** Reply to message from Glen Lee Edwards <[EMAIL PROTECTED]> on Sun, 05 May 2002 12:25:47 -0500
<snip> > You're right. I'm a RH Linux end user, not a geek. I don't have the > tools/experience to track him down, find out how he got in, and plug the holes. > I just install what Red Hat sends and hope it works. <snip> Glen, such a defeatist attitude is unnecessary. After you re-install again (you must assume that your friendly neighborhood hacker has already had free rein on your box), do 3 things: 1) Choose a difficult root password, one with a combo of letters and numbers. 2) Choose medium or high security firewall during install. 3) register your system for up2date and let the up2date agent do its thing. It may take a while but a fully updated system is less prone to security holes. If the hacker does damage to somebody, you could be complicit if it is found out that you willingly allowed him use of your box - especially since you emailed him your root password. jb -- Jack Bowling mailto: [EMAIL PROTECTED] _______________________________________________ Redhat-list mailing list [EMAIL PROTECTED] https://listman.redhat.com/mailman/listinfo/redhat-list