1. in /etc/hosts.deny, put
ALL : ALL
2. in /etc/hosts.allow, enter who can access your machine (man
hosts.allow)
3. update all packages whenever the update reason is a security
issue.
4. run only the daemons necessary.
On Wed, 9 Feb 2000, ibi wrote:
> This is a security question. I don't know if it's off topic or not.
>
> How do we protect our system from this type of activity?
>
> ...Snipped from: http://news.cnet.com/news/0-1003-200-1501144.html
> "University of Washington computers also were used for attacks on
> computers in France, Norway and Australia, he said.
>
> The attack software was installed primarily on computers using Sun
> Microsystems' Solaris and Linux--both variations of the Unix operating
> system. To break into those computers, the intruder took advantage of
> known vulnerabilities that allowed him or her to take almost complete
> control of a computer then erase his or her tracks, Dittrich said..."
>
> Pj
> [EMAIL PROTECTED]
>