There is a good chance if you have been rooted, that the attacker installed
a rootkit to cover his tracks. I saw a good rootkit detecter on
http://freshmeat.net/ . Just do a search for it on there.
From: Tim Haynes [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: Kjetil Kjernsmo [EMAIL
Hi guys,
I am having a bit of trouble with some dodgy emails
getting sent to my friend...they are strange, not just normal spam, the emails
have information that is from my company web site (hosted off site)
Anyway, the header of the emails has this
line:
Received: from Wzk ([MYIP]) by
Langdon Green skrev:
Hi guys, I am having a bit of trouble with some dodgy emails getting
sent to my friend...they are strange, not just normal spam, the emails
have information that is from my company web site (hosted off
site) Anyway, the header of the emails has this line: Received:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Dear Tim, dear all,
Thanks for all the responses.
I realize it's pretty bold trying put a box on the net without having
extensive admin experience beforehand. But I think I'm learning fast, and
I hope I'll be able to do it without placing any
Hi i have configuret postfix, pop-before-smpt and ipop3 (ssl). On a debian
mail server. I have 200 users and whant some new more secure passwords
(not to long though). Is there a simple way to generate
secure passwords so i can use them with adduser
Thanks
___
Mvh./Yours sincerely
Lars
On Fri, 2002-05-24 at 15:04, Lars Roland Kristiansen wrote:
Hi i have configuret postfix, pop-before-smpt and ipop3 (ssl). On a debian
mail server. I have 200 users and whant some new more secure passwords
(not to long though). Is there a simple way to generate
secure passwords so i can use
On Fri, 24 May 2002 15:04:50 +0200 (MET DST)
Lars Roland Kristiansen [EMAIL PROTECTED] wrote:
Hi i have configuret postfix, pop-before-smpt and ipop3 (ssl). On a debian
mail server. I have 200 users and whant some new more secure passwords
(not to long though). Is there a simple way to
I'm thinking of writing a script but I am hoping that someone else has
beaten me to the punch. Perhaps someone has seen something that will do
this:
1) Check the Debian security announcement list.
2) Compare new announcements to the local package database.
3) If vulnerable packages installed,
Kjetil Kjernsmo [EMAIL PROTECTED] writes:
Thanks for all the responses.
I realize it's pretty bold trying put a box on the net without having
extensive admin experience beforehand. But I think I'm learning fast, and
I hope I'll be able to do it without placing any burden on the rest of
On Fri, May 24, 2002 at 09:41:46AM -0400, Nathan Valentine wrote:
1) Check the Debian security announcement list.
2) Compare new announcements to the local package database.
3) If vulnerable packages installed, send an 'I need updated' email to
an address defined by the SysAdmin.
Another nice
On Fri, 24 May 2002 at 15:04:50 +0200, Lars Roland Kristiansen wrote:
[...]
I have 200 users and whant some new more secure passwords
(not to long though). Is there a simple way to generate
secure passwords so i can use them with adduser
pwgen, makepasswd, apg (since Woody).
[ 11 lines
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 24 May 2002, Tim Haynes wrote:
Unfortunately, the only way to examine all the files on the disk/s is to
reboot the box off clean r/o media (read: rescue CD), mount them r/o, and
examine them by hand.
Yeah, I guess so.
You're highly unlikely to
On Fri, May 24, 2002 at 02:23:38PM +0200, Kjetil Kjernsmo wrote:
OK. This is what nmap says, launched from my workstation:
[snip]
137/tcpfilterednetbios-ns
138/tcpfilterednetbios-dgm
139/tcpfilterednetbios-ssn
[snip]
6346/tcp filteredgnutella
filtered means
Tue, 07 May 2002 17:25:01 +0200
Manuel Segura [EMAIL PROTECTED] wrote:
Hi,
Hello,
I am creating some server mod-ssl certificates using the script
mod-ssl-makecert.
I used to do it wih openssl. For example
bash:~$ openssl genrsa -des3 -rand /dev/random -out www.domain.tld.key 1024
On Fri, May 24, 2002 at 09:41:46AM -0400, Nathan Valentine wrote:
I'm thinking of writing a script but I am hoping that someone else has
beaten me to the punch. Perhaps someone has seen something that will do
this:
1) Check the Debian security announcement list.
2) Compare new
On Fri, 24 May 2002, Matt Zimmerman wrote:
On Fri, May 24, 2002 at 09:41:46AM -0400, Nathan Valentine wrote:
I'm thinking of writing a script but I am hoping that someone else has
beaten me to the punch. Perhaps someone has seen something that will do
this:
1) Check the Debian
unsubscribe
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
unsubscribe
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
There is a good chance if you have been rooted, that the attacker installed
a rootkit to cover his tracks. I saw a good rootkit detecter on
http://freshmeat.net/ . Just do a search for it on there.
