> Anybody have any specifics on how this is accomplished so we can nip it in
> the bud?

For this specific problem, making sure all servers are running Bind 8.2.3 is
the easiest way to "nip it in the bud".  Scanning networks and detecting
scans can each be done in a number of ways (is that what you were asking?).
Longer term planning against such attacks should really be set forth in a
network security plan, which is somewhat beyond my area of expertise.

It always pays though, to remain on top of current exploits and be proactive
and not reactive.  I have found the weekly SANS Security Alert Consensus
(http://www.sans.org/sansnews/) to be a good "executive overview" of what
new exploits are currently being talked about.

-Cameron

--------------------
Cameron Childress
elliptIQ Inc.
p.770.460.7277.232
f.770.460.0963


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Structure your ColdFusion code with Fusebox. Get the official book at 
http://www.fusionauthority.com/bkinfo.cfm
------------------------------------------------------------------------------
Archives: http://www.mail-archive.com/cf-linux%40houseoffusion.com/
To Unsubscribe visit 
http://www.houseoffusion.com/index.cfm?sidebar=lists&body=lists/cf_linux or send a 
message to [EMAIL PROTECTED] with 'unsubscribe' in the body.

Reply via email to