-
[quote="Bukowski"]
Originally Posted by
false-hopes
when its installed needs locking down HARD.
so true, de"fault knoppix is definately not something you want to go on the internet with, not only you have to lock down services, try to upgrade the kernel(it's bugged) and remove a bunch of useless (suid) files too, when you don' with that, it starts to get reasonably to work with it, although you're not finished yet: you may want to secure/upgrade specific services too.
-
lol
really interesting topic
linux can protect you from windows malware (worm, virus, trojan, windows applications exploit, windows rootkits)
but there is a lot of linux rootkits around
a rootkit scan an ip adress or a range ip looking for some defined open ports (associated with known process security whole)
it logs the scan result in a file and ask you if you want to try to exploit the security wholes on the target comp
there are some root kits you can add your own exploit
so put a linux workstation directly on the internet is not so secure as it seems
my mandrake 8.1 webserver installed behind a secured debianbox was hacked two times in a year
-
Re: lol
Originally Posted by
roger_girardin
really interesting topic
linux can protect you from windows malware (worm, virus, trojan, windows applications exploit, windows rootkits)
but there is a lot of linux rootkits around
a rootkit scan an ip adress or a range ip looking for some defined open ports (associated with known process security whole)
actually, what you describe is a worm, a rootkit is a set of utilities, typically kernel level enhancements that try to hide anomalous activity. for instance, hide network connections as seen wirh netstat, processes as seen by ps, it sometimes adds a icmp backdoor etc.
-
lol
@xaoz
thanks for the help
as you can find over 70 000 windows malwares
as you can find up to 70 linux malwares, linux is a natural protection
the actuals most knows rootkit are like you have defined
but this is just a kind of rootkit
a rootkit is a tool which will give a root access on a target comp
as there many ways to try to do it, every tools attempting to do it are called rootkit
when i see debian router box's firewall log, i can see the attacks
it's very interesting too
regards
Similar Threads
-
By eadz in forum Hdd Install / Debian / Apt
Replies: 11
Last Post: 11-04-2010, 09:02 PM
-
By NetKatz in forum Hdd Install / Debian / Apt
Replies: 2
Last Post: 05-02-2004, 02:38 PM
-
By pierrevn in forum General Support
Replies: 5
Last Post: 12-12-2003, 07:34 AM
-
By Edix in forum Hdd Install / Debian / Apt
Replies: 1
Last Post: 11-10-2003, 08:20 PM
-
By kipizit in forum General Support
Replies: 1
Last Post: 11-07-2003, 03:08 AM
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
Case For Samsung Galaxy Tab A9/ A9+ 5G/ A9 Plus Kids Shockproof Cover with Stand
$16.99
EXCELLENT SAMSUNG GALAXY TAB 4 10.1in SM-T537V 16GB WIFI VERIZON ANDROID TABLET
$47.99
Samsung Galaxy Tab A9 (X110) 64GB 4GB RAM International Version (New)
$129.99
Samsung Galaxy Tab A - SM-T580 - 10.1" - 2GB RAM - 16GB (Black) - SM-T580NZKAXAR
$42.99
Samsung - S Pen Creator Edition - White
$38.00
Samsung Galaxy Tab E 8" 16GB Black SM-T377V (Verizon) Android Tablet IF1002
$28.50
As-is Samsung Book Cover Keyboard for Samsung Galaxy Tab S6 (EF-DT860)
$49.99
Samsung Galaxy Tab A9+ 11.0" 64GB Gray Wi-Fi Tablet Bundle SM-X210NZAYXAR 2023
$169.99
Samsung Official Book Cover Keyboard for Galaxy Tab S9+ / Tab S9+ 5G (Black)
$131.99
SAMSUNG 4TB 870 QVO 2.5" V-NAND SSD SATA Solid State Drive (MZ-77Q4T0)
$199.95