Re: Connecting to Internet
On Wednesday 27 April 2005 17:59, Broming plutonium wrote: > Never mind. Yesterday, the second hardware problem failed the display > driver on the FreeBSD computer, and I have no choice but to throw out > the old computer. I'll stick with Windows for the moment, because it > is user-friendly. I just have to be more careful on the Internet. > The most careful thing you can do is learn how to install FreeBSD and harden it properly. Benjamin ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to "[EMAIL PROTECTED]"
Re: Please respond in 24 hrs (ref # 624 633 394)
On Tuesday 26 April 2005 12:45, Tanisha Wynn wrote: > Hi, > > Did you recieve my email from last week? I'm happy to tell you > that you can get a home loan at a rock-bottom rate right now. > > Your tracking number is # L9 333 316 > > You need to confirm your details within the next 24 hours. > Just visit the link below and fill in the short form (it only takes > a minute). http://www.just1ce.com/mt.asp > > Best Regards, > > Tanisha Wynn > Account Officer > > > To never hear from us again > just1ce.com/gone.asp Hey! Is that possible? Spamming on the list! What can be done? ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to "[EMAIL PROTECTED]"
Re: Where to find good/cheap tech support
On Sunday 24 April 2005 15:58, ChrisC wrote: > Where would you all recommend that one can go to find good FreeBSD tech > support that does not cost $150+ an hour? > > If there are no places that are less expensive, then what places do you > recommend that are expensive? > > I am having a SCSI controller boot problem that no one seems to be able to > help on but I am also thinking of the future if there is an emergency and > I can't afford to have a server down for days at a time. > > Thanks. Try xTech in Novosibirsk for remote assistance. $20 per hour and competent technicians. Contact Sergey Solokov - who speaks excellent English. http://www.xtech.ru/ The also have an Office in London, and have experience working on Open Source Projects. http://www.xdevelopment.co.uk/ Benjamin Rossen ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to "[EMAIL PROTECTED]"
Fwd: lost root passwd
Sorry... typo # mount -u / # mount /usr # passwd root -- Forwarded Message -- Subject: lost root passwd Date: Sunday 17 April 2005 00:45 From: Benjamin Rossen <[EMAIL PROTECTED]> To: freebsd-questions@freebsd.org Marty I think the problem you are having comes because you must boot your machine in single-user mode to make this work. Then: # mount -u / # mount /usr # passed root You shall then be prompted as follows; Enter new password: Enter new password again: #^D The Ctrl+D causes the system to contine booting with the new password. You do not need to mount the /usr file separately if you have not given this its own (extended) partition when you formatted your disks. Good luck, Benjamin Rossen --- ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to "[EMAIL PROTECTED]"
lost root passwd
Marty I think the problem you are having comes because you must boot your machine in single-user mode to make this work. Then: # mount -u / # mount /usr # passed root You shall then be prompted as follows; Enter new password: Enter new password again: #^D The Ctrl+D causes the system to contine booting with the new password. You do not need to mount the /usr file separately if you have not given this its own (extended) partition when you formatted your disks. Good luck, Benjamin Rossen ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to "[EMAIL PROTECTED]"
Re: Self Defense thourg DoS... ? (was: too many illegal connection attempts through ssh)
On Thursday 14 April 2005 00:30, Hexren wrote: > "Central _trusted_ authority" leaves a bitter taste in my mouth... but > then I may be paranoid. > Anyway if I am a local user on a machine and I have access to an ssh > binary (that is what I meant with "ssh access") and bash, I can churn out connections > with the only limit beeing my bandwith and system limits on the number > of processes I can run at one time. But even with these set to > sensible defaults say 10 processes and 1/10 of site bw. I am able to > "attack many disparate machines in different parts of the world" > therefore I am able to trigger a _defensive_ DoS against the machine > in that I am. > > Regards > Hexren > Hexren, I get your point. It is a very good point. Economists call that 'moral hazard', by which they mean that any system instituted to protect against one evil, can be recruited by a some individuals to bring about another inforeseen evil. The question then becomes; which is the greater evil? How may people who are local users and have access to ssh, are going to want to use defensive DOS to bring down