I don't know anything about hacking a box, but if this guy/gal left this gaping hole and you don't have logs saying where s/he came from I would probably setup IP chains to log all connection attempts to the box on this port. Maybe he is bright enough to log in from a static IP. _______________________________________________ Redhat-list mailing list [EMAIL PROTECTED] https://listman.redhat.com/mailman/listinfo/redhat-list
- highly suspicious line in inetd.conf wYRd
- Re: highly suspicious line in inetd.conf Chuck Mead
- Re: highly suspicious line in inetd.conf Michael R. Jinks
- Re: highly suspicious line in inetd.conf Gordon Messmer
- Re: highly suspicious line in inetd.conf Martin Brown
- Re: highly suspicious line in inetd.conf Gordon Messmer
- Re: highly suspicious line in inetd.conf Chad W. Skinner
- Re: highly suspicious line in inetd.conf wYRd
- Re: highly suspicious line in inetd.conf tsombakos, mark
- Re: highly suspicious line in inetd.conf Jonathan Wilson
- Re: highly suspicious line in inetd.conf Charles Galpin
- Re: highly suspicious line in inetd.conf Hal Burgiss
- Re: highly suspicious line in inetd.conf rpjday
- Re: highly suspicious line in inetd... Hal Burgiss
- RE: highly suspicious line in inetd.conf Eric Knudstrup
- Re: highly suspicious line in inetd.conf Chuck Mead
- Re: highly suspicious line in inetd.conf tsombakos, mark