-
[quote="Bukowski"]
Originally Posted by
false-hopes
when its installed needs locking down HARD.
so true, de"fault knoppix is definately not something you want to go on the internet with, not only you have to lock down services, try to upgrade the kernel(it's bugged) and remove a bunch of useless (suid) files too, when you don' with that, it starts to get reasonably to work with it, although you're not finished yet: you may want to secure/upgrade specific services too.
-
lol
really interesting topic
linux can protect you from windows malware (worm, virus, trojan, windows applications exploit, windows rootkits)
but there is a lot of linux rootkits around
a rootkit scan an ip adress or a range ip looking for some defined open ports (associated with known process security whole)
it logs the scan result in a file and ask you if you want to try to exploit the security wholes on the target comp
there are some root kits you can add your own exploit
so put a linux workstation directly on the internet is not so secure as it seems
my mandrake 8.1 webserver installed behind a secured debianbox was hacked two times in a year
-
Re: lol
Originally Posted by
roger_girardin
really interesting topic
linux can protect you from windows malware (worm, virus, trojan, windows applications exploit, windows rootkits)
but there is a lot of linux rootkits around
a rootkit scan an ip adress or a range ip looking for some defined open ports (associated with known process security whole)
actually, what you describe is a worm, a rootkit is a set of utilities, typically kernel level enhancements that try to hide anomalous activity. for instance, hide network connections as seen wirh netstat, processes as seen by ps, it sometimes adds a icmp backdoor etc.
-
lol
@xaoz
thanks for the help
as you can find over 70 000 windows malwares
as you can find up to 70 linux malwares, linux is a natural protection
the actuals most knows rootkit are like you have defined
but this is just a kind of rootkit
a rootkit is a tool which will give a root access on a target comp
as there many ways to try to do it, every tools attempting to do it are called rootkit
when i see debian router box's firewall log, i can see the attacks
it's very interesting too
regards
Similar Threads
-
By eadz in forum Hdd Install / Debian / Apt
Replies: 11
Last Post: 11-04-2010, 09:02 PM
-
By NetKatz in forum Hdd Install / Debian / Apt
Replies: 2
Last Post: 05-02-2004, 02:38 PM
-
By pierrevn in forum General Support
Replies: 5
Last Post: 12-12-2003, 07:34 AM
-
By Edix in forum Hdd Install / Debian / Apt
Replies: 1
Last Post: 11-10-2003, 08:20 PM
-
By kipizit in forum General Support
Replies: 1
Last Post: 11-07-2003, 03:08 AM
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
ORICO Multi Bay RAID Hard Drive Enclosure USB 3.0/ Type-C For 2.5/3.5'' HDD SSDs
$179.99
OWC Guardian Maximus Raid Enclosure SATA Hard Drive FireWire
$36.99
ACASIS 2.5/3.5 inch 2 Bay SATA USB 3.0 Hard Drive Disk HDD SSD Enclosure 4 RAID
$55.45
Dell 7H4CN PERC H730P Raid Controller Mini Mono12GBPS 2GB NV Cache
$44.99
LSI MegaRAID 9361-8i 12Gbps PCIe 3 x8 SATA SAS 3 8 Port RAID + BBU & CacheVault
$39.00
Dell PERC H330 PCIe 3.0 x8 RAID Storage Controller 04Y5H1 High Profile
$13.99
Inspur LSI YZCA-00424-101 Raid Card 12Gbps HBA Controller Low Profile 9300-8i IT
$15.98
Dell EMC 092GD6 Broadcom 9305-16i LSI Quad Port 4 Port SAS RAID Controller
$99.99
Dell PERC V10 Z0017A SAS-SATA RAID Controller Card No Bracket N4C2D 5R10N
$52.97
Yottamaster 2 Bay USB 3.1 RAID Hard Drive Enclosure For 2.5" SATA HDD SSD UASP
$59.99