My background is not computer security, but
mathematics, and I was wondering if I might be humbly allowed to ask a
question:
Last summer my PC was attacked by a malicious
hacker who used a Trojan Horse NetBus. My Norton Personal Firewall alerted me
about all five attacks, but I panicked,
Hi,
I have a got a very peculiar problem with Cisco IOS Firewall 21.4 on Cisco
2621 Router. Our mail server recides on the DMZ and We have got CBAC and
Access lists enabled on the Router. There's no problem with the traffic
except SMTP. When the authentication is enabled for SMTP relay on our
dear sir
am trying to compile satan on my linux 7.0 host,
i get the following error when i run the 'make linux ' command
satan-1.1.1]# make linux
The LINUX rules are untested and may be wrong
make[1]: Entering directory `/var/satan-1.1.1'
cd src/misc; make LIBS=
hi robert
it's not good that your pc was hacked..etc...
if you didnt save your log files...before they erased it.. its lots harder
to track your 'friends
if you didn record the network activity as soon as you unpluged your
hacked machine to see where they are coming from and trying to