Bugtraq mailing list archives
Re: Standard & Poors security nightmare
From: tkennedy () CYBERPORT COM (Warren Young)
Date: Tue, 23 May 2000 11:48:46 -0600
A few nits: 13:44 5/17/00, you wrote:
2) Remove the /etc/issue file that reveals just how much stuff is here.
Sorry, that won't work. Unless S&P's changed something (unlikely from your description of what's been left enabled) Red Hat systems regenerate /etc/issue from scratch on boot. You need to modify /etc/rc.d/rc.local instead, which contains the code that generates /etc/issue.
6) Install and use ipchains on *both* interfaces to drastically reduce what
As another poster mentioned, this is a 2.0.x kernel, so you need to use ipfwadm, not ipchains. = Warren -- Educational Technology Resources, Inc.
Current thread:
- Re: Standard & Poors security nightmare, (continued)
- Re: Standard & Poors security nightmare Crispin Cowan (May 20)
- "gdm" remote hole Chris Evans (May 21)
- Re: "gdm" remote hole Katherine M. Moussouris (May 22)
- fdmount buffer overflow Arend-Jan Wijtzes (May 22)
- Re: fdmount buffer overflow Greg Olszewski (May 22)
- About VNC Patrick Oonk (May 24)
- Re: fdmount buffer overflow Tomasz Grabowski (May 24)
- Re: fdmount buffer overflow Matt Wilson (May 24)
- Re: fdmount buffer overflow Greg Olszewski (May 22)
- Gauntlet Firewall Vulnerability Elias Levy (May 22)
- Re: Standard & Poors security nightmare Stephen J. Friedl (May 24)
- Re: Standard & Poors security nightmare Warren Young (May 23)
- Re: Standard & Poors security nightmare Kevin Kadow (May 25)