Also, (for those who are on the SANS mailing list - you've already seen
this) http://www.dshield.org is a new effort to try to take action against
crackers. If you sign up for their mailing list you can submit your
ipchains log (they also accept other log types as well). They keep a list
of offending ip addresses. They forward these logs (with your permission)
to the ISP of the offending ip address and try to get them to take action
with it.
So, next time you see strange activity coming from a certain ip address you
can look it up in their database to see how active they are.
Anyway, it's a useful website.
Paul W
Kenneth E. Lussier writes:
> All,
>
> Since there has been a lot of talk about security in the last few days,
> especially touching on some of the grey areas, I figured that I would
> post this link : http://www.linuxgazette.com/issue65/stumpel.html . This
> was written by a guy who had the same misconception that a lot of people
> have: No one goes after a regular dial-up user. He got hit, on a slow,
> boring, regular dial-up, and then set out on the arduious task of
> securing his box. He has been kind enough to document the process, as
> well as include links to some really good references.
>
> C-Ya,
> Kenny
> --
> ---------------------------------------------------
> Kenneth E. Lussier
> Geek by nature, Linux by choice
> PGP KeyID 0xD71DF198
> Public key available @ http://pgp.mit.edu
>
> **********************************************************
> To unsubscribe from this list, send mail to
> [EMAIL PROTECTED] with the following text in the
> *body* (*not* the subject line) of the letter:
> unsubscribe gnhlug
> **********************************************************