--> Install the "ipmasq" package. <--
I already installed that one... I'll put the firewall below
echo -n "IPTables Firewall."
IPTABLES="/sbin/iptables"
#FLUSH
echo -n " Flush all tables."
$IPTABLES --flush# Flush
all the rules in filter an
> > The standard things people will tell you to do are:
> > - turn everything off
>
> What is "everything"? I've downloaded the lasg and have been reading
> through it...but so far I have only disable things in
> /etc/inetd.conf. Are there other locations that I need to be concerned with?
Yo
Well many daemons are controlled but not all, for example mail and RPC are not.
You can see what is running on your system with netstat:
netstat -a --inet
Any socket with LISTEN is dangerous since it can be connected to. The other
place to look for daemons being started is /etc/innitta
On Sun, Jul 04, 1999 at 10:55:44PM +0100, Steve George wrote:
> The first thing you should do is comment telnet back in until you
> have drawn up your security strategy ;-)
Okay! :)
>
> The standard things people will tell you to do are:
> - turn everything off
What is "everything"? I've
The only thing you might trust is ssh. The only way to be safe is to
not have your computer connected to the internet at all. :)
In article <[EMAIL PROTECTED]> you wrote:
: Hi Mark,
: The first thing you should do is comment telnet back in until you have drawn
up your security strategy ;-)
:
>> "Mark" == Mark Wagnon <[EMAIL PROTECTED]> writes:
Mark> order to telnet into my gateway (is that right?)). But i've read
Mark> in the past that telnet isn't very secure and that people can
Mark> intercept logins and passwords when one telnets to a computer.
If the packages pass theri box. For
Hi Mark,
The first thing you should do is comment telnet back in until you have drawn up
your security strategy ;-)
The standard things people will tell you to do are:
- turn everything off
- use inetd/wrappers with PARANOIA for anything you *have* to have on
- use packet
Hi all:
Okay. I seem to have my two computers networked together. In fact I've
telneted into my machine that has a direct internet connection to
write this email.
I have some questions on how to go about making my system more
secure. When I first had my cable modem installed, one of the first
th
8 matches
Mail list logo