I would use nmap to do a local portscan to see which services are running and 
disable those you do not need.





On Fri, 3 May 2002 06:50:26 -0700 "Jim Bija" <[EMAIL PROTECTED]> wrote:
>If he caused 5 thousand dollars or more in damage (which includes any and
>all things needed to be done to reverse what he did, peoples time etc) and
>what he did had malicious intent.. call your local F.B.I. they will take
>care of him.
>i caught someone on a small ISP and called the feds. i handed this punk over
>to the FBI on a silver platter. turned out he was part of a HUGE distributed
>DOS network, one of the places they were attacking was
>whitehouse.gov..heh...after a while i asked, so whats going on with the case
>and it turned into a
>"i can no longer comment on the ongoing case, thanks for your help"...
>Jim.
>
>----- Original Message -----
>From: "Tsing Moh Lim" <[EMAIL PROTECTED]>
>To: <[EMAIL PROTECTED]>
>Sent: Friday, May 03, 2002 2:26 AM
>Subject: How can I take action on the hacker if I manager to get his IP
>address
>
>
>> My server was hack and I managed to capture the ip address with date and
>time
>> on a remote logging system.
>>
>> How can I take action against him or warn him ? ?
>>
>> Is there a tool that I could use to check on my server vulnerability.
>>
>> Thanks and regards
>>
>>
>> Moke
>>
>>
>>
>>
>> _______________________________________________
>> Redhat-list mailing list
>> [EMAIL PROTECTED]
>> https://listman.redhat.com/mailman/listinfo/redhat-list
>>
>
>
>
>
>_______________________________________________
>Redhat-list mailing list
>[EMAIL PROTECTED]
>https://listman.redhat.com/mailman/listinfo/redhat-list
>



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to