the machine they are on? Surely, if they have these privileges, there are countless easier and more direct ways of bringing down their own machines. Even if there are some situations where the porposed system of defensive DOS can be used in this way, is the evil that results from these remote suicides worse that the evil that results from the crackers who are presently not checked in any way? Trusted authorities are a necessary feature of life in the real word, but there should be checks and balances in place. The word 'trusted' implies that. They are not just Statutory Authorities, or Powerful Forces. They are trusted by some one or some group, or the majority, and perhaps universally. Perhaps the question here should be: who determines which authority should be trusted, and who monitors their exercise of authority to see that they remain trustworthy? Benjamin Rossen ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to "[EMAIL PROTECTED]"
Re: too many illegal connection attempts through ssh
On Wednesday 13 April 2005 23:55, Hexren wrote: > > Just an idea... > > > Benjamin Rossen > > - > > Sounds fun but opens the door for every local user with ssh access to > DOS the machine he is on. I am not that found of the idea. Not at all. Let us say that a trusted authority were to operate the central server. The central server would not authorize a coordinated defensive DOS unless there were to be evidence that the cracker had been attacking many machines - perhaps the criterion could be framed to trigger a defensive DOS only if it were established that the cracker had been attacking many disparate machines in different parts of the world. Who is tracking this kind of thing centrally? No one. When you find that someone is trying to get into one of your servers you have no idea of what else that individual may be doing. A central trusted authority would know. Benjamin Rossen ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to "[EMAIL PROTECTED]"
Re: too many illegal connection attempts through ssh
On Wed, 2005-04-06 at 07:15 +, Edwin D. Vinas wrote: > hello, > > shown below is snapshot of too many illegal attempts to login to my > server from a suspicious hacker. this is taken from the > "/var/log/auth.log". my question is, how do i automatically block an > IP address if it is attempting to guess my login usernames? can i > configure the firewall to check the instances a certain IP has > attempted to access/ssh the sevrer, and if it has failed to login for > about "x" number of attempts, it will be blocked automatically? > > thank you in advance! > > -edwin > > > Mar 26 05:00:00 pawikan newsyslog[11879]: logfile turned over ...etc. This is one of those things we all have to live with. I once had the idea to start an Open Source Project for making an administrators' tool that would work as follows. The tool would collect these records and send the information to a central server. I would be willing to donate and administer that server. The server would then track where these attacks are coming from. If it becomes apparent that the attacks are coming from a lone idiot doing one or two amateurish crack attempts, nothing further need be done. On the other hand, if it becomes apparent that the source is making repeated attacks on many machines, then a co-ordinate message would go out to all administrators using the tool. This could be automated. We could hope that many tens of thousands of BSD administrators would be using this tool (on many hundreds of thousands of BSD machines). All the machines administered by users of this tool would then launch a concerted Denial Of Service attack on the cracker address. Now, how about that? Of course, we could also try to do this nicely; for example, we could send automated notifications to the ISPs servicing the offending machines, or to ICANN, or to the police and other authorities in the countries where this kind of behavior is illegal, and so on. However, that would certainly be quite ineffective, and much less fun. Or we could combine these strategies. We could notify the ISPs that the attacks are coming from one of their clients, informing them that a Tsunami DOS shall follow if they do not put a stop to the attacks. Just an idea... Benjamin Rossen ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to "[EMAIL PROTECTED]"
Re: Installation
On Sunday 10 April 2005 18:09, Viatcheslav Kisselev wrote: > Dear developers, > I'm trying to install from CD > > Version: FreeBSD 4.11 > MB: P4C800 > Video:NVIDIA GeForce4 MX 440 with ACP8X > Monitor: LG F900B > Is there a reason why you are using 4.11 , not the current version which is 5.3 ? Benjamin Rossen ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to "[EMAIL PROTECTED]"