Hi, all,
I have a Redhat 7.0 server setup as a firewall. I am a newbie to secure my
linux box, and I didn't do a good job in my services and firewall
configuration. Some time ago, I received a phone call from my cable
provider informing that someone has routed my machine and use my ip to poke
other companies ftp sites. They also sent me an "Acceptable Use Policy
Violation" email with a list of ports that I opened for services (eg; ftp,
http, telnet, etc.).
So, I just followed that port list and commented out all the opened ports in
/etc/services, and hopefully when I restart my RH box, I can still use
Internet sharing behind firewall. And shoot, my box stopped booting at "..
Random Number Generator..". It just stuck there. Now I need some help coz
all my school data is in that box.
1. How do I boot my RH box? (I have an installation disk, which is used
when I installed RH 7.0).
2. After I got it booted and running, how do I make sure that I close all
the necessary ports?
3. Since I configured ip-masq for internet sharing, it's not difficult for
someone to use my ip for hacking, BUT, how does he do it?
Thank you for your help. =)
- Bernie
_________________________________________________________________________
Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com.
_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list