I don't know anything about hacking a box, but if this guy/gal left this
gaping hole and you don't have logs saying where s/he came from I would
probably setup IP chains to log all connection attempts to the box on this
port. Maybe he is bright enough to log in from a static IP.



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to