Also, (for those who are on the SANS mailing list - you've already seen 
this) http://www.dshield.org is a new effort to try to take action against 
crackers.  If you sign up for their mailing list you can submit your 
ipchains log (they also accept other log types as well).  They keep a list 
of offending ip addresses.  They forward these logs (with your permission) 
to the ISP of the offending ip address and try to get them to take action 
with it.
So, next time you see strange activity coming from a certain ip address you 
can look it up in their database to see how active they are.
Anyway, it's a useful website. 

Paul W 

Kenneth E. Lussier writes: 

> All, 
> 
> Since there has been a lot of talk about security in the last few days,
> especially touching on some of the grey areas, I figured that I would
> post this link : http://www.linuxgazette.com/issue65/stumpel.html . This
> was written by a guy who had the same misconception that a lot of people
> have: No one goes after a regular dial-up user. He got hit, on a slow,
> boring, regular dial-up, and then set out on the arduious task of
> securing his box. He has been kind enough to document the process, as
> well as include links to some really good references.  
> 
> C-Ya,
> Kenny
> -- 
> ---------------------------------------------------
>  Kenneth E. Lussier
>  Geek by nature, Linux by choice
>  PGP KeyID 0xD71DF198
>  Public key available @ http://pgp.mit.edu 
> 
> **********************************************************
> To unsubscribe from this list, send mail to
> [EMAIL PROTECTED] with the following text in the
> *body* (*not* the subject line) of the letter:
> unsubscribe gnhlug
> **********************************************************
 

Reply via email to