The Bind error worries me. The others do not as I am using them or have them patched. Bind is still a bit of a puzzle to me. When I run the suggested command "named -v" I get "command not found". I had some problems with bind last year that I did not have time to research, and I think when I upgraded a few months ago I left it off. I ran "top" and did not see it, but I cannot expand the eterm window to see all of the processes. Is there another way to see if I am running bind? What log should I look for (for the English majors out there) y'all?
Doug --- Nashid Hasan <[EMAIL PROTECTED]> wrote: > SANS has published its top 20 OS vulnerability list. > Here it is: > > Top Vulnerabilities to Windows Systems > # W1 Internet Information Services (IIS) > # W2 Microsoft SQL Server (MSSQL) > # W3 Windows Authentication > # W4 Internet Explorer (IE) > # W5 Windows Remote Access Services > # W6 Microsoft Data Access Components (MDAC) > # W7 Windows Scripting Host (WSH) > # W8 Microsoft Outlook Outlook Express > # W9 Windows Peer to Peer File Sharing (P2P) > # W10 Simple Network Management Protocol (SNMP) > > Top Vulnerabilities to UNIX Systems > # U1 BIND Domain Name System > # U2 Remote Procedure Calls (RPC) > # U3 Apache Web Server > # U4 General UNIX Authentication Accounts with No > Passwords or Weak Passwords > # U5 Clear Text Services > # U6 Sendmail > # U7 Simple Network Management Protocol (SNMP) > # U8 Secure Shell (SSH) > # U9 Misconfiguration of Enterprise Services NIS/NFS > # U10 Open Secure Sockets Layer (SSL) > > > Here is the link to it: > > http://isc.sans.org/top20.html > > > -Nash > > > _______________________________________________ > General mailing list > [email protected] > http://brlug.net/mailman/listinfo/general_brlug.net __________________________________ Do you Yahoo!? The New Yahoo! Shopping - with improved product search http://shopping.yahoo.com
