Hi, all,

I have a Redhat 7.0 server setup as a firewall.  I am a newbie to secure my 
linux box, and I didn't do a good job in my services and firewall 
configuration.  Some time ago, I received a phone call from my cable 
provider informing that someone has routed my machine and use my ip to poke 
other companies ftp sites.  They also sent me an "Acceptable Use Policy 
Violation" email with a list of ports that I opened for services (eg; ftp, 
http, telnet, etc.).

So, I just followed that port list and commented out all the opened ports in 
/etc/services, and hopefully when I restart my RH box, I can still use 
Internet sharing behind firewall.  And shoot, my box stopped booting at ".. 
Random Number Generator..".  It just stuck there.  Now I need some help coz 
all my school data is in that box.

1. How do I boot my RH box?  (I have an installation disk, which is used 
when I installed RH 7.0).
2. After I got it booted and running, how do I make sure that I close all 
the necessary ports?
3. Since I configured ip-masq for internet sharing, it's not difficult for 
someone to use my ip for hacking, BUT, how does he do it?

Thank you for your help.  =)

- Bernie
_________________________________________________________________________
Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com.



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to