** Reply to message from Glen Lee Edwards <[EMAIL PROTECTED]> on Sun, 05 May 2002 12:25:47 
-0500

<snip>
> You're right.  I'm a RH Linux end user, not a geek.  I don't have the
> tools/experience to track him down, find out how he got in, and plug the holes.
> I just install what Red Hat sends and hope it works.
<snip>

Glen, such a defeatist attitude is unnecessary. After you re-install again (you must 
assume that your friendly neighborhood hacker has already had free rein on your box), 
do 3 things:


1) Choose a difficult root password, one with a combo of letters and numbers. 

2) Choose medium or high security firewall during install. 

3) register your system for up2date and let the up2date agent do its thing. It may 
take a while but a fully updated system is less prone to security holes.

If the hacker does damage to somebody, you could be complicit if it is found out that 
you willingly allowed him use of your box - especially since you emailed him your root 
password.

jb

-- 
Jack Bowling
mailto: [EMAIL PROTECTED]



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to