Home page logo
/

basics logo Security Basics mailing list archives

Re: ridiculous situation
From: Glenn Valenta <glenn () coloradostudios com>
Date: Fri, 29 Nov 2002 11:33:26 -0700

Download and run this...  http://www.chkrootkit.org/

It could be that the RH boxes are the firewall.

Also, some people feel that a firewall is unnecessary if you don't run any services that are vulnerable to attack. The problem with this philosophy is when someone eventually breaks one of those services.

Also also, check out http://www.redhat.com/apps/support/errata/ for any security related patches that should be installed.

If your new to Linux, check out http://en.tldp.org/guides.html



harley mcdonald wrote:

hi,

this is kinda broad...say you've inherited 5 ( R.H.
linux ) machines.   all of which have been on for a
year, not firewalled and not backed up.

management has a "ain't broke don't fix" mentality.  i
guess, what would you do?   how would you be sure
there are no trojans, bots etc...chkrootkit and so on,
i suppose, but how reliable will the results be?   how
can i be sure there isn't a key-logger in the kernel.

you can't simply firewall them off and leave them for
dead.   legal action can be taken against the company
in the event of a break-in and subsequent attacks on
other companies.

and on and on.

any ideas?

h
..

__________________________________________________
Do you Yahoo!?
Yahoo! Web Hosting - Let the expert host your site
http://webhosting.yahoo.com




  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]