Hey Max, are you going to the Linux Woodstock Workshop today? (you can reply off list)

Thanks for the chrooted/jailed tip and the link!
I'm already using nmap and I think road runner filters "1720/tcp filtered H.323/Q.931"

On 09/04/2010 03:25 AM, Maxim Shkurygin wrote:
Nmap your machine and make sure that no extra ports are open to the
outside :) The main vector vector of attack on your system will
probably be automated web vulnerability scanners, so it might be a
good idea to make sure that any web-facing processes are all running
in a chrooted/jailed environment. Snort is used mainly for network
traffic analysis, so I don't think it'll be of much use on a VPS
system (it also shows a lot of false positives), but
http://sectools.org/ has a decent list of scanners that you can use to
partially assess the security of your machine. Good luck!
_______________________________________________
Mid-Hudson Valley Linux Users Group                  http://mhvlug.org
http://mhvlug.org/cgi-bin/mailman/listinfo/mhvlug

Upcoming Meetings (6pm - 8pm)                         MHVLS Auditorium
   Oct 6 - Creating Browser Extensions for Firefox and Chrome
   Nov 3 - Bug Labs
   Dec 1 - Dec 2010 Meeting


_______________________________________________
Mid-Hudson Valley Linux Users Group                  http://mhvlug.org
http://mhvlug.org/cgi-bin/mailman/listinfo/mhvlug

Upcoming Meetings (6pm - 8pm)                         MHVLS Auditorium
 Oct 6 - Creating Browser Extensions for Firefox and Chrome
 Nov 3 - Bug Labs
 Dec 1 - Dec 2010 Meeting

Reply via email to