On 16/12/99 Matthew Dalton wrote:
You can Use ssh and don't run sshd from inetd.
ssh uses tcp wrappers regardless of whether you run it from inetd or
not (unless you specifically recompile without them) so you need to
add
sshd: ALL
to /etc/hosts.allow
in order to allow ssh connectio
William T Wilson wrote:
> Of course
> then you can't log in from arbitrary places then...
You can Use ssh and don't run sshd from inetd.
hi there,
> > It means that that interface is receiving all packets on the network
> > segment. Useful for packet sniffers. It's a bad thing if a cracker has
> > initiated it.
> That is what I thought. Is there a way to keep a cracker from doing this?
The only person who can put the ethernet dev
On Thu, 16 Dec 1999, Pollywog wrote:
> That is what I thought. Is there a way to keep a cracker from doing this?
You need to keep them out in the first place. My personal favorite is to
just keep tabs on security of standalone daemons (apache, sendmail) and
then put "ALL: ALL" in hosts.deny. W
On 16-Dec-1999 Matthew Dalton wrote:
> It means that that interface is receiving all packets on the network
> segment. Useful for packet sniffers. It's a bad thing if a cracker has
> initiated it.
That is what I thought. Is there a way to keep a cracker from doing this?
thanks
--
Andrew
>
> P
It means that that interface is receiving all packets on the network
segment. Useful for packet sniffers. It's a bad thing if a cracker has
initiated it.
Pollywog wrote:
>
> Is it a bad thing for my machine's interfaces to be in promiscuous mode?
>
> --
> Andrew
>
>
Is it a bad thing for my machine's interfaces to be in promiscuous mode?
--
Andrew
-
GnuPG Public KeyID: 0x48109681
*we all live downstream*
7 matches
Mail list logo