Daniel wrote:
-Mesaj original-
De la: Tarjei Huse [mailto:[EMAIL PROTECTED]
Trimis: Monday, December 03, 2001 9:15 AM
Catre: debian-security@lists.debian.org
Cc: debian
Heya,i got those lines often lately..Can anyone explain me every
little part of it?
If you can drop an url link too,it would be great..
Thank you.
Nov 30 16:16:28 brutus-gw kernel: Packet log: input DENY eth1 PROTO=6
210.86.20.213:1621
194.102.92.21:6000 L=48 S=0x00 I=52039 F=0x4000 T=102 SYN
Heya,i got those lines often lately..Can anyone explain me every
little part of it?
If you can drop an url link too,it would be great..
Thank you.
Nov 30 16:16:28 brutus-gw kernel: Packet log: input DENY eth1 PROTO=6
210.86.20.213:1621
194.102.92.21:6000 L=48 S=0x00 I=52039 F=0x4000 T=102 SYN
-BEGIN PGP SIGNED MESSAGE-
Hash: MD5
Heya,
I run a potato at home and i will set the computer at work
with potato as well.Since that will be a 24h internet connected
pc,i am wondering what are the 2.2 release 3 vulnerabilities for
the sistem installed from the cds without any
-BEGIN PGP SIGNED MESSAGE-
Hash: MD5
Heya,
I run a potato at home and i will set the computer at work
with potato as well.Since that will be a 24h internet connected
pc,i am wondering what are the 2.2 release 3 vulnerabilities for
the sistem installed from the cds without any online
-BEGIN PGP SIGNED MESSAGE-
Hash: MD5
also netstat -n -p -t --listening | grep :PORT
VD Hi,
VD On Sat, Oct 20, 2001 at 09:22:57PM -0700,
VD tony mancill [EMAIL PROTECTED] wrote:
On Sat, 20 Oct 2001, Marc Wilson wrote:
Adding or removing lines in /etc/services doesn't open or close
-BEGIN PGP SIGNED MESSAGE-
Hash: MD5
well,first you gotta chill..:
do you have a lan there? is your debian a gateway/router for the lan?
maybe you use a masquerade for some of those computers..
there can be an aplication in windows that connects through that port
to the internet.
so like
-BEGIN PGP SIGNED MESSAGE-
Hash: MD5
also netstat -n -p -t --listening | grep :PORT
VD Hi,
VD On Sat, Oct 20, 2001 at 09:22:57PM -0700,
VD tony mancill [EMAIL PROTECTED] wrote:
On Sat, 20 Oct 2001, Marc Wilson wrote:
Adding or removing lines in /etc/services doesn't open or close
19 matches
Mail list logo