On Mon, 19 Jul 1999, Larry Chin wrote:

> - Set up a good router/bastion/router firewall.
> - Use a network based IDS system ( preferably ) inside and outside your
>   firewall
> - Use host based IDS ( tripwire or some such ) on your hosts
> - Use swatch or some such to keep an eye on your log files
> - Make sure you have good backups - just in case ( I once had a hacker
>   wipe a machine on his way "out" )
> - Make all your hosts as secure as possible without making them unuseable
>   ( probably easier to do with *NIX as opposed to a M$ OS )

I agree with everything you say in your message, but I would like to
suggest that you take care in using TLA's (three-letter acronyms) when
making posts such as this... Typically the people who are most interested
in reading this type of post are the complete newbies, as well as the
less-experienced.  Both groups are relatively unlikely to know what your
TLA's stand for.  

I myself have some experience with security and firewalls (but I'm
admittedly no expert), and though I can infer the gist of it from context,
I still don't know to what you are referring when you use IDS, so I would
not be surprised if the person you were replying to doesn't either. 

Thanks!

--
Derek D. Martin           |  UNIX System Administrator
[EMAIL PROTECTED] |  [EMAIL PROTECTED]

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to