Hi
21 Apr 2001, "L.D. Best" <[EMAIL PROTECTED]> wrote:
LB> I think that the ability of a hacker to access any "work station" on
LB> a network is pretty much totally dependent upon the network & its
LB> servers.
??? with the expection of firewalls and network intrudion detection
systems it is *only* dependant on your 'workstation'.
(eg if malicious packets are not stopped at the gateway to your network,
they can do whatever they want)
LB> It certainly shouldn't be OS dependent [i.e. DOS more
LB> hackable than Linux].
It certainly is !!!
there are cillions of OS dependant security vulnerabilities.
Although DOS is not a good target.
The only thing you could do with DOS is try to crash it.
Under Linux the maingoal is to get a rootshell.
LB> Now it *could* be possible [particularly in my case, with a permanent
LB> IP] to access my system in some manner, if the person knew both the
LB> 'proxy IP' and my fixed IP.
Why do they need to know you proxy ???
if you are completely protected by a firewall, than I can't get through
your computer. (independant weather I know the IP of your proxy server or
not.)
LB> It might be possible for a hacker to send machine code that rebooted
LB> my system [like some web pages do], but that would be a pain rather
LB> than an invasion.
It's usually not machine code, but simply an exploit to existing tcp/ip
kernel code. (eg Winnuke which sent a packet which pretended to be huge,
and win95 tcp/ip stack has gone to heaven [or hell?])
if machinde code is sent, than it is usually done via a buffer overflow
bug.
LB> l.d.
CU, Ricsi
--
|~)o _ _o Richard Menedetter <[EMAIL PROTECTED]> {ICQ: 7659421} (PGP)
|~\|(__\| -=> Madness takes its toll. Please have exact change! <=-