Complete.Org: Mailing Lists: Archives: discussion: April 2000:
[aclug-L] Re: To whom it may concern.
Home

[aclug-L] Re: To whom it may concern.

[Top] [All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index] [Thread Index]
To: discussion@xxxxxxxxx
Subject: [aclug-L] Re: To whom it may concern.
From: Jonathan Hall <jonhall@xxxxxxxxxxxx>
Date: Thu, 6 Apr 2000 22:04:16 -0500
Reply-to: discussion@xxxxxxxxx

Hmmm..  I thought I heard John G. ask why he put it in /.... not saying to
put it there.

Also... Why does it tell how to attack back?  That's rather stupid... kinda
like suicide.  If somebody is able to penetrate your security, they're
probably able to track your penetration of theirs.  That's a good way to get
a lawsuit filed against YOU.


On Thu, Apr 06, 2000 at 09:58:52PM -0500, Patrick R. Klee wrote:
> I borrowed a REALLY good book called Maximum Linux Security.  It covers what 
> to do
> in the event of an attack and how to attack back.  It sounds like someone was
> accessing your machine and erasing your hard disk.  But, I agree with John G.
> NEVER place anything in the / directory and/or download as /root
> 
> But, it sounds as though someone may have telneted into your Linux box.
> 
> 
> Patrick
> 
> 0 1 "My two bits"
> 
> 
> 
> 
> -- This is the discussion@xxxxxxxxx list.  To unsubscribe,
> visit http://tmp2.complete.org/cgi-bin/listargate-aclug.cgi

--
In a world without fences, who needs Gates?
--
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
  Jonathan Hall  *  jonhall@xxxxxxxxxxxx  *  PGP public key available
 Systems Admin, Future Internet Services; Goessel, KS * (316) 367-2487
         http://www.futureks.net  *  PGP Key ID: FE 00 FD 51
                  -=  Running Debian GNU/Linux  =-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

-- This is the discussion@xxxxxxxxx list.  To unsubscribe,
visit http://tmp2.complete.org/cgi-bin/listargate-aclug.cgi


[Prev in Thread] Current Thread [Next in Thread]