On Saturday, October 15, 2011 12:21:56 PM Kent A. Reed did opine: > On 10/14/2011 6:17 PM, Sven Wesley wrote: > > http://linuxcnc.org/hardy/dists/hardy/emc2.4-sim/binary-amd64/ > > ---------------------------------------------------------------------- > > -------- > > Is it just me or does there seem to be an uptick in attacks on our > hosted resources? It makes me wonder if we've simply been "found" or if > someone has us specifically in their sights. > > Whoever is doing the cleaning up, I tip my hat to you. > > Regards, > Kent > I'll second those sentiments, Kent. I hope the logs are being kept for forensic purposes. Tracing the src IP could well be enlightening.
Cheers, Gene -- "There are four boxes to be used in defense of liberty: soap, ballot, jury, and ammo. Please use in that order." -Ed Howdershelt (Author) Man is by nature a political animal. -- Aristotle ------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity and more. Splunk takes this data and makes sense of it. Business sense. IT sense. Common sense. http://p.sf.net/sfu/splunk-d2d-oct _______________________________________________ Emc-users mailing list Emc-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/emc-users