Hello,
Its really nice for Sibayan to tell this wonderful way of running programs for which 
the user does not have any permissions. A valid way of preventing this is mounting the 
partition where the binary under question resides with noexec,nosuid and nodev flags. 
Also all the  read  and write permissions from the directories except the 
/home/cracker directory should be removed. In this way the cracker will not have any 
idea about what binaries are installed on the system. Also the kernel securelevel 
should be increased. On a FreeBSD system I would execute kern.securelevel=1. However 
in that condition it will not be possibleto run X. But when security is concerned X is 
not necessary at all.
And as far as rebooting the server in single user mode, it can be prevented by marking 
the console as insecure in the ttys configuration file (/etc/ttys on a FreeBSD 
system). In that case the box will ask for the root password even on entering the 
single user mode. By the way I think Sibayan exagerated a bit by saying servers are 
locked inside magnetic card security. In USA we indeed have such kind of security but 
in India it is not as common. Anyway greets to all

Prince_of_the_net
#freebsd
DALNET



_____________________________________________________________
Powered by a short email address ... http://www.k.st

_____________________________________________________________
Select your own custom email address for FREE! Get [EMAIL PROTECTED] w/No Ads, 6MB, 
POP & more! http://www.everyone.net/selectmail?campaign=tag

--
To unsubscribe, send mail to [EMAIL PROTECTED] with the body
"unsubscribe ilug-cal" and an empty subject line.
FAQ: http://www.ilug-cal.org/node.php?id=3

Reply via email to