Ed Wilts writes:
>One of the first things you need to look at is why you were hacked for the
>3rd time.  Once I can understand, but after that your system should have
>been so tight and your procedures enhanced such that there is likely no 2nd
>time, and definitely no 3rd time.
>
>Please read the archives for this list over the last week or so - somebody
>else was hacked and there were a lot of good postings about how to prevent
>being hacked (you've done a fresh install now and run up2date haven't you?)
>and what to do now.
>
>Unless you're very skilled, it's my opinion that you're not going to be able
>to catch the hacker unless he's a moron.  They've typically got better tools
>than you do, and since you've been hacked 3 times in 2 months, it's unlikely
>that you're extremely skilled.  Any evidence you need to catch the sucker is
>probably gone,  and there will be enough relays in the middle through
>foreign countries that you're not going to catch the sob without a *lot* of
>work by somebody who really understands forensic intrusion analysis.

The first time I was hacked it was on a remote box I was leasing.  I
discontinued the lease on it.  The hacker then found my home system and got into
my 6.1 box.  I then wiped it clean and did a fresh install of 6.2, which he
immediately hacked.  Thanks to the good folks at the Rule Project I just
installed 7.2 on it.  This time I emailed the root password to the hacker.
Might as well save him some effort.

You're right.  I'm a RH Linux end user, not a geek.  I don't have the
tools/experience to track him down, find out how he got in, and plug the holes.
I just install what Red Hat sends and hope it works.

Have you tried Krispy Kreme yet?  We've been out there a couple of times, but
the wait is so long that we've given up.

Glen
Brooklyn Park, MN



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to