On Sun, 2002-06-30 at 03:50, Erich Titl wrote:
> Agreed, but now we have to see how we can stop such a skillful attacker. 
> How can we protect the RAM disks from someone determined enough to upload 
> and execut code bytewise. Anyone can fingerprint the IP stack and scan our 
> system for loopholes. Some firewall products detect this and drop the IP of 
> the attacker immediately until reboot. Do we have such a feature?


Erich,
NIDS products PortSentry and Snort will do this. We have packages for
both available. However, they aren't installed by default on any of our
releases/branches.

PortSentry
http://www.psionic.com/products/portsentry.html

Snort
http://www.snort.org/

-- 
Mike Noyes <[EMAIL PROTECTED]>
http://sourceforge.net/users/mhnoyes/
http://leaf-project.org/



-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html

Reply via email to