On Fri, 14 Jun 2019, Jonathan Engwall wrote:

Maybe I am not being clear. 192.168.0.5 was an intruder.

Inside your private network?  What kind of security are you using on
your wireless access point inside your router (or your wireless enabled
router)?  The old encryption schemes can be cracked in literally a
minute or two by somebody driving by in a car.

Otherwise, a typical router won't pass packets from the outside to the
inside unless you explicitly enable them, port by port.

Finally, have you removed the default admin password to ensure that the
modem/router cannot be logged into from the outside?

   rgb


On Fri, Jun 14, 2019, 10:08 AM Jonathan Engwall
<engwalljonathanther...@gmail.com> wrote:
      I saw it yesterday. A nearly invisible VM connected at my login.
      Whete do I go from there?I really don't know.

On Fri, Jun 14, 2019, 9:54 AM Robert G. Brown <r...@phy.duke.edu>
wrote:
      On Fri, 14 Jun 2019, Jonathan Engwall wrote:

      > Robert Brown,You never saw this?

      I did, and my extensive reply (which you apparently didn't
      see, but
      which is likely in the beowulf list archives?) basically
      boils down to:

      We need a LOT more information about your problem to be
      able to help.
      The nmap scan below doesn't really tell me anything at all
      except that
      yeah, some hosts are down.

      Look in the archives and you can probably find it.

      ? ? ?rgb

      >
      > On Sun, Jun 9, 2019, 1:41 PM Jonathan Engwall
      > <engwalljonathanther...@gmail.com> wrote:
      >?? ? ?Hello Beowulf,
      > Recently we had serious trouble with the internet. A
      technician had to
      > climb the pole. Another technician, an IT specialist in
      Mexico City,
      > could not resolve the issue, sent the man here.
      > Now trouble is back. What does this mean? Where are the
      missing IPs?
      > From the pole to the modem, to my repeater, to my
      machine, and then my
      > VM gives this using nmap:
      >
      > Starting Nmap 6.40 ( http://nmap.org ) at 2019-06-09
      13:30 PDT
      > Initiating Ping Scan at 13:30
      > Scanning 256 hosts [2 ports/host]
      > Completed Ping Scan at 13:31, 6.64s elapsed (256 total
      hosts)
      > Initiating Parallel DNS resolution of 256 hosts. at
      13:31
      > Completed Parallel DNS resolution of 256 hosts. at
      13:31, 0.04s
      > elapsed
      > Nmap scan report for 192.168.0.0 [host down]
      > Nmap scan report for 192.168.0.1
      > Host is up (0.0080s latency).
      > Nmap scan report for 192.168.0.2
      > Host is up (0.00068s latency).
      > Nmap scan report for 192.168.0.3 [host down]
      > Nmap scan report for 192.168.0.4 [host down]
      > Nmap scan report for 192.168.0.5
      > Host is up (0.063s latency).
      > Nmap scan report for 192.168.0.6
      > Host is up (0.00068s latency).
      > Nmap scan report for 192.168.0.7 [host down]
      > Nmap scan report for 192.168.0.8 [host down]
      > Nmap scan report for 192.168.0.9 [host down]
      > Nmap scan report for 192.168.0.10 [host down]
      > Nmap scan report for 192.168.0.11 [host down]
      >
      >
      >

      Robert G. Brown? ? ? ? ? ? ? ? ? ? ? ? http://www.phy.duke.edu/~rgb/
      Duke University Dept. of Physics, Box 90305
      Durham, N.C. 27708-0305
      Phone: 1-919-660-2567? Fax: 919-660-2525? ?
      ?email:r...@phy.duke.edu





Robert G. Brown                        http://www.phy.duke.edu/~rgb/
Duke University Dept. of Physics, Box 90305
Durham, N.C. 27708-0305
Phone: 1-919-660-2567  Fax: 919-660-2525     email:r...@phy.duke.edu


_______________________________________________
Beowulf mailing list, Beowulf@beowulf.org sponsored by Penguin Computing
To change your subscription (digest mode or unsubscribe) visit 
https://beowulf.org/cgi-bin/mailman/listinfo/beowulf

Reply via email to