> Anybody have any specifics on how this is accomplished so we can nip it in > the bud? For this specific problem, making sure all servers are running Bind 8.2.3 is the easiest way to "nip it in the bud". Scanning networks and detecting scans can each be done in a number of ways (is that what you were asking?). Longer term planning against such attacks should really be set forth in a network security plan, which is somewhat beyond my area of expertise. It always pays though, to remain on top of current exploits and be proactive and not reactive. I have found the weekly SANS Security Alert Consensus (http://www.sans.org/sansnews/) to be a good "executive overview" of what new exploits are currently being talked about. -Cameron -------------------- Cameron Childress elliptIQ Inc. p.770.460.7277.232 f.770.460.0963 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Structure your ColdFusion code with Fusebox. Get the official book at http://www.fusionauthority.com/bkinfo.cfm ------------------------------------------------------------------------------ Archives: http://www.mail-archive.com/cf-linux%40houseoffusion.com/ To Unsubscribe visit http://www.houseoffusion.com/index.cfm?sidebar=lists&body=lists/cf_linux or send a message to [EMAIL PROTECTED] with 'unsubscribe' in the body.
