Hey Max, are you going to the Linux Woodstock Workshop today? (you can
reply off list)
Thanks for the chrooted/jailed tip and the link!
I'm already using nmap and I think road runner filters "1720/tcp
filtered H.323/Q.931"
On 09/04/2010 03:25 AM, Maxim Shkurygin wrote:
Nmap your machine and make sure that no extra ports are open to the
outside :) The main vector vector of attack on your system will
probably be automated web vulnerability scanners, so it might be a
good idea to make sure that any web-facing processes are all running
in a chrooted/jailed environment. Snort is used mainly for network
traffic analysis, so I don't think it'll be of much use on a VPS
system (it also shows a lot of false positives), but
http://sectools.org/ has a decent list of scanners that you can use to
partially assess the security of your machine. Good luck!
_______________________________________________
Mid-Hudson Valley Linux Users Group http://mhvlug.org
http://mhvlug.org/cgi-bin/mailman/listinfo/mhvlug
Upcoming Meetings (6pm - 8pm) MHVLS Auditorium
Oct 6 - Creating Browser Extensions for Firefox and Chrome
Nov 3 - Bug Labs
Dec 1 - Dec 2010 Meeting
_______________________________________________
Mid-Hudson Valley Linux Users Group http://mhvlug.org
http://mhvlug.org/cgi-bin/mailman/listinfo/mhvlug
Upcoming Meetings (6pm - 8pm) MHVLS Auditorium
Oct 6 - Creating Browser Extensions for Firefox and Chrome
Nov 3 - Bug Labs
Dec 1 - Dec 2010 Meeting