One thing I can't find a good document on is *how* these denial of service programs (the binaries) got onto the Linux boxes in the first place. Were they installed through the "rpc.statd" hole? Is it IRC buffer overflow issue (it doesn't sound like it)? How did the trojan horses get onto the systems? The docs I find concentrate on finding the trojan itself but not closing the hole(s) that allowed the trojan in in the first place (which is frankly more my concern). Anyone feel like filling me in? Thanks in advance if you know... - Matt _______________________________________________ Redhat-devel-list mailing list [EMAIL PROTECTED] https://listman.redhat.com/mailman/listinfo/redhat-devel-list
- Urgent ! denial of Service Attack Nasir Mahmood
- Re: Urgent ! denial of Service Attack Pekka Savola
- Re: Urgent ! denial of Service Attack kort
- Re: Urgent ! denial of Service Attack Matt Fahrner
- Re: Urgent ! denial of Service Attack Mike A. Harris
- RE: Urgent ! denial of Service Attack Jesse Noller
- Re: Urgent ! denial of Service Attack Matt Fahrner
- Re: Urgent ! denial of Service Attack Alvin Starr
- Re: Urgent ! denial of Service Attack W. Reilly Cooley
- Re: Urgent ! denial of Service Attack Michael Waite
- Re: Urgent ! denial of Service Attack Mike A. Harris
- Re: Urgent ! denial of Service Attack Harry Putnam
- Re: Urgent ! denial of Service Attack Mike A. Harris
- Re: Urgent ! denial of Service Attack Pekka Savola