Hello, Its really nice for Sibayan to tell this wonderful way of running programs for which the user does not have any permissions. A valid way of preventing this is mounting the partition where the binary under question resides with noexec,nosuid and nodev flags. Also all the read and write permissions from the directories except the /home/cracker directory should be removed. In this way the cracker will not have any idea about what binaries are installed on the system. Also the kernel securelevel should be increased. On a FreeBSD system I would execute kern.securelevel=1. However in that condition it will not be possibleto run X. But when security is concerned X is not necessary at all. And as far as rebooting the server in single user mode, it can be prevented by marking the console as insecure in the ttys configuration file (/etc/ttys on a FreeBSD system). In that case the box will ask for the root password even on entering the single user mode. By the way I think Sibayan exagerated a bit by saying servers are locked inside magnetic card security. In USA we indeed have such kind of security but in India it is not as common. Anyway greets to all
Prince_of_the_net #freebsd DALNET _____________________________________________________________ Powered by a short email address ... http://www.k.st _____________________________________________________________ Select your own custom email address for FREE! Get [EMAIL PROTECTED] w/No Ads, 6MB, POP & more! http://www.everyone.net/selectmail?campaign=tag -- To unsubscribe, send mail to [EMAIL PROTECTED] with the body "unsubscribe ilug-cal" and an empty subject line. FAQ: http://www.ilug-cal.org/node.php?id=3
