You can run up2date for one system and have it leave the rpms
than just install them on the other machines. You just have
to check periodically for updates of programs not on the machine
with up2date on it. I maintain 4 machines that way  2 or not
connected to the internet so I make a cd and load updates so
they all are running the samething.
                    Linda
On Sun, 5 May 2002, Glen Lee Edwards wrote:

> Jack Bowling writes:
> >** Reply to message from Glen Lee Edwards <[EMAIL PROTECTED]> on Sun, 05 May 2002 
>12:25:47 -0500
> >
> ><snip>
> >> You're right.  I'm a RH Linux end user, not a geek.  I don't have the
> >> tools/experience to track him down, find out how he got in, and plug the holes.
> >> I just install what Red Hat sends and hope it works.
> ><snip>
> >
> >Glen, such a defeatist attitude is unnecessary. After you re-install again (you 
>must assume that your friendly neighborhood hacker has already had free rein on your 
>box), do 3 things:
> 
> If you had several years of customized programming and added services that you
> were going to lose because you've been told that you now can't trust any program
> on your system and that it all must be wiped, you'd be defeated, too.  A fresh,
> clean install shuts me down.
> 
> >1) Choose a difficult root password, one with a combo of letters and numbers. 
> 
> Root has always had that kind of password.
> 
> >2) Choose medium or high security firewall during install. 
> 
> Did that, and now named won't run.
> 
> >3) register your system for up2date and let the up2date agent do its thing. It may 
>take a while but a fully updated system is less prone to security holes.
> 
> Tried that.  It doesn't work - keeps dying part way through, saying that I need
> authorization.  It's only good for one box, anyway.  If you have multiple
> computers you have to pay.  I'm not going to be able to pursued the rest of my
> family members to switch to Linux if they have to pay them a regular fee for the
> privilege.
> 
> >If the hacker does damage to somebody, you could be complicit if it is found out 
>that you willingly allowed him use of your box - especially since you emailed him 
>your root password.
> 
> That was a joke! -grin- My wife doesn't even know my passwords.
> 
> Glen
> 
> 
> 
> _______________________________________________
> Redhat-list mailing list
> [EMAIL PROTECTED]
> https://listman.redhat.com/mailman/listinfo/redhat-list
> 



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to