At 12:25 PM -0500 5/5/02, Glen Lee Edwards wrote:
>Ed Wilts writes:
>>One of the first things you need to look at is why you were hacked for the
>>3rd time.  Once I can understand, but after that your system should have
>>been so tight and your procedures enhanced such that there is likely no 2nd
>  >time, and definitely no 3rd time.
>>
>...snip...
>The first time I was hacked it was on a remote box I was leasing.  I
>discontinued the lease on it.  The hacker then found my home system 
>and got into
>my 6.1 box.  I then wiped it clean and did a fresh install of 6.2, which he
>immediately hacked.  Thanks to the good folks at the Rule Project I just
>installed 7.2 on it.  This time I emailed the root password to the hacker.
>Might as well save him some effort.
>
>You're right.  I'm a RH Linux end user, not a geek.  I don't have the
>tools/experience to track him down, find out how he got in, and plug 
>the holes.
>I just install what Red Hat sends and hope it works.


        New word:  "Firewall". Get one.

        I recommend the appliance variety, rather than using firewall 
software(*).




Patrick Beart

(*)  Mensa members and other hair-splitters:  "appliance" = firewall 
software installed in separate computer/device box. "Software" = 
firewall software installed in the same box as other services.
-- 
------------------------------------------------
Web Architecture  &  "iWeb4Biz"         503-774-8280       Portland, OR
Internet Consulting, Intelligent Web site Development & Secure site Hosting.
http://www.WebArchitecture.com/

"This is an era when nonsense has become acceptable and sanity is 
controversial."
                                      - Thomas Sowell
------------------------------------------------



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to