mailing list archives
Re: ridiculous situation
From: Glenn Valenta <glenn () coloradostudios com>
Date: Fri, 29 Nov 2002 11:33:26 -0700
Download and run this... http://www.chkrootkit.org/
It could be that the RH boxes are the firewall.
Also, some people feel that a firewall is unnecessary if you don't run any
services that are vulnerable to attack. The problem with this philosophy is
when someone eventually breaks one of those services.
Also also, check out http://www.redhat.com/apps/support/errata/ for any
security related patches that should be installed.
If your new to Linux, check out http://en.tldp.org/guides.html
harley mcdonald wrote:
this is kinda broad...say you've inherited 5 ( R.H.
linux ) machines. all of which have been on for a
year, not firewalled and not backed up.
management has a "ain't broke don't fix" mentality. i
guess, what would you do? how would you be sure
there are no trojans, bots etc...chkrootkit and so on,
i suppose, but how reliable will the results be? how
can i be sure there isn't a key-logger in the kernel.
you can't simply firewall them off and leave them for
dead. legal action can be taken against the company
in the event of a break-in and subsequent attacks on
and on and on.
Do you Yahoo!?
Yahoo! Web Hosting - Let the expert host your site