-
[quote="Bukowski"]
Originally Posted by
false-hopes
when its installed needs locking down HARD.
so true, de"fault knoppix is definately not something you want to go on the internet with, not only you have to lock down services, try to upgrade the kernel(it's bugged) and remove a bunch of useless (suid) files too, when you don' with that, it starts to get reasonably to work with it, although you're not finished yet: you may want to secure/upgrade specific services too.
-
lol
really interesting topic
linux can protect you from windows malware (worm, virus, trojan, windows applications exploit, windows rootkits)
but there is a lot of linux rootkits around
a rootkit scan an ip adress or a range ip looking for some defined open ports (associated with known process security whole)
it logs the scan result in a file and ask you if you want to try to exploit the security wholes on the target comp
there are some root kits you can add your own exploit
so put a linux workstation directly on the internet is not so secure as it seems
my mandrake 8.1 webserver installed behind a secured debianbox was hacked two times in a year
-
Re: lol
Originally Posted by
roger_girardin
really interesting topic
linux can protect you from windows malware (worm, virus, trojan, windows applications exploit, windows rootkits)
but there is a lot of linux rootkits around
a rootkit scan an ip adress or a range ip looking for some defined open ports (associated with known process security whole)
actually, what you describe is a worm, a rootkit is a set of utilities, typically kernel level enhancements that try to hide anomalous activity. for instance, hide network connections as seen wirh netstat, processes as seen by ps, it sometimes adds a icmp backdoor etc.
-
lol
@xaoz
thanks for the help
as you can find over 70 000 windows malwares
as you can find up to 70 linux malwares, linux is a natural protection
the actuals most knows rootkit are like you have defined
but this is just a kind of rootkit
a rootkit is a tool which will give a root access on a target comp
as there many ways to try to do it, every tools attempting to do it are called rootkit
when i see debian router box's firewall log, i can see the attacks
it's very interesting too
regards
Similar Threads
-
By eadz in forum Hdd Install / Debian / Apt
Replies: 11
Last Post: 11-04-2010, 09:02 PM
-
By NetKatz in forum Hdd Install / Debian / Apt
Replies: 2
Last Post: 05-02-2004, 02:38 PM
-
By pierrevn in forum General Support
Replies: 5
Last Post: 12-12-2003, 07:34 AM
-
By Edix in forum Hdd Install / Debian / Apt
Replies: 1
Last Post: 11-10-2003, 08:20 PM
-
By kipizit in forum General Support
Replies: 1
Last Post: 11-07-2003, 03:08 AM
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
Amiga 4000TX computer motherboard
$2643.23
Mini External OLED AMIGA Gotek Floppy Drive Emulator For Amiga 500/500+/600/1200
$37.32
Amiga OS Operating System v3.1 Install Disks for Commodore Amiga
$34.98
Amiga 500 Gotek Custom Mount USB Floppy Emulator - Complete Kit with Gotek
$65.00
TF1232: a 25MHz 68030 Amiga 1200 accelerator with 64MB RAM and FPU option
$138.11
13 Available Samsung SFD-321B Floppy Drive Modified for Commodore Amiga
$30.00
Amiga Workbench v1.3 Boot Disk + Extras A500 A2000 1.3 on DD 3.5" Floppy Disks
$14.99
Commodore Amiga A3000 Computer - WORKING - New Battery - Great Condition
$2379.15
TF1260 including 68LC060 CPU, accelerator card for the Amiga 1200, 128MB Ram
$320.79
pi1541 Disk Emulator for Commodore -
$38.95