From: Tim Haynes [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: Kjetil Kjernsmo [EMAIL
Hi guys,
I am having a bit of trouble with some dodgy emails
getting sent to my friend...they are strange, not just normal spam, the emails
have information that is from my company web site (hosted off site)
Anyway, the header of the emails has this
line:
Received: from Wzk ([MYIP]) by
Langdon Green skrev:
Hi guys, I am having a bit of trouble with some dodgy emails getting
sent to my friend...they are strange, not just normal spam, the emails
have information that is from my company web site (hosted off
site) Anyway, the header of the emails has this line: Received:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Dear Tim, dear all,
Thanks for all the responses.
I realize it's pretty bold trying put a box on the net without having
extensive admin experience beforehand. But I think I'm learning fast, and
I hope I'll be able to do it without placing any burden
Hi i have configuret postfix, pop-before-smpt and ipop3 (ssl). On a debian
mail server. I have 200 users and whant some new more secure passwords
(not to long though). Is there a simple way to generate
secure passwords so i can use them with adduser
Thanks
___
Mvh./Yours sincerely
Lars
On Fri, 2002-05-24 at 15:04, Lars Roland Kristiansen wrote:
Hi i have configuret postfix, pop-before-smpt and ipop3 (ssl). On a debian
mail server. I have 200 users and whant some new more secure passwords
(not to long though). Is there a simple way to generate
secure passwords so i can use
On Fri, 24 May 2002 15:04:50 +0200 (MET DST)
Lars Roland Kristiansen [EMAIL PROTECTED] wrote:
Hi i have configuret postfix, pop-before-smpt and ipop3 (ssl). On a debian
mail server. I have 200 users and whant some new more secure passwords
(not to long though). Is there a simple way to
I'm thinking of writing a script but I am hoping that someone else has
beaten me to the punch. Perhaps someone has seen something that will do
this:
1) Check the Debian security announcement list.
2) Compare new announcements to the local package database.
3) If vulnerable packages installed,
Kjetil Kjernsmo [EMAIL PROTECTED] writes:
Thanks for all the responses.
I realize it's pretty bold trying put a box on the net without having
extensive admin experience beforehand. But I think I'm learning fast, and
I hope I'll be able to do it without placing any burden on the rest of
the
On Fri, May 24, 2002 at 09:41:46AM -0400, Nathan Valentine wrote:
1) Check the Debian security announcement list.
2) Compare new announcements to the local package database.
3) If vulnerable packages installed, send an 'I need updated' email to
an address defined by the SysAdmin.
Another nice
On Fri, 24 May 2002 at 15:04:50 +0200, Lars Roland Kristiansen wrote:
[...]
I have 200 users and whant some new more secure passwords
(not to long though). Is there a simple way to generate
secure passwords so i can use them with adduser
pwgen, makepasswd, apg (since Woody).
[ 11 lines
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 24 May 2002, Tim Haynes wrote:
Unfortunately, the only way to examine all the files on the disk/s is to
reboot the box off clean r/o media (read: rescue CD), mount them r/o, and
examine them by hand.
Yeah, I guess so.
You're highly unlikely to
Kjetil Kjernsmo [EMAIL PROTECTED] writes:
On 24 May 2002, Tim Haynes wrote:
Unfortunately, the only way to examine all the files on the disk/s is to
reboot the box off clean r/o media (read: rescue CD), mount them r/o,
and examine them by hand.
Yeah, I guess so.
In the absence of this,
On Fri, May 24, 2002 at 02:23:38PM +0200, Kjetil Kjernsmo wrote:
OK. This is what nmap says, launched from my workstation:
[snip]
137/tcpfilterednetbios-ns
138/tcpfilterednetbios-dgm
139/tcpfilterednetbios-ssn
[snip]
6346/tcp filteredgnutella
filtered means
Tue, 07 May 2002 17:25:01 +0200
Manuel Segura [EMAIL PROTECTED] wrote:
Hi,
Hello,
I am creating some server mod-ssl certificates using the script
mod-ssl-makecert.
I used to do it wih openssl. For example
bash:~$ openssl genrsa -des3 -rand /dev/random -out www.domain.tld.key 1024
On Fri, May 24, 2002 at 09:41:46AM -0400, Nathan Valentine wrote:
I'm thinking of writing a script but I am hoping that someone else has
beaten me to the punch. Perhaps someone has seen something that will do
this:
1) Check the Debian security announcement list.
2) Compare new
On Fri, May 24, 2002 at 09:41:46AM -0400, Nathan Valentine wrote:
I'm thinking of writing a script but I am hoping that someone else has
beaten me to the punch. Perhaps someone has seen something that will do
this:
1) Check the Debian security announcement list.
2) Compare new
On Fri, 24 May 2002, Matt Zimmerman wrote:
On Fri, May 24, 2002 at 09:41:46AM -0400, Nathan Valentine wrote:
I'm thinking of writing a script but I am hoping that someone else has
beaten me to the punch. Perhaps someone has seen something that will do
this:
1) Check the Debian
On Fri, May 24, 2002 at 03:54:48PM +0200, Christian Hammers wrote:
On Fri, May 24, 2002 at 09:41:46AM -0400, Nathan Valentine wrote:
1) Check the Debian security announcement list.
2) Compare new announcements to the local package database.
3) If vulnerable packages installed, send an 'I
unsubscribe
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
unsubscribe
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
39 matches
Mail list logo