On Thu, Jul 21, 2005 at 11:49:53PM +0200, Karsten Dambekalns wrote:
> Another question came up here. Is it really likely to be a SSH brute force 
> break in, or could the attacker have been able to log in some other way? What 
> is currently possible in that respect on a machien that runs ssh, apache,
                                                                    ^^^^^^
> php, exim and nothing else (all as of Debian 3.1)?
  ^^^

There are lots of insecure web applications out there. One idea could be to look
for security advisories for web applications you use, or even audit them 
yourself.

// Ulf


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to