Tim,
        Id say thats a pretty good summary... Id also like to add, that besides 
someone getting/wrecking stuff on your computer, another concern would be 
that someone could use your computer to do things you dont want (such as ping 
-f www.whitehouse.gov, or send spam using your mailserver, ...)

Jamie

On Wednesday 08 January 2003 04:42 pm, Timothy Bolz wrote:
: Thanks for all the Info from everyone.
: I have a lot to go over.
: From what I've read in the responses is that Ip chains potect to a degree
: and I should turn off ports I don't need.  I should be proactive in my
: response to my box rather than reactive after a situation.
:
: The network I'm on is I would say a not trusted network.  Since anyone can
: log in and I don't know if there a causual user or a cracker.  So I am a
: little concerned but I don't have a lot on the box.
:
: The only thing I didn't know anything about was the stack-smash protection.
: Is it that important?  Sorry Debian didn't work out for you.
:
: Thanks Again, Everyone
: Tim
:
: _______________________________________________
: Eug-LUG mailing list
: [EMAIL PROTECTED]
: http://mailman.efn.org/cgi-bin/listinfo/eug-lug

-- 
No microsoft products were used to produce this message.
EUG-LUG Mailing List:
http://mailman.efn.org/cgi-bin/listinfo/eug-lug

_______________________________________________
Eug-LUG mailing list
[EMAIL PROTECTED]
http://mailman.efn.org/cgi-bin/listinfo/eug-lug

Reply via email to