The Bind error worries me.  The others do not as I am
using them or have them patched.  Bind is still a bit
of a puzzle to me.  When I run the suggested command
"named -v" I get "command not found".  I had some
problems with bind last year that I did not have time
to research, and I think when I upgraded a few months
ago I left it off.  I ran "top" and did not see it,
but I cannot expand the eterm window to see all of the
processes.  Is there another way to see if I am
running bind?  What log should I look for (for the
English majors out there) y'all?

Doug

--- Nashid Hasan <[EMAIL PROTECTED]> wrote:
> SANS has published its top 20 OS vulnerability list.
> Here it is:
> 
> Top Vulnerabilities to Windows Systems
> # W1 Internet Information Services (IIS)
> # W2 Microsoft SQL Server (MSSQL)
> # W3 Windows Authentication
> # W4 Internet Explorer (IE)
> # W5 Windows Remote Access Services
> # W6 Microsoft Data Access Components (MDAC)
> # W7 Windows Scripting Host (WSH)
> # W8 Microsoft Outlook Outlook Express
> # W9 Windows Peer to Peer File Sharing (P2P)
> # W10 Simple Network Management Protocol (SNMP)
> 
> Top Vulnerabilities to UNIX Systems
> # U1 BIND Domain Name System
> # U2 Remote Procedure Calls (RPC)
> # U3 Apache Web Server
> # U4 General UNIX Authentication Accounts with No
> Passwords or Weak Passwords
> # U5 Clear Text Services
> # U6 Sendmail
> # U7 Simple Network Management Protocol (SNMP)
> # U8 Secure Shell (SSH)
> # U9 Misconfiguration of Enterprise Services NIS/NFS
> # U10 Open Secure Sockets Layer (SSL)
> 
> 
> Here is the link to it:
> 
> http://isc.sans.org/top20.html
> 
> 
> -Nash
> 
> 
> _______________________________________________
> General mailing list
> [email protected]
> http://brlug.net/mailman/listinfo/general_brlug.net


__________________________________
Do you Yahoo!?
The New Yahoo! Shopping - with improved product search
http://shopping.yahoo.com

Reply via email to