I would use nmap to do a local portscan to see which services are running and disable those you do not need.
On Fri, 3 May 2002 06:50:26 -0700 "Jim Bija" <[EMAIL PROTECTED]> wrote: >If he caused 5 thousand dollars or more in damage (which includes any and >all things needed to be done to reverse what he did, peoples time etc) and >what he did had malicious intent.. call your local F.B.I. they will take >care of him. >i caught someone on a small ISP and called the feds. i handed this punk over >to the FBI on a silver platter. turned out he was part of a HUGE distributed >DOS network, one of the places they were attacking was >whitehouse.gov..heh...after a while i asked, so whats going on with the case >and it turned into a >"i can no longer comment on the ongoing case, thanks for your help"... >Jim. > >----- Original Message ----- >From: "Tsing Moh Lim" <[EMAIL PROTECTED]> >To: <[EMAIL PROTECTED]> >Sent: Friday, May 03, 2002 2:26 AM >Subject: How can I take action on the hacker if I manager to get his IP >address > > >> My server was hack and I managed to capture the ip address with date and >time >> on a remote logging system. >> >> How can I take action against him or warn him ? ? >> >> Is there a tool that I could use to check on my server vulnerability. >> >> Thanks and regards >> >> >> Moke >> >> >> >> >> _______________________________________________ >> Redhat-list mailing list >> [EMAIL PROTECTED] >> https://listman.redhat.com/mailman/listinfo/redhat-list >> > > > > >_______________________________________________ >Redhat-list mailing list >[EMAIL PROTECTED] >https://listman.redhat.com/mailman/listinfo/redhat-list > _______________________________________________ Redhat-list mailing list [EMAIL PROTECTED] https://listman.redhat.com/mailman/listinfo/redhat-list