On 9 Oct 99, at 17:14, Ahbaid Gaffoor wrote:

> Where can I find information on how to exploit certain OS's?
> 
> I'm setting up a RedHat based web server and would like to demonstrate
> the need for security policies to my employer and clients...

  One of the common scan signatures that we were seeing last Oct-
March, we started referring to as "womebody's RedHat box got 
compromised", because when we notified the admins at the source IP 
address, that was invariably found to be the case.

David G
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to