On 12/26/2014 12:48 PM, Reco wrote:
> Hi.
>
> On Fri, 26 Dec 2014 10:42:21 -0500
> Jerry Stuckle wrote:
>
>> It's possible to corrupt ANY program if you replace a .dll or .so with
>> your own code.
>
> Indeed. But the program which can be tricked to use your own library
> in
On Thu, 25 Dec 2014 19:47:28 +0200
Danny wrote:
> I think what is the most disturbing is the fact that it eventually
> happened to me ... :( ... never thought it would ...
>
> And truth be told I am guilty at riding the horse bareback with guns
> blazing whenever I setup a server ... not paying
Hi.
On Fri, 26 Dec 2014 10:42:21 -0500
Jerry Stuckle wrote:
> It's possible to corrupt ANY program if you replace a .dll or .so with
> your own code.
> >>>
> >>> Indeed. But the program which can be tricked to use your own library
> >>> instead of a system one - is called vulnerable u
On 12/26/2014 1:51 AM, Reco wrote:
> Hi.
>
> On Thu, Dec 25, 2014 at 09:19:49PM -0500, Jerry Stuckle wrote:
>> On 12/25/2014 11:23 AM, Reco wrote:
>>> Hi.
>>>
>>> On Thu, Dec 25, 2014 at 10:18:11AM -0500, Jerry Stuckle wrote:
On 12/25/2014 8:54 AM, Andre N Batista wrote:
> On Wed, Dec 2
Danny wrote:
>> I've seen attacks start within hours of putting a new system on the
>> internet. I see multiple attacks on my servers every day.
> Makes me wonder how these guys get hold of IP's so quickly ...
With a decent enought connection (about 10GBits) you can scan the entire
reachable I
Hi.
On Thu, Dec 25, 2014 at 09:19:49PM -0500, Jerry Stuckle wrote:
> On 12/25/2014 11:23 AM, Reco wrote:
> > Hi.
> >
> > On Thu, Dec 25, 2014 at 10:18:11AM -0500, Jerry Stuckle wrote:
> >> On 12/25/2014 8:54 AM, Andre N Batista wrote:
> >>> On Wed, Dec 24, 2014 at 11:18:36AM -0500, Jerry Stuckl
On 12/25/2014 11:23 AM, Reco wrote:
> Hi.
>
> On Thu, Dec 25, 2014 at 10:18:11AM -0500, Jerry Stuckle wrote:
>> On 12/25/2014 8:54 AM, Andre N Batista wrote:
>>> On Wed, Dec 24, 2014 at 11:18:36AM -0500, Jerry Stuckle wrote:
On 12/24/2014 2:01 AM, Danny wrote:
> Hi Bob,
>
> You w
Danny writes:
> Makes me wonder how these guys get hold of IP's so quickly ...
They are bots. There are millions of them and they're constantly
scanning. The entire process from scanning to the installation of the
malware and the addition of your system to the botnet is automated.
--
John Hasle
I think what is the most disturbing is the fact that it eventually
happened to me ... :( ... never thought it would ...
And truth be told I am guilty at riding the horse bareback with guns blazing
whenever I setup a server ... not paying much attention to security. But alas
... I have learned my
Hi.
On Thu, Dec 25, 2014 at 10:18:11AM -0500, Jerry Stuckle wrote:
> On 12/25/2014 8:54 AM, Andre N Batista wrote:
> > On Wed, Dec 24, 2014 at 11:18:36AM -0500, Jerry Stuckle wrote:
> >> On 12/24/2014 2:01 AM, Danny wrote:
> >>> Hi Bob,
> >>>
> >>> You were right, SFTP, FileZilla and Proftp confu
On 12/25/2014 8:54 AM, Andre N Batista wrote:
> On Wed, Dec 24, 2014 at 11:18:36AM -0500, Jerry Stuckle wrote:
>> On 12/24/2014 2:01 AM, Danny wrote:
>>> Hi Bob,
>>>
>>> You were right, SFTP, FileZilla and Proftp confused the hell out of me ...
>>> lol
>>> ... I must add in my defense though that
On Wed, Dec 24, 2014 at 11:18:36AM -0500, Jerry Stuckle wrote:
> On 12/24/2014 2:01 AM, Danny wrote:
> > Hi Bob,
> >
> > You were right, SFTP, FileZilla and Proftp confused the hell out of me ...
> > lol
> > ... I must add in my defense though that I was in a state of panic after
> > syslog
> >
On 12/24/2014 2:48 PM, Danny wrote:
> Hi Guys,
>
> As a matter of interest, after I installed fail2ban I got this on ssh:
>
> ###
> Hi,
>
> The IP 122.225.109.103 has just been banned by Fail2Ban afte
Hi Guys,
As a matter of interest, after I installed fail2ban I got this on ssh:
###
Hi,
The IP 122.225.109.103 has just been banned by Fail2Ban after
3 attempts against ssh.
Here are more informatio
> Strong agreement! There are endless dictionary attacks to ssh. This
> sometimes scares people but for no good reason. If you have a strong
> passwords, and everyone should have either strong passwords for ssh or
> blocked passwords, then there is no danger. There is no need to shy
> away fro
Jerry Stuckle wrote:
> Danny wrote:
> > You were right, SFTP, FileZilla and Proftp confused the hell out of me ...
> > lol
We have all been there at some point! :-)
> > ... I must add in my defense though that I was in a state of panic
> > after syslog warned me of an attack by someone during th
On 12/24/2014 2:01 AM, Danny wrote:
> Hi Bob,
>
> You were right, SFTP, FileZilla and Proftp confused the hell out of me ... lol
> ... I must add in my defense though that I was in a state of panic after
> syslog
> warned me of an attack by someone during the night via ssh ... So I
> frantically
without reading the online guides properly ...
Sometimes one does stupid things ... lol ...
Thanks for everyone's input ...
Danny
On Dec 23 14, Bob Proulx :
> To: debian-user@lists.debian.org
> Date: Tue, 23 Dec 2014 15:49:34 -0700
> From: Bob Proulx
> Subject: Re: SFTP question
&
Danny wrote:
> I am trying to setup SFTP (ssh) with ProFTP.
It looks to me like you might be confusing ssh sftp with proftpd sftp.
I assume you are not using ftps.
http://www.proftpd.org/docs/contrib/mod_sftp.html
> My /etc/proftpd/conf.d/sftpd.conf looks like this:
>
>
> SFTPEngine on
> Por
On Tue, Dec 23, 2014 at 02:52:28PM +0200, Danny wrote:
> Hi guys,
>
> I am trying to setup SFTP (ssh) with ProFTP.
>
> My /etc/proftpd/conf.d/sftpd.conf looks like this:
>
> ###
>
> SFTPEngine on
> Port 7003
> SFTPLog /var/log/
Hi guys,
I am trying to setup SFTP (ssh) with ProFTP.
My /etc/proftpd/conf.d/sftpd.conf looks like this:
###
SFTPEngine on
Port 7003
SFTPLog /var/log/proftpd/sftp.log
# Configure both the RSA and DSA host keys, using the same h
21 matches
Mail list logo