RE: Exploiting RedHat

1999-10-18 Thread Espinola, Micheal
the exploit. As they too realize, security by obscurity helps no one in the long run. | -Original Message- | From: [EMAIL PROTECTED] | [mailto:[EMAIL PROTECTED]]On Behalf Of Jim Cline | Sent: Saturday, October 09, 1999 9:25 PM | To: [EMAIL PROTECTED] | Subject: RE: Exploiting RedHat

RE: Port Monitor and not RE: Exploiting RedHat

1999-10-12 Thread Patrick Stuto
I answered the wrong message yesterday. This e-mail was an answer to Port Monitor and not Exploiting RedHat. Hi, I am not sure it's what you need (I don't know if you need a free and limited tool or this kind of tool) but just take a look at : http://www.ipswitch.com/Products/WhatsUp/index.asp

Re: Exploiting RedHat

1999-10-11 Thread Dave Gillett
On 9 Oct 99, at 17:14, Ahbaid Gaffoor wrote: Where can I find information on how to exploit certain OS's? I'm setting up a RedHat based web server and would like to demonstrate the need for security policies to my employer and clients... One of the common scan signatures that we were

Re: Exploiting RedHat

1999-10-11 Thread Wagner Brett
As far as it looks Ahbaid is just looking for a list of weaknesses of RedHat. I find nothing wrong with this, if someone was looking for hacks they probably would use another list. I agree with Jason Jason Murray wrote: On Sat, Oct 09, 1999 at 06:25:23PM -0700, Jim Cline wrote: Sorry but

RE: Exploiting RedHat

1999-10-11 Thread Patrick Stuto
(22) 870 17 16 fax +41 (22) 870 17 17 web http://www.psideo.com -Message d'origine- De: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]De la part de Dave Gillett Date: lundi, 11. octobre 1999 11:18 À: [EMAIL PROTECTED] Objet: Re: Exploiting RedHat On 9 Oct 99, at 17:14, Ahbaid Gaffoor

Re: Exploiting RedHat

1999-10-11 Thread Bryan Andersen
I won't say what to do to hack, but I will say use OpenBSD (http://www.openbsd.org/) instead for the web server, and place it behind a firewall in a DMZ. Out of the box OpenBSD is much more secure. All of the cryptogrophy, etc. stuf is already in place. RedHat can't do that because of being

Re: Exploiting RedHat

1999-10-10 Thread Jason Murray
On Sat, Oct 09, 1999 at 06:25:23PM -0700, Jim Cline wrote: Sorry but we will not tell people how to hack systems. Now even if you were on the up and up, do you think we should be teaching people how to exploit systems? If you need to show why you need secuirty there are much better way to

RE: Exploiting RedHat

1999-10-10 Thread Rafi Sadowsky
On Sat, 9 Oct 1999, Jim Cline wrote: Sorry but we will not tell people how to hack systems. Now even if you were on the up and up, do you think we should be teaching people how to exploit systems? If you need to show why you need secuirty there are much better way to take care of that.

RE: Exploiting RedHat

1999-10-09 Thread Jim Cline
Sorry but we will not tell people how to hack systems. Now even if you were on the up and up, do you think we should be teaching people how to exploit systems? If you need to show why you need secuirty there are much better way to take care of that. -Original Message- From: [EMAIL