This is a security question. I don't know if it's off topic or not.

How do we protect our system from this type of activity? 

...Snipped from: http://news.cnet.com/news/0-1003-200-1501144.html
"University of Washington computers also were used for attacks on
computers in France, Norway and Australia, he said.

The attack software was installed primarily on computers using Sun
Microsystems' Solaris and Linux--both variations of the Unix operating
system. To break into those computers, the intruder took advantage of
known vulnerabilities that allowed him or her to take almost complete
control of a computer then erase his or her tracks, Dittrich said..."

Pj 
[EMAIL PROTECTED]

Reply via email to