At 12:25 PM -0500 5/5/02, Glen Lee Edwards wrote: >Ed Wilts writes: >>One of the first things you need to look at is why you were hacked for the >>3rd time. Once I can understand, but after that your system should have >>been so tight and your procedures enhanced such that there is likely no 2nd > >time, and definitely no 3rd time. >> >...snip... >The first time I was hacked it was on a remote box I was leasing. I >discontinued the lease on it. The hacker then found my home system >and got into >my 6.1 box. I then wiped it clean and did a fresh install of 6.2, which he >immediately hacked. Thanks to the good folks at the Rule Project I just >installed 7.2 on it. This time I emailed the root password to the hacker. >Might as well save him some effort. > >You're right. I'm a RH Linux end user, not a geek. I don't have the >tools/experience to track him down, find out how he got in, and plug >the holes. >I just install what Red Hat sends and hope it works.
New word: "Firewall". Get one. I recommend the appliance variety, rather than using firewall software(*). Patrick Beart (*) Mensa members and other hair-splitters: "appliance" = firewall software installed in separate computer/device box. "Software" = firewall software installed in the same box as other services. -- ------------------------------------------------ Web Architecture & "iWeb4Biz" 503-774-8280 Portland, OR Internet Consulting, Intelligent Web site Development & Secure site Hosting. http://www.WebArchitecture.com/ "This is an era when nonsense has become acceptable and sanity is controversial." - Thomas Sowell ------------------------------------------------ _______________________________________________ Redhat-list mailing list [EMAIL PROTECTED] https://listman.redhat.com/mailman/listinfo/redhat-list