Nmap your machine and make sure that no extra ports are open to the outside :) The main vector vector of attack on your system will probably be automated web vulnerability scanners, so it might be a good idea to make sure that any web-facing processes are all running in a chrooted/jailed environment. Snort is used mainly for network traffic analysis, so I don't think it'll be of much use on a VPS system (it also shows a lot of false positives), but http://sectools.org/ has a decent list of scanners that you can use to partially assess the security of your machine. Good luck! _______________________________________________ Mid-Hudson Valley Linux Users Group http://mhvlug.org http://mhvlug.org/cgi-bin/mailman/listinfo/mhvlug
Upcoming Meetings (6pm - 8pm) MHVLS Auditorium Oct 6 - Creating Browser Extensions for Firefox and Chrome Nov 3 - Bug Labs Dec 1 - Dec 2010 Meeting
