Vulnerability Development mailing list archives

Re: Securing of systems....


From: Taneli Huuskonen <huuskone () CC HELSINKI FI>
Date: Thu, 3 Aug 2000 21:39:45 +0300

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Ryan Yagatich <ryagatich () CSN1 COM> egrapse:

[...]
another firewall (listed below are some examples). and then the most
important part is to make sure you have removed the "hacker tools" like
telnet, compiling software, etc... this way if someone were to telnet to
your box, they would not be able to telnet or hit any of your other
machines.

That might stop script kiddies, but if the cracker happens to be a
hacker, it'll only slow her down.  Nevertheless, it's a good idea; just
don't rely too much on it.

Regards,
Taneli

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQA/AwUBOYm8Wl+t0CYLfLaVEQI5GACgwVfvEdqhpQkaZJ3pLOv8gezHv0kAn03w
8h/vkPKbzYs7SXImfwgvn0W2
=IydQ
-----END PGP SIGNATURE-----
--
I don't   | All messages will be PGP signed,  | Fight for your right to
speak for | encrypted mail preferred.  Keys:  | use sealed envelopes.
the Uni.  | http://www.helsinki.fi/~huuskone/ | http://www.gilc.org/


Current thread: