On Sun, 2002-06-30 at 03:50, Erich Titl wrote: > Agreed, but now we have to see how we can stop such a skillful attacker. > How can we protect the RAM disks from someone determined enough to upload > and execut code bytewise. Anyone can fingerprint the IP stack and scan our > system for loopholes. Some firewall products detect this and drop the IP of > the attacker immediately until reboot. Do we have such a feature?
Erich, NIDS products PortSentry and Snort will do this. We have packages for both available. However, they aren't installed by default on any of our releases/branches. PortSentry http://www.psionic.com/products/portsentry.html Snort http://www.snort.org/ -- Mike Noyes <[EMAIL PROTECTED]> http://sourceforge.net/users/mhnoyes/ http://leaf-project.org/ ------------------------------------------------------- This sf.net email is sponsored by:ThinkGeek Welcome to geek heaven. http://thinkgeek.com/sf ------------------------------------------------------------------------ leaf-user mailing list: [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/leaf-user SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html
