On Saturday, October 15, 2011 12:21:56 PM Kent A. Reed did opine:

> On 10/14/2011 6:17 PM, Sven Wesley wrote:
> > http://linuxcnc.org/hardy/dists/hardy/emc2.4-sim/binary-amd64/
> > ----------------------------------------------------------------------
> > --------
> 
> Is it just me or does there seem to be an uptick in attacks on our
> hosted resources? It makes me wonder if we've simply been "found" or if
> someone has us specifically in their sights.
> 
> Whoever is doing the cleaning up, I tip my hat to you.
> 
> Regards,
> Kent
> 
I'll second those sentiments, Kent.  I hope the logs are being kept for 
forensic purposes.  Tracing the src IP could well be enlightening.

Cheers, Gene
-- 
"There are four boxes to be used in defense of liberty:
 soap, ballot, jury, and ammo. Please use in that order."
-Ed Howdershelt (Author)
Man is by nature a political animal.
                -- Aristotle

------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2d-oct
_______________________________________________
Emc-users mailing list
Emc-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/emc-users

Reply via email to